[Congressional Record Volume 158, Number 61 (Thursday, April 26, 2012)]
[House]
[Pages H2156-H2186]
{time} 1420
CYBER INTELLIGENCE SHARING AND PROTECTION ACT
General Leave
Mr. ROGERS of Michigan. Mr. Speaker, I ask unanimous consent that all
Members may have 5 legislative days in which to revise and extend their
remarks and include extraneous material on H.R. 3523.
The SPEAKER pro tempore (Mr. Woodall). Is there objection to the
request of the gentleman from Michigan?
There was no objection.
The SPEAKER pro tempore. Pursuant to House Resolution 631 and rule
XVIII, the Chair declares the House in the Committee of the Whole House
on the state of the Union for the consideration of the bill, H.R. 3523.
The Chair appoints the gentlewoman from Illinois (Mrs. Biggert) to
preside over the Committee of the Whole.
{time} 1422
In the Committee of the Whole
Accordingly, the House resolved itself into the Committee of the
Whole House on the state of the Union for the consideration of the bill
(H.R. 3523) to provide for the sharing of certain cyber threat
intelligence and cyber threat information between the intelligence
community and cybersecurity entities, and for other purposes, with Mrs.
Biggert in the chair.
The Clerk read the title of the bill.
The CHAIR. Pursuant to the rule, the bill is considered read the
first time.
[[Page H2157]]
The gentleman from Michigan (Mr. Rogers) and the gentleman from
Maryland (Mr. Ruppersberger) each will control 30 minutes.
The Chair recognizes the gentleman from Michigan.
Mr. ROGERS of Michigan. Madam Chair, I yield myself 4 minutes.
Never a problem have I seen when it comes to our national security,
Madam Chair, that we are just not prepared to handle.
In just the last few years, nation-states, like China, have stolen
enough intellectual property from just the Fed's contractors that it
would be equivalent to 50 times the print collection of the Library of
Congress. We have nation-states that are literally stealing jobs and
our future. We also have countries that are engaged in activities and
have capabilities that have the ability to break networks, computer
networks, which means you can't just reboot. It means your system is
literally broken. Those kinds of disruptions can be catastrophic when
you think about the financial sector or the energy sector or our
command and control elements for all of our national security
apparatus.
This is as serious a problem as I have seen. So, last year, I and my
partner--Dutch Ruppersberger, the vice chairman and ranking member of
the Intelligence Committee--agreed that this was a significant enough
problem to the future prosperity of America that we'd better do
something about it.
We needed to stop the Chinese Government from stealing our stuff. We
needed to stop the Russians from what they're doing to our networks and
to people's personal information, data, and resources. We needed to
prepare for countries like Iran and North Korea so that they don't do
something catastrophic to our networks here in America and cause real
harm to real people.
So, in a bipartisan way, we set out to do something very, very, very
narrow. When the government spies overseas, it collects malware--
viruses, software that is dangerous to our computers. That means they
can either steal our stuff--the personal information off of your
computer--or they can steal the secrets that make your business viable,
the kinds of secrets that give people jobs.
So wouldn't it be great if we could take that source code, that
software and share it with the private sector so that they could put it
on their private systems, like they do every single day to try to
protect networks, and have that added advantage of that extra coverage
from that malicious source code? The good news is this happens every
day. If you have Norton or McAfee or Symantec or any other antivirus
protection on your computer, it has patches of information that they
know is really bad stuff, and every time you turn your computer on, it
updates and tries to protect your computer, your personal information.
That's all this is. It is adding to that patchwork some zeroes and
some ones that we know is malicious code that is either going to steal
your information or break your computer or something worse. That's all
this bill is. It draws a very fine line between the government and the
private sector. It is all voluntary. There are no new mandates. There
is no government surveillance--none, not any--in this bill. It just
says, if we know we have this source code, shouldn't we be obligated to
give it so it doesn't do something bad to the companies and individuals
in America. That's all this bill does.
We have worked collaboratively with hundreds of companies, with
privacy groups, with civil libertarians. We have worked with government
folks. We have had hundreds and hundreds of meetings for over a year.
We have kept this bill open in an unprecedented transparent way to try
to meet the needs of privacy concerns, civil libertarian concerns,
civil liberties concerns. We wanted to make sure that, with this bill,
people understood exactly what we were trying to do, how simple it is,
and how crucial it is to the future defense of this great Nation.
Without our ideas, without our innovation that countries like China
are stealing every single day, we will cease to be a great Nation. They
are slowly and silently and quickly stealing the value and prosperity
of America.
The CHAIR. The time of the gentleman has expired.
Mr. ROGERS of Michigan. I yield myself an additional 1 minute.
One credit card company said that they get attacked for your personal
information 300,000 times a day--one company. We have a company that
can directly show you stolen intellectual property. This one particular
company estimated 20,000 manufacturing jobs that they lost for
Americans, which were good-paying jobs, because countries like China
stole their intellectual property and illegally competed against them
in the marketplace.
This is as bad a problem, Madam Chair, as I have seen. I think you'll
hear throughout the day this has been a responsible debate and that it
has been a responsible negotiation to get to privacy concerns and our
ability to protect your information on your computer through this
series of zeroes and ones, the binary code on our computers.
Again, I want to thank my ranking member for his partnership and his
work. He has been exceptional to work with on something on which we
both agree and on which we agreed, in a bipartisan fashion, was a
danger to the future prosperity of America.
With that, I reserve the balance of my time.
Mr. RUPPERSBERGER. Madam Chair, I yield myself such time as I may
consume.
First of all, I do want to thank the chairman for working with us in
a bipartisan way to protect our country from this very serious threat
of cyberattacks.
As the ranking member of the House Intelligence Committee, people
often ask me what keeps me up at night. I tell them: weapons of mass
destruction entering the country undetected and also a catastrophic
cyberattack shutting down our water supply, power grid or banking
systems; and those are just a few of the many areas that could be
attacked and shut down.
Every day, U.S. Web sites and our Nation's networks are threatened by
foreign governments like China, Iran, Russia, and other groups trying
to steal our money and valuable trade secrets. According to the
National Counterterrorism Executive, the number one thing cyberthieves
are trying to steal is information and communication technology, which
form the backbone of nearly every other technology. In fact, according
to the United States Cyber Command, $300 billion worth of trade secrets
are stolen every year. This proves we need to make real changes to how
we protect our cybersystems.
The Cyber Intelligence Sharing and Protection Act helps the private
sector protect itself and its clients from these attackers and data
thieves. The intelligence community has the ability to detect these
cyberthreats, these malicious codes and viruses, before they are able
to attack our networks; but right now, Federal law prohibits the
intelligence community from sharing the classified cyberthreat with the
companies that will protect us, that control the network--the AT&Ts,
the Verizons, the Comcasts, those groups. We have the ability to give
them the information to protect us; yet we have to pass a law to do
that, and that's why we are here today.
{time} 1430
The Cyber Intelligence Sharing and Protection Act will clearly do
that if we pass the bill. It allows the intelligence community to share
the codes and signatures associated with malware and viruses and the
means to counter the bad stuff with the companies. These companies keep
a lookout for these viruses and work to stop them before they are able
to attack their system.
Companies then voluntarily give information about the cyberattack
back to the government, machine code consisting of strings of zeroes
and ones that uniquely identifies the malware. Cyberanalysts will use
this information to better understand the attack and try to figure out
who launched it and where it came from.
This information will be used to protect against similar attacks in
the future.
Now, the Democrats worked hard to protect privacy and civil liberties
in this bill throughout the entire process. We fought for additional
privacy protections in the original bill that was marked up in
committee. In the version we will vote on tomorrow morning, additional
changes are also included in the amendments.
[[Page H2158]]
Privacy and civil liberty groups and the White House all agree we
made important positive changes that went a long way to improve the
initial bill that came out of committee. We severely limit what
information can be shared with the government and how it can be used.
It is also important to note the entire process is completely
voluntary and provides industry the flexibility they need to deal with
business realities.
The bill also requires an annual report from the inspector general of
the intelligence community to ensure none of the information provided
to the government is mishandled or is misused. This is a very important
privacy issue.
The review will include annual recommendations to improve the
protection of privacy and civil liberties. That review will be done
again by the inspector general.
We also made it clear this legislation grants no new authority to the
Department of Defense, the National Security Agency, or the
intelligence community. At the urging of the White House and others, we
included the Department of Homeland Security in the process so that
there is not even a perception that our intelligence agencies or
military will be in control of this. The Homeland Security Department
will be coordinating as a civil body.
In addition, companies that act in good faith to protect systems and
networks can receive liability protection. This is what our bill does.
Now, what does it not do? The bill does not allow the government to
order companies to turn over private email or other personal
information. This is not surveillance. The bill does not allow the
government to monitor private networks, read private email, censor, or
shut down any Web site.
We have a broad coalition of support with 100 cosponsors, close to 30
companies and industry groups, and dozens of trade organizations like
Facebook, Microsoft, IBM, a lot of different groups that are supporting
this bill.
This is not a perfect bill, but the threat is great. I believe this
legislation is critical for our national security and yet deals with
the issue of privacy. We can do better in privacy, and we hope to get
the bill to the Senate, where there will be a lot more negotiation.
Congress must act now, and I encourage my colleagues to vote for this
bill.
I reserve the balance of my time.
Mr. ROGERS of Michigan. I yield 2 minutes to the gentlelady from
North Carolina (Mrs. Myrick) who is on the Intelligence Committee and
has a tremendous expertise on counterterrorism issues.
Mrs. MYRICK. I want to say a big thanks to the chair and to the
ranking member for all of their months of hard work on putting this
cybersecurity bill together, and it is a bipartisan Intelligence
Committee bill.
We all know the private sector is a very diverse world that includes
reputable companies but also grey market suppliers and counterfeiters,
and State-owned enterprises and other entities that often act against
the national security interests of the United States, as well as other
private companies.
The information technology sector, in particular, includes companies
that are associated with some foreign governments and militaries and
intelligence services of nations that attack the United States in
cyberspace daily.
State and local entities, along with the private sector, don't have
the resources, the capabilities, or the information necessary to
address these cybersecurity threats. This bill creates a necessary
mechanism for the Federal Government to share its informational
resources and cybersecurity threat analysis with the private sector and
with State and local entities.
The purpose of the bill is to transmit important cybersecurity
information from the Federal Government to the private sector, not vice
versa. The bill would empower the private sector to begin taking
necessary steps to protect itself from cyberattacks, some they don't
have any clue are happening.
Ultimately though, it's going to be important for Congress and the
Federal Government to continue the debate on cybersecurity to determine
how to best confront the changing threats because this world is
changing daily, and the Federal Government can't leave those
responsibilities solely to the private sector, especially, like the
chairman already mentioned, countries like China that are continuously
developing cyberwarfare capabilities and the cyberattacks that they
commit against the Western companies and infrastructures and government
entities we all know about.
So I urge my colleagues to vote ``yes'' on this important piece of
legislation and an important step in trying to protect the private
sector in this country.
Mr. RUPPERSBERGER. Madam Speaker, I yield 2 minutes to my
distinguished colleague from the State of Utah (Mr. Boswell) who
formerly served on the Intelligence Committee.
The CHAIR. The gentleman from Iowa is recognized for 2 minutes.
Mr. BOSWELL. Thank you, I appreciate the correction. We grow corn in
Iowa, and we grow potatoes in Idaho. A little bit of fun.
I rise to speak in support of this bill today. I look across at
Chairman Rogers and here at Ranking Member Ruppersberger, and I have
great confidence. I know these men. I know their staff. They've come to
this very serious matter that lays before our country that we need to
understand. We must take action.
I'm encouraged by the process to involve key stakeholders from
private industry and privacy groups during this drafting. This
transparent engagement shaped many of the bipartisan constructive
amendments being considered today that will improve the bill, and it's
a good thing.
The threat from malicious actors in cyberspace is real. You've heard
it said over and over already by those who have spoken ahead of me. I
concur with what they say. It's an absolutely real thing. You only need
to pick up the newspaper or turn on the TV to see the threats facing
our networks. These networks include those that power our homes, our
factories, and our small businesses, allow our banking system to
function and provide the very backbone to our current American way of
life, and we rely on these networks every day.
The bill under consideration today is a very narrow piece, but what
we can agree on is it's a critical one to helping secure our networks
and, therefore, the way of life as we know it today.
There are continuing debates on how to implement the bill, but the
debate isn't over what needs to be done; it must be done. Information
we ask our intelligence community to use and that protects our
government networks should, in a secure way, be shared to protect the
many other critical networks we rely on.
I believe companies are doing what they can to protect their networks
to the extent they can today, but there is more that must be done.
We cannot be in a situation where the government had information to
prevent or mitigate a catastrophic cyberattack, and yet we did not have
the procedure in place to share this information. Our American way of
life includes a great respect for privacy and our civil liberties. We
make no mistake about that.
This bill, with the addition of many of the amendments which were
drafted in concert with privacy groups, addresses many of those
concerns.
In addition, the annual unclassified report required by the statutory
intelligence community inspector general will inform whether there are
additional adjustments needed to be made.
The CHAIR. The time of the gentleman has expired.
Mr. RUPPERSBERGER. I yield the gentleman an additional 10 seconds.
Mr. BOSWELL. So, in closing, I want to say this: Congress cannot wait
to act. Network security hasn't kept up with network speed. This is the
fundamental purpose of this bill. I encourage Members to begin to
secure our networks through sharing information about the threats.
Please vote ``yes.''
Mr. ROGERS of Michigan. I yield 2 minutes to the gentleman from
Illinois (Mr. Kinzinger).
Mr. KINZINGER of Illinois. I thank the ranking member and the
chairman for your hard work on the issue and the members on the
committee.
This is very important. It goes beyond partisanship. This is about
national security.
The idea of cyberattacks, it's not something that is just out there
in space that we really don't have to worry about. This is an issue
that's here today, and it's here right now. In
[[Page H2159]]
fact, just today, the New York Stock Exchange was the target of a DDoS
attack on some of its external computer systems. That's not something
that we just magically happen to have today. This is happening every
day, thousands and thousands of times a day.
{time} 1440
I'm a military guy and I'm a military pilot. I think a lot about the
threats from outside. You think a lot about threats of terrorism and
threats of invasion or anything along that line. But I'll tell you one
of the biggest threats that really keep us up at night is this idea of
a cyberattack. I think it's something that we have to take head-on.
This voluntary information-sharing between classified portions of our
government and certified private actors will serve to enhance our
defenses greatly.
It is important to note the amount of classified information
currently shared between our government and private industry is muddled
at best. The few private companies who are lucky enough to receive an
invitation into the current classified annex of cybersecurity-sharing
face significant challenges when it comes to even understanding what
that information is. Many times they simply get a badly scanned
printout of a current threat situation from which they try to prevent a
future attack, and it is woefully inadequate.
We talk a lot about the Russians and about the Chinese and their use
of cyberwarfare against us. That's a significant threat. That's
something very serious. But I want to speak just momentarily about the
threat from Iran.
We all know that Iran is a very serious country that is very
seriously focused on bringing down, in many cases, the West. They've
said it themselves. The Iranian regime from the highest level down has
publicly stated their plans to fight enemies with abundant power in
cyberspace and Internet warfare. It's also publicly stated that Iran
blames the West for the Stuxnet virus which disrupted their nuclear
program, and they have vowed retaliation. The combination of the low
cost and effectiveness of cyberwarfare has led the Iranian
Revolutionary Guard to actively and effectively recruit radical
Islamist hackers for nefarious purposes. We can't stand idly by while
we see nations like Iran threaten the future of this country.
So I support this bill, and I commend the folks who have worked on
it.
Mr. RUPPERSBERGER. Madam Chair, I yield 2 minutes to my distinguished
colleague from the State of New Jersey, Mr. Rush Holt, who was formally
on the Intelligence Committee.
Mr. HOLT. Madam Chair, I thank the gentleman.
The proponents of this legislation, who are all friends and well
intentioned, have repeatedly said there's a real threat, a threat to
our critical infrastructure, affecting our waterworks, and our electric
grid. But this bill is so poorly constructed it is not designed to
protect against those threats. There are any number of flaws with it.
The American Civil Liberties Union points out that there would be an
exception to all privacy laws; and it would allow companies to share
private and personal data that they hold on their American customers,
actually, among themselves and with the government. It would not limit
companies to sharing only technical or nonpersonal data. They'd be free
from any liability of misuse. They would only have to plead good
intentions.
The bill fails to narrowly define the privacy laws it would
contravene; it fails to put the cybersecurity efforts in a civilian
agency; it fails to require companies to remove personal identifiable
information about individuals; it fails to sufficiently limit the
government's use of information; it fails to create a robust oversight
and accountability structure. With the bill in its current form,
there's no requirement that personal information must be removed.
There's no consumer or stakeholder group involved in the oversight.
There's no way for any member of the public to know if their data has
been shared in error, and on and on.
And I should point out that it is not just the American Civil
Liberties Union that opposes this. Even the American Library
Association opposes it. The President, himself, says, if this passes,
he will veto it. Passing this bill in response to the cyberthreat would
be like going into Iraq because al Qaeda terrorists were a real threat.
Yes, there's a real threat. This is not the answer.
Mr. ROGERS of Michigan. Madam Chair, I yield 2 minutes to the
distinguished gentleman from Ohio (Mr. Stivers).
Mr. STIVERS. Madam Chair, I would like to thank the gentleman from
Michigan for yielding me time. I would also like to thank him for his
leadership on this effort, as well as the ranking member, the gentleman
from Maryland (Mr. Ruppersberger).
I rise today in support of the cybersecurity legislation under
consideration. As a member of the Cybersecurity Task Force, I'm pleased
that many of our recommendations are included in this bill.
Cybersecurity is a very important issue. Every day there are people
trying to use cyberattacks to steal our money, steal our jobs, and
attack our national security.
I know as a member of the Financial Services Committee that our
financial sector spends billions of dollars every year trying to
protect against cyberattacks. They protect consumers by increasing
controls, making sure they have encryption, authenticating customers,
and protecting customer data.
That's all protecting our wallets, but we also need to protect our
jobs. Unfortunately, there are folks who would like to use cyberattacks
to steal our intellectual property and give it to those who compete
against America, which will steal our jobs.
Not allowing information-sharing like this bill does would be like
saying to the Marines and the Army, You can't share information about
how the enemy is going to attack you. As a member of the National Guard
for the last 26 years, I know that cyber is also a real threat to our
national security.
This bill will update our information-sharing to allow private
companies to share information with the government and the government
to share information, and includes some important liability protection
as well. It's a carefully crafted bill.
I think the gentleman from Michigan (Mr. Rogers) and the gentleman
from Maryland (Mr. Ruppersberger) have been very open to working with
folks to try to improve this bill. I'm looking forward to supporting
some of the bipartisan amendments that I think will improve this bill.
Madam Chair, we must protect ourselves against cyberattacks, against
those who would steal our money, steal our jobs, and attack our
country. This bill is not a panacea, but it's a great start. I'm happy
to support it, and I hope all my colleagues will vote ``yes.''
Mr. RUPPERSBERGER. I yield 2 minutes to my distinguished colleague
from the State of California, Mr. Adam Schiff, who is also the ranking
member on the Technical and Tactical Intelligence Committee.
Mr. SCHIFF. I thank the gentleman for yielding.
Madam Chair, I rise in reluctant opposition to the bill. But at the
outset, I want to acknowledge the extraordinary work done by our
chairman, Mike Rogers, and our ranking member, Dutch Ruppersberger.
These two gentlemen have changed the nature and culture of our
committee, made it far more productive, and they've done great work
getting us to this point. And I want to acknowledge that at the outset.
There's still work to be done in two areas principally, and I want to
talk briefly about that. Even before I do that, I want to acknowledge
why we're here.
We do ourselves, I think, a disservice when we talk about a
cyberthreat. That sounds like something that may come in the future,
something to be concerned about that might take place down the line.
We're under cyberattack right now. This is not speculative. This is not
intangible. This is happening right now. This needs to be dealt with,
and we do need a sense of urgency. But there is a distance yet to go,
and in two areas in particular.
One is, when we gather cyberinformation and we share it between
companies or between the government and companies, as we must do, we
want to make sure that we minimize any unnecessary invasion of privacy
of the American people. We can
[[Page H2160]]
do both, and we have to do both. We need to protect ourselves from
cyberattack, and we need to protect and preserve the privacy rights of
the American people.
I think the bill needs a requirement that personally identifiable
information be minimized to the maximum extent practicable. All we're
asking for is what can reasonably be done. We're not asking for the
private sector or the government to do the impossible, but we should
require of our government that they minimize personal information that
is shared to protect us from cybercrime. That's the first thing.
The second item that really needs to be incorporated in this bill
that my colleague, Mr. Thompson, will talk about as well is the need to
protect critical infrastructure. That is a big missing piece in the
bill, and I understand from my colleagues that it's not within the
Intelligence Committee jurisdiction. That's correct. But as we saw from
the Rules Committee, they're more than capable of incorporating things
from more than one committee's jurisdiction in the rule, as we see in a
rule that incorporates student loan interest and a bill on that subject
with a bill on cybersecurity. There is nothing preventing the Rules
Committee from bringing into the discussion today and allowing
amendments on critical infrastructure.
The absence of those two big pieces makes it impossible for me to
support the bill today.
The CHAIR. The time of the gentleman has expired.
Mr. RUPPERSBERGER. I yield the gentleman an additional 30 seconds.
Mr. SCHIFF. I thank the gentleman.
I just want to conclude by saying I look forward to our continued
work on this bill, and I appreciate the great cooperation between the
chair and ranking member, and I have respect for all the members of the
committee.
{time} 1450
Mr. ROGERS of Michigan. Madam Chair, I yield 2 minutes to the
gentleman from Nevada (Mr. Heck).
Mr. HECK. I come to the floor today to voice my strong support for
the Cyber Intelligence Sharing and Protection Act. We know that every
day, American companies and computer systems are targeted by foreign
nation-state actors who prey on sensitive business and personal
information to gain an unfair advantage in the global marketplace. The
theft of research and development results, negotiating positions, or
pricing information costs us jobs here at home and puts personal
information at risk. The same vulnerabilities that can result in the
theft of sensitive business information could be used to attack
critical infrastructure we rely on such as power plants, air traffic
control systems, and electrical grids. An attack on these systems would
be devastating. Protecting them and the constituents they serve must be
considered an urgent national security concern.
The government currently uses classified cyberthreat intelligence to
protect its own systems, computer networks, and critical
infrastructure. The business community has voiced its desire to be
given the tools necessary to protect itself from cyberthreats. This
bill will allow the government to provide classified cyberthreat
information to private sector companies so that they can protect
sensitive information and their customers' privacy against malicious
cyberattacks. The bill places no mandates or burdens on private sector
companies and does not expand the size or scope of the Federal
Government. All information-sharing is totally voluntary under this
legislation, and there are strong privacy protections in place for the
information that is shared.
After receiving input from the private sector and civil liberty
groups and by building upon the success of an existing intelligence-
sharing pilot program with defense contractors, we have produced a bill
that upholds constitutional rights to privacy while providing the
private sector with the necessary means to defend itself against
cyberattackers. I want to commend Chairman Rogers and Ranking Member
Ruppersberger for their outstanding leadership in crafting this
legislation that was written in a transparent and bipartisan fashion.
I urge my colleagues to support this bill that protects our homeland,
protects our economy, and protects our privacy.
Mr. RUPPERSBERGER. Madam Chair, I yield 2 minutes to my distinguished
colleague from the State of Mississippi, Mr. Bennie Thompson, who is
also the ranking member of the Homeland Security Committee.
Mr. THOMPSON of Mississippi. Madam Chairman, I rise in opposition to
H.R. 3523. I also appreciate the efforts of my colleagues on the
Intelligence Committee for fostering a greater sharing of cyberthreat
information. This bill is a start, but my opposition is because it does
not do what we know that we need to have done.
Having been involved in homeland security issues for nearly a decade,
I know how important it is to protect our Nation's networks from
cyberattacks. But in an effort to foster information-sharing, this bill
would erode the privacy protections of every single American using the
Internet. It would create a Wild West of information-sharing, where any
certified business can share with any government agency, who can then
use the information for any ``national security'' purpose and grant
that business immunity from virtually any liability. None of the
amendments offered by the chairman and ranking member would change any
of those basic facts.
I and several of my colleagues offered amendments that would have
addressed those concerns by ensuring that civilian agencies would take
the lead in information-sharing, restricting how the government could
use the information, and making sure consumers' sensitive information
is adequately protected. Unfortunately, the House will not have an
opportunity to consider them today.
If my colleagues want to accomplish something on cybersecurity, then
vote ``yes'' on any or all of the suspension bills before us today; but
do not vote for H.R. 3523. It violates the ``do no harm'' rule and
would set back the privacy rights of all our citizens who have enjoyed
the establishment of the Internet.
This fatally flawed bill is opposed by not only every major privacy
or civil liberties group, from the ACLU to the Constitution Project to
the Center for Democracy and Technology, but also the Obama
administration. For these reasons, Madam Chair, I strongly urge a
``no'' vote on H.R. 3523.
Mr. ROGERS of Michigan. Madam Chair, I yield 2 minutes to the
gentleman from Nebraska (Mr. Terry).
Mr. TERRY. I thank the gentleman.
Madam Chairman, I rise in support of this bill. It's a sensible bill
that builds a necessary pillar in the cybersecurity strategy of our
Nation.
I've immersed myself in cybersecurity over the last couple of years.
I've been on two task forces. I'm on the Energy and Commerce Committee.
I've met with industry leaders in all of the critical infrastructure
areas. And as I've gathered information and input, there's two
principles at stake here. The common thread from all of them have said:
we have to be flexible, and we have to be able to communicate. Those
are the two principles on which this bill is based.
Number one, flexibility. What it means is you can't lock this into a
government agency because when government agencies start taking control
of setting standards or working with an industry group to set standards
on cybersecurity, the hackers take 5 seconds to get around that, and it
will take years then for the industry to move around that. You are
setting them up as ducks waiting to be shot if we do that. So we can't.
We've got to give them the flexibility. The least government
interference is what gives them the flexibility.
The next part is communication. What I learned from the critical
infrastructure industries is that what they want to know is, is there a
threat out there, and what's the specifics of the threat? They know
they're under attack every day. Maybe our defense agencies have
specific information they can share, but they can't because it's top
secret.
So this bill allows there to be communication of specific threats to
perhaps communicate from government to private sector some better
practices that they can enact. That's what this breaks down, that
barrier, not some of these civil liberty conspiracy theories. This is
simple communication between government and private sector or private
sector to private sector. This isn't
[[Page H2161]]
reporting on whether you're downloading an illegal movie or whatever.
This is about securing our infrastructure.
Mr. RUPPERSBERGER. Madam Chair, I yield 2 minutes to my distinguished
colleague and friend from the State of Rhode Island (Mr. Langevin), who
is also a member of our Intelligence Committee and has worked very hard
with the chairman and myself on the issue of cybersecurity. I consider
him one of our experts on the Hill in the area of cybersecurity.
(Mr. LANGEVIN asked and was given permission to revise and extend his
remarks.)
Mr. LANGEVIN. I want to thank the gentleman for yielding.
I rise in strong support of H.R. 3523, and I want to thank Chairman
Rogers and Ranking Member Ruppersberger for a bipartisan and inclusive
process on an extremely difficult and technical issue. While I don't
believe this legislation is perfect, and much work remains to be done,
CISPA represents an important good-faith effort to come together as a
necessary first step towards better cybersecurity for our Nation.
I have long worked on this issue for many years to raise awareness
and to secure our Nation against the threats that we face in
cyberspace. Quite frankly, we are running out of time. I believe it's
important that we act now to begin our legislative response to this
critical issue.
We all know how dependent we are on the Internet and how we use it so
much in our daily lives, but the Internet was never built with security
in mind. What's happening is our adversaries are using the
vulnerabilities against us.
I've also been very clear that we need to have robust privacy
protections that must be included to safeguard personal information and
also defend civil liberties in any cybersecurity response that we do
enact. I'm pleased to say this legislation has been strengthened in
that regard, and I believe more can be done as we continue this
important debate.
That being said, the efficient sharing of cyberthreat information
envisioned by this legislation is vital to combating advanced
cyberthreats and stemming the massive ongoing theft of identities,
intellectual property, and sensitive security information.
{time} 1500
This legislation clearly and simply will allow the government to
provide classified information threat signatures to the private sector
and also allow the private sector to share with us the cybersecurity
attacks that they are experiencing, sharing that with the government so
we have better situational awareness. If you look at this, it basically
gives us radar, if you will, in cyberspace, sharing information back
and forth on cyberthreats that are facing the country.
This bill is a good step, but it's only a first step. Voluntary
information-sharing is helpful and it's needed, but it does not, on its
own, constitute strong cybersecurity.
The CHAIR. The time of the gentleman has expired.
Mr. RUPPERSBERGER. I yield the gentleman from Rhode Island 30
additional seconds.
Mr. LANGEVIN. I thank the gentleman for the additional time.
I have long maintained that we must also move forward on legislation
that establishes minimum standards for the cybersystems that govern our
critical infrastructure, particularly the electric grid and our water
systems.
With that, I again want to thank Chairman Rogers and Mr.
Ruppersberger for their outstanding efforts, and I ask my colleagues to
support this important cybersecurity information-sharing legislation.
Mr. ROGERS of Michigan. Madam Chair, I yield 2 minutes to the
gentlewoman from California (Mrs. Bono Mack).
Mrs. BONO MACK. Madam Chair, I rise today in strong support of this
bill. This critically needed legislation will help to safeguard America
in the future from cyberattacks by unscrupulous and rogue nations,
terrorists and cybercriminals. We need to act before a disaster takes
place, not after it, and this is our chance.
As chairwoman of the House Subcommittee on Commerce, Manufacturing
and Trade, I have spent the past 16 months holding hearings and
thoroughly examining the issue of online privacy. So as a cosponsor of
this legislation, I have very carefully reviewed its privacy
provisions, and I'm satisfied that it will not negatively impact
American consumers.
Frankly, the privacy concerns are exaggerated. There is no bogeyman
hiding in the closet, and Big Brother is not tapping into your hard
drive. This bill provides absolutely no authority to the Federal
Government to monitor private networks--none. Additionally, all
information-sharing with the government would be completely voluntary.
The bill also encourages the private sector to ``anonymize'' the
information it shares with the government or other entities,
including--and this is very important to remember--the removal of
personally identifiable information prior to sharing it.
Finally, the bill also requires the intelligence community inspector
general to review information-sharing between the private sector and
the government and to provide an annual report to the Congress on its
findings.
These are very strong privacy protection features, and I applaud
Chairman Rogers and Ranking Member Ruppersberger for working so hard to
protect the American consumer and to make this a truly bipartisan
effort.
Unfortunately, some people and some groups will say anything to try
and scuttle this bill--sounding false alarms and raising imaginary red
flags--despite the very real and dangerous threat posed by terrorists
and our enemies if we do nothing.
Madam Chair, I strongly urge the adoption of H.R. 3523.
Mr. RUPPERSBERGER. I yield 2 minutes to my distinguished colleague
from the State of Georgia (Mr. Johnson).
Mr. JOHNSON of Georgia. Thank you, Ranking Member Ruppersberger.
Madam Chair, I rise in opposition to this very disturbing bill.
One thing that is important to keeping our country number one has
been the personal freedoms that we have all enjoyed since this
country's beginning. Those freedoms lie in the Bill of Rights. And the
Fourth Amendment to the United States Constitution within that Bill of
Rights provides for a right of privacy. Now this right of privacy can
be impacted by technology and various advances in science that make
eavesdropping, surveillance, and investigation easier and also more
secretive by law enforcement, by personal individuals, and by
corporations, by any component that may look to misuse information for
their personal benefit. So I rise in opposition to this disturbing
bill.
CISPA would grant the private sector blanket permission to harvest
Americans' data for extremely broad ``cybersecurity purposes,''
notwithstanding any other provision of law. It would grant the private
sector blanket permission to then share that data with the Federal
Government, notwithstanding any other privacy laws or agreements with
users.
The Acting CHAIR (Mrs. Capito). The time of the gentleman has
expired.
Mr. RUPPERSBERGER. I yield the gentleman an additional 30 seconds.
Mr. JOHNSON of Georgia. Then, as if that weren't disturbing enough,
this bill would grant the government broad authority to share that
information between intelligence and law enforcement agencies and use
it for virtually any purpose defined as important to cybersecurity or
national security.
I know it's 2012, but it sure feels like ``1984'' in this House
today. If you value liberty, privacy, and the Constitution, then you
will vote ``no'' on CISPA.
Mr. ROGERS of Michigan. Madam Chair, I yield 2 minutes to the
gentleman from California (Mr. Nunes).
Mr. NUNES. Madam Chair, I rise in strong support of this bill.
The bill before us today is targeted towards a very specific and
growing threat to our Nation. Every day, American businesses are being
targeted by China, Russia, and other foreign actors for cyber-
exploitation and theft. These acts of industrial espionage are causing
enormous losses of valuable American intellectual property that
ultimately costs the United States jobs. We cannot afford to allow
high-paying jobs to be stolen in this manner, nor can we simply sit by
and allow the cyberwarfare being conducted against us to continue
without consequences.
[[Page H2162]]
Madam Chairman, jobs are at stake, as is the technological capital of
the United States. But if the reality of this economic cyberwarfare
isn't convincing enough, you should understand that there are other
good reasons for us to support this bill.
The state-of-the-art technology stolen from Americans can easily be
turned against us and represents a serious threat to America's critical
infrastructure. None in this body would likely disagree that we have to
prevent our enemies from protecting American military technology.
That's why we have long had export controls and other mechanisms to
prevent such a thing from occurring. Madam Chairman, how is the theft
of intellectual property any less a threat today?
Whether we like it or not, cyberwarfare is a reality. Our government
and its security agencies understand this and are using both classified
and unclassified information to fight the threat. But without passage
of this bill, they are being forced to do so without the meaningful
participation of industries--private industries--that are being
subjected to attacks, that in some cases our government even knows
about but cannot share that with those private companies.
So we shouldn't expect America's private sector innovators to protect
themselves if we won't tell them where the attacks are coming from. If
we don't share this information or allow them to share information with
us, how do we expect to secure the sensitive information?
The Acting CHAIR. The time of the gentleman has expired.
Mr. ROGERS of Michigan. I yield the gentleman from California an
additional 30 seconds.
Mr. NUNES. So we essentially have three choices. We can pass this
bill, very narrowly focused, allowing our intelligence community to
work with private industry, or we can fund a massive new government
program. I think we've proven that those massive new government
programs seldom work and are often costly. Or would the opponents of
this bill simply rather do nothing and allow our country to continue to
be attacked every day?
We need to pass this bill to enable cyberthreat-sharing and provide
clear authority for the private sector to defend its networks.
Madam Chair, I want to close by saying that we should congratulate
Chairman Rogers and Ranking Member Ruppersberger for the work that
they've done to protect this country.
{time} 1510
Mr. RUPPERSBERGER. Madam Chair, I yield 3 minutes to my distinguished
colleague from the State of Oklahoma (Mr. Boren), who is also a member
of the Intelligence Committee. He has worked very closely with me and
the chairman to bring this bill to the floor today, and we thank him
for that.
Mr. BOREN. Madam Chair, I rise today in support of the Cyber
Intelligence Sharing and Protection Act. I'm proud to have been a part
of this bipartisan effort, led by Chairman Rogers and Ranking Member
Ruppersberger, to bring this bill to the floor today.
There is one fact on which everyone can agree: our country must
strengthen its cybersecurity capabilities. To achieve this, we need the
cooperation of industry, government, and our citizens, and we need to
protect the unique interests of each of these groups.
Some may be asking the question, how does this bill protect American
industry? It gives private companies the ability to receive classified
information from the government to protect their networks. The bill
also gives them flexibility to share information with the government
without compromising their business equities or harming their
customers. This information-sharing partnership will enhance government
efforts to analyze and understand malicious codes and other
cyberthreats.
I think companies that have publicly supported this legislation have
gotten a bad rap in the press. I think we all need to remember that
these American companies are not the enemy. They employ thousands of
Americans and provide essential cyberservices to millions of people.
They are profit-making entities that want to satisfy their customers
and grow their businesses. These American companies have absolutely no
motivation to send private customer information to the government or
anyone else. In fact, they have every reason to protect it.
Under this legislation, American companies will enhance their
capability to protect the private information of their customers by
receiving classified assistance from the government. Moreover, they
will help their customers and the country by voluntarily informing the
government of malware and other malicious conduct and threats that
emerge from their networks. But that is not the only way that this bill
protects our citizens' privacy. It restricts the government's use and
retention of any personal information that companies may choose to
share. In addition, it directs the intelligence community inspector
general to monitor and report any abuse of users' privacy.
Finally, we must also remember that the government is not the enemy.
The intelligence community does not want to squander this opportunity
to improve our Nation's cybersecurity by abusing the civil liberties or
privacy of American citizens. To this end, the bill specifies that the
government can only use the information it receives from the private
sector for purposes directly related to addressing cyberthreats,
national security, and threats to life and limb.
In closing, this legislation strikes the appropriate balance between
the interests of the private sector industry, the Federal Government,
and private citizens.
The Acting CHAIR. The time of the gentleman has expired.
Mr. RUPPERSBERGER. I yield the gentleman an additional 30 seconds.
Mr. BOREN. It will help our country avoid a potential
cybercatastrophe that could threaten our national security and endanger
our economic prosperity.
With that, I urge my fellow Members to join me and support this
important bill.
Again, I want to say specifically to our ranking member and our
chairman, thank you for putting the country's interests ahead of
partisan gain. We're working together in this committee, both Democrats
and Republicans, to do what is in the best interest of our intelligence
community and the United States of America.
Mr. RUPPERSBERGER. Madam Chair, may I ask how much time we have on
both sides?
The Acting CHAIR. The gentleman from Maryland has 8 minutes
remaining, and the gentleman from Michigan has 10\1/2\ minutes
remaining.
Mr. ROGERS of Michigan. Madam Chair, I yield 1\1/2\ minutes to the
gentleman from Texas (Mr. Barton).
Mr. BARTON of Texas. I thank the chairman.
The right of the people to be secure in their persons,
houses, papers, and effects, against unreasonable searches
and seizures, shall not be violated, and no Warrants shall
issue, but upon probable cause, supported by Oath or
affirmation, and particularly describing the place to be
searched, and the persons or things to be seized.
My friends, that is the Fourth Amendment to the Constitution, one of
the original 10 in the Bill of Rights protecting, in writing, the
privacy of the United States citizenry.
I want to give Mr. Rogers and Mr. Ruppersberger an ``A'' for effort
in terms of identifying the problem, but I have to give them an ``F''
for problem solution.
The word ``privacy'' in the underlying bill is mentioned one time,
and that in passing. There are no explicit protections for privacy. In
fact, there is an explicit exemption of liability to all people who
engage in the collection, dissemination, transfer, and sharing of
information. The cause of action, if you feel your privacy has been
violated, is to go to district court and prove there was willful and
knowing sharing of your information without your permission. If you
prevail in Federal district court, you get $1,000, or whatever it costs
you.
My friends, we have a real problem. I take the chairman at his word--
he's a former FBI agent--that he wants to solve this cyberthreat. I
know he means it. But until we protect the privacy rights of our
citizens, the solution is worse than the problem that they're trying to
solve.
Please vote ``no'' on this bill.
[[Page H2163]]
Mr. RUPPERSBERGER. Madam Chair, I have no more speakers, and I yield
myself such time as I may consume.
First thing, there were some comments that I would like to respond
to.
First thing, this bill does not allow the wholesale violation of
privacy rights. This bill is extremely important to our national
security, but also important to our citizens of this great country, our
privacy rights, and civil liberties.
The chairman and I have taken this very seriously, as have the
members of our caucus. We know this is not a perfect bill--there will
probably be additional changes. We will have more debate later on this
afternoon.
Now, some of the things I want to address. During the drafting of
this legislation we put forward a wide range of privacy protections. We
worked for the last year with the White House, privacy groups, and
business groups to come to a coalition to make sure that we get this
bill right.
First, the bill severely limits what kind of information can be
shared with the government. Only information directly pertaining to the
threat can be shared, which is mostly formulas, X's and O's of the
virus code. It's almost something that the companies deal with now in
dealing with spam.
Second, the bill encourages companies to voluntarily strip out
personal information that may be associated with these zeroes and ones.
Occasionally, that does occur, and we have to deal with that, and we'll
continue to deal with that issue.
There also are strong use limitations on the data. This information
must be used for cybersecurity purposes or the protection of national
security. The information cannot be used for regulatory purposes. For
example, if there's evidence of tax evasion, that information cannot be
used in a criminal proceeding, only in national security, only in the
areas of life and limb, or for anything involving juvenile crimes.
The bill prohibits the government from requiring the companies to
give information to the government in exchange for receiving the
cyberthreat intelligence. That means that when we pass the information
of the attacks--it's called the secret sauce--to the providers, it's
only voluntarily. The government can't put any restrictions on that
whatsoever. That really means that this is not surveillance at all.
The bill does not allow the government to order you to turn over
private email or other personal information. This is not, again,
surveillance.
The bill does not allow the government to monitor private networks,
read private emails, censor or shut down any Web site. This is not
SOPA.
In an effort to improve the bill even more, the intelligence
community--thank you to the leadership of Chairman Rogers--has been
working with privacy groups, the White House, and other interested
parties to address these concerns with the legislation. We on our side
of the aisle take, again, this issue of privacy very seriously. The
committee has maintained an open door policy and made more changes to
the bill to make it even better as we have gone on up until today.
The legislation grants no new authority to the Department of Defense,
National Security, or the intelligence community that require it to
direct any public or private cybersecurity effort. If the government
violates any of these restrictions placed on it by the legislation, the
government can be sued for damages, costs, and attorneys fees.
I think it is extremely important--we on the Intelligence Committee
deal with these issues every day. This is a very sophisticated area
that we deal with that most people don't know. So we're attempting, and
we have for the last year, to educate as many of our Members as we can.
But it's important to know that national security is clear--our effort
and what we're attempting to do--but also to maintain the privacy, the
constitutional rights of our citizens.
I reserve the balance of my time.
{time} 1520
Mr. ROGERS of Michigan. Madam Chair, I yield 2 minutes to the
distinguished gentleman from Texas (Mr. Thornberry).
Mr. THORNBERRY. Madam Chair, I don't think we can say often enough
how important it is that the chairman and ranking member have worked
together, not only on the substance of this bill, but in the process of
getting us here. They have, truly, put the country's interests first,
and I think all Members should commend them for that.
This was a good bill when it was reported out of committee 17 1. I
think it will be a better bill once the amendments are considered and
adopted. And for any Member who has concerns about privacy or misuse of
information, I think they should look at the amendments that are going
to be adopted; and any reasonable concern, any semi-reasonable concern
about privacy will be addressed with the limitations that those
amendments add.
Madam Chair, this bill does not solve all the problems in
cybersecurity. All four bills that we're considering today and tomorrow
don't solve all the problems we have in cybersecurity. But it makes no
sense to me, as some seem to have argued, that we should not solve this
problem of information-sharing because we're not solving all the
problems that somebody can see out there.
This problem of information-sharing has been central to cybersecurity
concerns for some time. I happened across a report from December 2004
that was issued by a subcommittee I chaired of the Select Committee on
Homeland Security, along with the gentlelady from California (Ms. Zoe
Lofgren), where we wrote: Whether it is vulnerability assessments,
threat warnings, best practices or emergency response, information-
sharing with the private sector is critical to securing the United
States from cyberattack. That was 8 years ago.
Why has it not occurred? Because all the legal obstacles, all the
fear of being sued has prevented it from occurring. And that's what
this bill does. It clears away the legal underbrush that has prevented
the kind of information-sharing that people have been talking about for
a decade.
This is a good, important step. It doesn't solve all the problems,
but it puts more information at the disposal of critical infrastructure
so that they can be protected. It should be adopted.
Mr. RUPPERSBERGER. Madam Chair, I have a speaker on the way.
Mr. Rogers, do you have any more speakers?
Mr. ROGERS of Michigan. I do.
Mr. RUPPERSBERGER. I reserve the balance of my time.
Mr. ROGERS of Michigan. Madam Chair, I yield 2 minutes to the
distinguished gentleman from the great State of Oregon (Mr. Walden).
Mr. WALDEN. I thank the chairman and the ranking member for their
bipartisan and thoughtful approach to this incredibly important issue
facing our country. I support your legislation. I commend you both for
identifying a glaring hole in our cyberdefenses: better information-
sharing between the private sector and the government.
Such sharing is a force multiplier. It combines the technological
strength of our network providers with the ongoing efforts of our
agencies to combat growing cyberthreats. From the get-go, the bill has
protected privacy and civil liberties and ensured that any information-
sharing is voluntary.
I understand Chairman Rogers has also gone the extra mile to reach
out to the privacy community and will be offering and supporting
amendments to address any lingering concerns that may remain from
misunderstandings over the language. Breaking down the barriers to
information-sharing is a linchpin to better cybersecurity, and this
legislation will be a tremendous step forward in securing cyberspace
for our citizens.
But don't take my word for it. That's what cybersecurity firms and
researchers, Internet service providers, and government officials told
the Subcommittee on Communications and Technology, which I chair, in
the three separate hearings that we held. That's what a bipartisan
working group I convened concluded when it interviewed a broad spectrum
of stakeholders in the cybersecurity debate.
By contrast, no matter how well-intentioned, cybersecurity
regulations would likely just expand government, reduce flexibility,
impose costs, misallocate capital, create more red tape and not more
security. According to one government witness, regulating cybersecurity
practices would ``stifle
[[Page H2164]]
innovation and harm the industry's ability to protect consumers from
cyberthreats.''
Indeed, voluntary efforts, not government regulation, are already
improving cybersecurity for communications networks that cover 80
percent of Americans.
When Congress is looking at a complex issue like cybersecurity, we
need to heed the Hippocratic Oath: First, do no harm.
So I want to thank my colleagues for making this process especially
open and transparent. Representative Rogers has graciously reached out
to members of the Energy and Commerce Committee to understand our
concerns about protecting privacy and civil liberties and preventing
regulatory overreach, and Representative Thornberry's work in
organizing the House Republican Cybersecurity Task Force, which
included Representatives Terry and Latta, members of my subcommittee.
The Acting CHAIR. The time of the gentleman has expired.
Mr. ROGERS of Michigan. I yield the gentleman an additional 30
seconds.
Mr. WALDEN. The bottom line is, we're going to protect America from
the greatest threat to America and to Americans with this legislation.
We need to make sure that our private sector is nimble and flexible and
innovative; and tying its hands with prescriptive regulation--we heard
over and over again in our subcommittee hearings--would do the opposite
of that and would result in the bad guys getting an edge on the good
guys.
I support this bipartisan legislation. I urge its passage.
Mr. RUPPERSBERGER. Madam Chair, I yield 2 minutes to my distinguished
colleague from the State of Georgia, Mr. John Lewis, one of the most
respected Members of our Congress.
Mr. LEWIS of Georgia. Madam Chair, I want to thank my friend, the
gentleman from Maryland (Mr. Ruppersberger) for yielding.
Madam Chair, I rise to oppose H.R. 3523. It is a step back.
Those of us who protested in the fifties and the sixties, who were
called Communists, who had our telephone calls recorded, we have a long
memory. We remember our Nation's dark past.
Martin Luther King, Jr.'s telephone was wiretapped. His hotel room
was wiretapped. His home was wiretapped. Our office was wiretapped. Our
meetings were wiretapped. And it was not just people spying on civil
rights activists, but people protesting against the war in Vietnam.
We didn't have a Facebook, a Twitter, or email. These new tools must
be protected. Today we have a mission, a mandate, and a moral
obligation to protect future generations of activists and protestors.
So I say to my colleagues, stand with us today. Stand up and stand on
the right side of history. Oppose H.R. 3523.
Mr. ROGERS of Michigan. Madam Chair, I yield myself 2 minutes.
Lots of misinformation about this bill today. I respect the gentleman
from Georgia greatly for his efforts. I heard the gentleman from Texas
talk about searches and seizures. And this is the good news: there are
none of those things in this bill. None.
You know, if I knew that your house was to be robbed, I would expect
that if the police knew, that they'd pick up the phone and call you and
say, you are going to be robbed. Take precaution. We'll be their
shortly.
This bill just says, if we have this nasty source code, these zeroes
and ones, I want to give it to you so you can protect your systems.
That's it. No monitoring, no content, no surveillance, nothing. That's
not what this bill is about.
I understand the passion about it. That's why we've taken a year to
forge this bipartisan effort to get where we believe privacy is
protected. It is paramount that we do that, that our civil liberties
are protected. It is paramount that we do that.
But we at least take down the hurdle to share nasty source code or
software that's flying through the Internet, that's developed, and it's
very sophisticated, by the Chinese and the Russians and the Iranians
and other groups and non-nation-state actors that are going to steal
your personal information.
That's all this is. It's sharing bad source code so you can put it on
your system so you don't get infected. End of story.
I wish people would read the bill, all of it, every word of it. I
think you'll find the carefully crafted language to make sure that our
rights are protected, that the Fourth Amendment is protected.
And by the way, just like the Army, the Navy, the Marines, your FBI
is protecting you. That's what this bill allows it to do, simply that.
So, as I said, I respect greatly the gentleman from Georgia. There's
a lot of atrocities I think he lived through in his life that no one
should have to live through. We took those things into consideration
when we wrote this bill, and that's why we've got so much support and
so much technical company support, companies like Facebook and
Microsoft and all of those groups.
So I hope people read the bill and support the bill.
I reserve the balance of my time.
{time} 1530
Mr. RUPPERSBERGER. I yield myself such time as I may consume.
In closing, I want to say again that the purpose of this bill, as the
chairman just said, is very basic and simple. We want to protect our
citizens from attacks. We are being attacked as we speak right now.
Just last year, it was estimated we lost $300 billion worth of trade
secrets. We even know that one country is attacking a fertilizer
company to find out how we make it better than they do. This is putting
our businesses in jeopardy and jobs in jeopardy, and we know we sure
need jobs.
More importantly, those of us who work in this field know how serious
these threats are. The head of our FBI, whose responsibility it is to
provide our domestic national security, has said that one of the most
serious threats, if not a bigger threat, in terrorism would be a
catastrophic cyberattack. We've already talked today about what that
would be. We have Secretary Napolitano, the Director of Homeland
Security, who has said the same thing: that it is one of the most
serious issues our country has to deal with. It's unfortunate, but most
of our citizens aren't aware of how serious this threat is.
So we've attempted to allow our intelligence community, which is one
of the best in the world, to have the ability to see these threats
coming in from other countries or from terrorist groups and to be able
right now to give this information over to the private sector to
protect us, you, me, our businesses. That's what this bill does.
Nothing more. What we're attempting to do is to move the bill and get
the bill to the Senate.
We can always do better in the area of privacy and civil liberties,
and we're going to continue to do that. We can always do better in the
area of homeland security and go further to protect those institutions
and our grid systems and that type of thing; but this is the start,
because the one thing that now is stopping our country and is stopping
us from protecting our citizens is this Congress.
This Congress needs to pass this bill now. We need to move forward.
We need to get it to the Senate. We need to start working with the
Senate. Then hopefully we'll deal and work very closely with the White
House and find a bill so that we can protect our citizens and also
protect our civil liberties and privacy.
I also understand Mr. Lewis. We all respect him and what he has gone
through. As a former prosecutor and lawyer who has worked on many
search and seizure warrants and that type of thing, I can tell you
this: there are no violations in this bill at all. That is not what
this bill is about. If it were, I wouldn't be in favor of it.
I thank you, Mr. Rogers, for your cooperation and for working with us
in this bipartisan manner. It is a very serious issue.
I yield back the balance of my time.
Mr. ROGERS of Michigan. I yield myself the balance of my time.
I do want to thank the ranking member and both staffs from both
committees who have been tireless in this effort to get it right and to
find that right place where we could all feel comfortable.
The amendments that are following here are months of negotiation and
work with many organizations--privacy groups. We have worked language
[[Page H2165]]
with the Center for Democracy and Technology, and they just the other
day said they applauded our progress on where we're going with privacy
and civil liberties. So we have included a lot of folks.
It has been a long road. It has been the most open and transparent
bill that, I think, I've ever worked on here. We kept it open to the
very end to make sure that we could find the language that clarified
our intent to protect privacy, to protect civil liberties, and to just
be able to share dangerous information with victims. That's all this
bill is. The whopping 13 pages it is does only that. So I appreciate
the comments today. I look forward to the amendment debate.
Again, Mr. Ruppersberger, it has been a joy to work with you on this
particular issue.
As an old Army officer once told me, once you find a problem, you are
morally obligated to do something about it. We set about it a year ago
to make America safe and to protect your network at home from people
stealing it, breaking it, and doing something worse.
So, Madam Chair, I look forward to the debate on the amendments, and
I yield back the balance of my time.
Mr. CUMMINGS. Madam Chair, although I am voting against the Cyber
Intelligence Sharing and Protection Act of 2011 today, I recommend
Representative C.A. ``Dutch'' Ruppersberger, the Ranking Member of the
House Intelligence Committee, for his efforts to improve the bill
significantly since its passage out of committee. He has been a leader
in protecting our Nation against cyber attacks, and he has gone out of
his way to make this bill as inclusive and bipartisan as possible. I
want to thank him for the time he took to meet with me personally to
discuss this legislation and ways to improve it going forward.
I oppose this bill in its current form for several reasons. First,
the Republicans on the House Rules Committee refused to allow debate on
an amendment offered by Representative Bennie Thompson, the Ranking
Member of the House Committee on Homeland Security, to expand this
legislation to protect our Nation's critical infrastructure.
In testimony before the House Intelligence Committee, then-CIA
Director Leon Panetta called cybersecurity ``the battleground for the
future.'' Our Nation's critical infrastructure--including power
distribution, water supply, telecommunications, and emergency
services--has become increasingly dependent on computerized information
systems to manage their operations and to process, maintain, and report
essential information. Any effort to address this national security
threat must address our Nation's critical infrastructure.
In addition, the legislation includes several provisions that are
problematic. For example, under the information-sharing provisions of
the bill, private entities receive absolute immunity from criminal or
civil liability for any harm that may result from a company's actions
that stem from the sharing or receiving of cyber threat information as
long as the company can show it was acting in good faith.
This bill would also create a new exemption to the Freedom of
Information Act that is unwarranted since current law exemptions
provide the flexibility necessary to protect sensitive information. The
bill would prohibit agencies from disclosing ``cyber threat
information,'' and it would hold the government liable for such
disclosure. Unfortunately, an amendment offered on the floor did not
sufficiently address these concerns.
Finally, the bill would allow companies to share private consumer
data without adequate protections or oversight. Private entities would
decide the type and amount of information to share with the Federal
Government, and nothing in the bill would require companies to strip
out unnecessary personally identifiable information. Again, an
amendment offered on the floor did not go far enough to adequately
address this issue.
I appreciate the great effort that went into pulling this bill
together, but more work is needed before I can offer my support. It is
critical that we protect Americans from cyber attacks, and I hope we
can continue to improve this legislation as we move forward.
Mr. NADLER. Madam Chair, I rise in strong opposition to H.R. 3523,
the Cyber Intelligence Sharing and Protection Act (CISPA).
The main topic this week, as announced by the House Republican
Leadership, is cyber security, a serious issue for our Nation. As we
become more dependent on computers and technology for even common or
routine actions that happen every day, we become at increased risk of
great damage from a cyber attack. Nations or individuals who wish us
harm know that, and so we must be vigilant.
What we are considering today is premised on the idea that greater
information sharing of cyber threats between the government and the
private sector will improve security. While this is a relatively
uncontroversial idea in concept, the bill before us raises a number of
concerns.
It is important to note at the outset that the bill allows companies
to share information, including private e-mails and other Internet
communications, with the government--notwithstanding any other law. So,
protections in existing law, such as the Electronic Communications
Privacy Act (ECPA) and the Wiretap Act, are totally superseded. The
government could get all of your information without a warrant or
subpoena, and you would have little ability, if any, to stop it. Such a
blanket exemption should give us great pause.
Unfortunately, the rest of the bill does not provide sufficient
safeguards to justify this blanket exemption. To begin with, the
definition of the cyber threat information to be shared is very broad.
Suggestions have been made that define what should be included as cyber
threat information in a narrow but sufficient way. These suggestions
were not included in this bill.
At the very least, companies and other entities providing the
government with information should be required to take some reasonable
steps to remove personally identifiable information. Such reasonable
steps need not be overly burdensome, but, again, even this limited
protection was not included.
Once this information was shared with the government, it could be
reviewed and used by any department. The Department of Defense,
National Security Agency, and other defense and intelligence agencies
thus would have access to the private, domestic internet activities of
innocent Americans. This mixing of domestic information with military
entities is dangerous and unprecedented. In fact, our policy has long-
been to keep the military out of such domestic affairs. Information
about cyber security should be limited to the relevant domestic
government bodies, such as the Department of Homeland Security.
The power of government to use the information it receives would also
be tremendously broad. One allowable use for this information is the
hopelessly vague ``national security.'' In the past, the government has
considered peace groups, civil rights activists, and other advocates to
be ``threats'' to national security. It is easy to imagine how this
term could be utilized for all the wrong reasons. The bill is supposed
to be about cyber security, but allowing use of the information
collected for national security purposes does not necessarily serve
that purpose.
Further, the bill makes enforcing even the limited restrictions it
contains difficult. With respect to private entities, as long as they
act ``in good faith,'' they are immune from any civil or criminal case
in state or federal court. This low standard means that any time a
company claims it thought it was following the law, persons harmed by
the improper sharing of information will have no recourse.
The bill does allow for civil actions against government violations.
Unfortunately, the ability to bring a lawsuit against the government,
as provided for in the bill, is deficient in three ways.
First, the bill only would allow lawsuits against the government for
breaches if filed ``not later than two years after the date of the
violation.'' That time period is wholly unworkable, unfair, and
unrealistic.
Second, as written the bill only would impose liability on the
government only for ``intentionally'' or ``willfully'' violating its
restrictions. While this is helpful, such a limited liability scheme
ignores damages arising from negligence. Such negligent acts could
involve the failure to properly protect sensitive information or the
failure to act with due care in deciding what information should be
used.
Lastly, the only remedy is monetary damages. Injunctive relief, which
could force the government to change its practices, is not provided
for.
I filed an amendment with the Rules Committee to solve these three
problems regarding the ability to hold the government accountable. It
was not made in order.
In fact, multiple amendments were filed with the Rules Committee
which would have made significant improvements to this bill. They would
have narrowed its terms, limited how information could be used,
protected personal information, and so on. The Rules Committee chose
not to make them in order. Some of the amendments the House was allowed
to consider will improve the bill, but not enough to sufficiently
protect our privacy and civil liberties.
In closing, I want to reiterate that I recognize the importance of
the issue of cyber security. I agree with the proponents of the bill
that we must improve our cyber security defenses.
But, I remain firmly committed to the notion that we can protect our
security and maintain our liberty, privacy, and freedom. This bill puts
our privacy at great risk, and unnecessarily so. As such, I oppose its
passage and recommend my colleagues do the same.
Mr. RAHALL. Madam Chair, I recognize the need to address the threats
posed to our Nation and the American economy in cyber
[[Page H2166]]
space, but I also believe we must be very careful in maintaining the
appropriate balance between protecting our national security and
preserving our civil liberties.
Given the concerns about this measure and the perceived threat to
sensitive and personal information of American citizens, I believe that
the House should take additional time to deliberate on this measure.
The American public deserves an opportunity to gain a fuller
understanding of the provisions included in this bill and how their
daily lives may be affected by it.
For these reasons, I will oppose the bill.
The Acting CHAIR. All time for general debate has expired.
Pursuant to the rule, the bill shall be considered for amendment
under the 5-minute rule.
In lieu of the amendment in the nature of a substitute recommended by
the Permanent Select Committee on Intelligence, printed in the bill, it
shall be in order to consider as an original bill for the purpose of
amendment under the 5-minute rule an amendment in the nature of a
substitute consisting of the text of Rules Committee print 112 20. That
amendment in the nature of a substitute shall be considered as read.
The text of the amendment in the nature of a substitute is as
follows:
H.R. 3523
Be it enacted by the Senate and House of Representatives of
the United States of America in Congress assembled,
SECTION 1. SHORT TITLE.
This Act may be cited as the ``Cyber Intelligence Sharing
and Protection Act''.
SEC. 2. CYBER THREAT INTELLIGENCE AND INFORMATION SHARING.
(a) In General.--Title XI of the National Security Act of
1947 (50 U.S.C. 442 et seq.) is amended by adding at the end
the following new section:
``cyber threat intelligence and information sharing
``Sec. 1104. (a) Intelligence Community Sharing of Cyber
Threat Intelligence With Private Sector and Utilities.--
``(1) In general.--The Director of National Intelligence
shall establish procedures to allow elements of the
intelligence community to share cyber threat intelligence
with private-sector entities and utilities and to encourage
the sharing of such intelligence.
``(2) Sharing and use of classified intelligence.--The
procedures established under paragraph (1) shall provide that
classified cyber threat intelligence may only be--
``(A) shared by an element of the intelligence community
with--
``(i) certified entities; or
``(ii) a person with an appropriate security clearance to
receive such cyber threat intelligence;
``(B) shared consistent with the need to protect the
national security of the United States; and
``(C) used by a certified entity in a manner which protects
such cyber threat intelligence from unauthorized disclosure.
``(3) Security clearance approvals.--The Director of
National Intelligence shall issue guidelines providing that
the head of an element of the intelligence community may, as
the head of such element considers necessary to carry out
this subsection--
``(A) grant a security clearance on a temporary or
permanent basis to an employee or officer of a certified
entity;
``(B) grant a security clearance on a temporary or
permanent basis to a certified entity and approval to use
appropriate facilities; and
``(C) expedite the security clearance process for a person
or entity as the head of such element considers necessary,
consistent with the need to protect the national security of
the United States.
``(4) No right or benefit.--The provision of information to
a private-sector entity or a utility under this subsection
shall not create a right or benefit to similar information by
such entity or such utility or any other private-sector
entity or utility.
``(5) Restriction on disclosure of cyber threat
intelligence.--Notwithstanding any other provision of law, a
certified entity receiving cyber threat intelligence pursuant
to this subsection shall not further disclose such cyber
threat intelligence to another entity, other than to a
certified entity or other appropriate agency or department of
the Federal Government authorized to receive such cyber
threat intelligence.
``(b) Use of Cybersecurity Systems and Sharing of Cyber
Threat Information.--
``(1) In general.--
``(A) Cybersecurity providers.--Notwithstanding any other
provision of law, a cybersecurity provider, with the express
consent of a protected entity for which such cybersecurity
provider is providing goods or services for cybersecurity
purposes, may, for cybersecurity purposes--
``(i) use cybersecurity systems to identify and obtain
cyber threat information to protect the rights and property
of such protected entity; and
``(ii) share such cyber threat information with any other
entity designated by such protected entity, including, if
specifically designated, the Federal Government.
``(B) Self-protected entities.--Notwithstanding any other
provision of law, a self-protected entity may, for
cybersecurity purposes--
``(i) use cybersecurity systems to identify and obtain
cyber threat information to protect the rights and property
of such self-protected entity; and
``(ii) share such cyber threat information with any other
entity, including the Federal Government.
``(2) Sharing with the federal government.--
``(A) Information shared with the national cybersecurity
and communications integration center of the department of
homeland security.--Subject to the use and protection of
information requirements under paragraph (3), the head of a
department or agency of the Federal Government receiving
cyber threat information in accordance with paragraph (1)
shall provide such cyber threat information to the National
Cybersecurity and Communications Integration Center of the
Department of Homeland Security.
``(B) Request to share with another department or agency of
the federal government.--An entity sharing cyber threat
information that is provided to the National Cybersecurity
and Communications Integration Center of the Department of
Homeland Security under subparagraph (A) or paragraph (1) may
request the head of such Center to, and the head of such
Center may, provide such information to another department or
agency of the Federal Government.
``(3) Use and protection of information.--Cyber threat
information shared in accordance with paragraph (1)--
``(A) shall only be shared in accordance with any
restrictions placed on the sharing of such information by the
protected entity or self-protected entity authorizing such
sharing, including appropriate anonymization or minimization
of such information;
``(B) may not be used by an entity to gain an unfair
competitive advantage to the detriment of the protected
entity or the self-protected entity authorizing the sharing
of information;
``(C) if shared with the Federal Government--
``(i) shall be exempt from disclosure under section 552 of
title 5, United States Code;
``(ii) shall be considered proprietary information and
shall not be disclosed to an entity outside of the Federal
Government except as authorized by the entity sharing such
information;
``(iii) shall not be used by the Federal Government for
regulatory purposes;
``(iv) shall not be provided by the department or agency of
the Federal Government receiving such cyber threat
information to another department or agency of the Federal
Government under paragraph (2)(A) if--
``(I) the entity providing such information determines that
the provision of such information will undermine the purpose
for which such information is shared; or
``(II) unless otherwise directed by the President, the head
of the department or agency of the Federal Government
receiving such cyber threat information determines that the
provision of such information will undermine the purpose for
which such information is shared; and
``(v) shall be handled by the Federal Government consistent
with the need to protect sources and methods and the national
security of the United States; and
``(D) shall be exempt from disclosure under a State, local,
or tribal law or regulation that requires public disclosure
of information by a public or quasi-public entity.
``(4) Exemption from liability.--No civil or criminal cause
of action shall lie or be maintained in Federal or State
court against a protected entity, self-protected entity,
cybersecurity provider, or an officer, employee, or agent of
a protected entity, self-protected entity, or cybersecurity
provider, acting in good faith--
``(A) for using cybersecurity systems or sharing
information in accordance with this section; or
``(B) for decisions made based on cyber threat information
identified, obtained, or shared under this section.
``(5) Relationship to other laws requiring the disclosure
of information.--The submission of information under this
subsection to the Federal Government shall not satisfy or
affect any requirement under any other provision of law for a
person or entity to provide information to the Federal
Government.
``(c) Federal Government Use of Information.--
``(1) Limitation.--The Federal Government may use cyber
threat information shared with the Federal Government in
accordance with subsection (b) for any lawful purpose only
if--
``(A) the use of such information is not for a regulatory
purpose; and
``(B) at least one significant purpose of the use of such
information is--
``(i) a cybersecurity purpose; or
``(ii) the protection of the national security of the
United States.
``(2) Affirmative search restriction.--The Federal
Government may not affirmatively search cyber threat
information shared with the Federal Government under
subsection (b) for a purpose other than a purpose referred to
in paragraph (1)(B).
``(3) Anti-tasking restriction.--Nothing in this section
shall be construed to permit the Federal Government to--
``(A) require a private-sector entity to share information
with the Federal Government; or
``(B) condition the sharing of cyber threat intelligence
with a private-sector entity on the provision of cyber threat
information to the Federal Government.
``(d) Federal Government Liability for Violations of
Restrictions on the Disclosure, Use, and Protection of
Voluntarily Shared Information.--
``(1) In general.--If a department or agency of the Federal
Government intentionally or willfully violates subsection
(b)(3)(C) or subsection
[[Page H2167]]
(c) with respect to the disclosure, use, or protection of
voluntarily shared cyber threat information shared under this
section, the United States shall be liable to a person
adversely affected by such violation in an amount equal to
the sum of--
``(A) the actual damages sustained by the person as a
result of the violation or $1,000, whichever is greater; and
``(B) the costs of the action together with reasonable
attorney fees as determined by the court.
``(2) Venue.--An action to enforce liability created under
this subsection may be brought in the district court of the
United States in--
``(A) the district in which the complainant resides;
``(B) the district in which the principal place of business
of the complainant is located;
``(C) the district in which the department or agency of the
Federal Government that disclosed the information is located;
or
``(D) the District of Columbia.
``(3) Statute of limitations.--No action shall lie under
this subsection unless such action is commenced not later
than two years after the date of the violation of subsection
(b)(3)(C) or subsection (c) that is the basis for the action.
``(4) Exclusive cause of action.--A cause of action under
this subsection shall be the exclusive means available to a
complainant seeking a remedy for a violation of subsection
(b)(3)(C) or subsection (c).
``(e) Report on Information Sharing.--
``(1) Report.--The Inspector General of the Intelligence
Community shall annually submit to the congressional
intelligence committees a report containing a review of the
use of information shared with the Federal Government under
this section, including--
``(A) a review of the use by the Federal Government of such
information for a purpose other than a cybersecurity purpose;
``(B) a review of the type of information shared with the
Federal Government under this section;
``(C) a review of the actions taken by the Federal
Government based on such information;
``(D) appropriate metrics to determine the impact of the
sharing of such information with the Federal Government on
privacy and civil liberties, if any;
``(E) a review of the sharing of such information within
the Federal Government to identify inappropriate stovepiping
of shared information; and
``(F) any recommendations of the Inspector General for
improvements or modifications to the authorities under this
section.
``(2) Form.--Each report required under paragraph (1) shall
be submitted in unclassified form, but may include a
classified annex.
``(f) Federal Preemption.--This section supersedes any
statute of a State or political subdivision of a State that
restricts or otherwise expressly regulates an activity
authorized under subsection (b).
``(g) Savings Clauses.--
``(1) Existing authorities.--Nothing in this section shall
be construed to limit any other authority to use a
cybersecurity system or to identify, obtain, or share cyber
threat intelligence or cyber threat information.
``(2) Limitation on military and intelligence community
involvement in private and public sector cybersecurity
efforts.--Nothing in this section shall be construed to
provide additional authority to, or modify an existing
authority of, the Department of Defense or the National
Security Agency or any other element of the intelligence
community to control, modify, require, or otherwise direct
the cybersecurity efforts of a private-sector entity or a
component of the Federal Government or a State, local, or
tribal government.
``(3) Information sharing relationships.--Nothing in this
section shall be construed to--
``(A) limit or modify an existing information sharing
relationship;
``(B) prohibit a new information sharing relationship;
``(C) require a new information sharing relationship
between the Federal Government and a private-sector entity;
or
``(D) modify the authority of a department or agency of the
Federal Government to protect sources and methods and the
national security of the United States.
``(h) Definitions.--In this section:
``(1) Certified entity.--The term `certified entity' means
a protected entity, self-protected entity, or cybersecurity
provider that--
``(A) possesses or is eligible to obtain a security
clearance, as determined by the Director of National
Intelligence; and
``(B) is able to demonstrate to the Director of National
Intelligence that such provider or such entity can
appropriately protect classified cyber threat intelligence.
``(2) Cyber threat information.--The term `cyber threat
information' means information directly pertaining to a
vulnerability of, or threat to, a system or network of a
government or private entity, including information
pertaining to the protection of a system or network from--
``(A) efforts to degrade, disrupt, or destroy such system
or network; or
``(B) efforts to gain unauthorized access to a system or
network, including efforts to gain such unauthorized access
to steal or misappropriate private or government information.
``(3) Cyber threat intelligence.--The term `cyber threat
intelligence' means information in the possession of an
element of the intelligence community directly pertaining to
a vulnerability of, or threat to, a system or network of a
government or private entity, including information
pertaining to the protection of a system or network from--
``(A) efforts to degrade, disrupt, or destroy such system
or network; or
``(B) efforts to gain unauthorized access to a system or
network, including efforts to gain such unauthorized access
to steal or misappropriate private or government information.
``(4) Cybersecurity provider.--The term `cybersecurity
provider' means a non-governmental entity that provides goods
or services intended to be used for cybersecurity purposes.
``(5) Cybersecurity purpose.--The term `cybersecurity
purpose' means the purpose of ensuring the integrity,
confidentiality, or availability of, or safeguarding, a
system or network, including protecting a system or network
from--
``(A) efforts to degrade, disrupt, or destroy such system
or network; or
``(B) efforts to gain unauthorized access to a system or
network, including efforts to gain such unauthorized access
to steal or misappropriate private or government information.
``(6) Cybersecurity system.--The term `cybersecurity
system' means a system designed or employed to ensure the
integrity, confidentiality, or availability of, or safeguard,
a system or network, including protecting a system or network
from--
``(A) efforts to degrade, disrupt, or destroy such system
or network; or
``(B) efforts to gain unauthorized access to a system or
network, including efforts to gain such unauthorized access
to steal or misappropriate private or government information.
``(7) Protected entity.--The term `protected entity' means
an entity, other than an individual, that contracts with a
cybersecurity provider for goods or services to be used for
cybersecurity purposes.
``(8) Self-protected entity.--The term `self-protected
entity' means an entity, other than an individual, that
provides goods or services for cybersecurity purposes to
itself.
``(9) Utility.--The term `utility' means an entity
providing essential services (other than law enforcement or
regulatory services), including electricity, natural gas,
propane, telecommunications, transportation, water, or
wastewater services.''.
(b) Procedures and Guidelines.--The Director of National
Intelligence shall--
(1) not later than 60 days after the date of the enactment
of this Act, establish procedures under paragraph (1) of
section 1104(a) of the National Security Act of 1947, as
added by subsection (a) of this section, and issue guidelines
under paragraph (3) of such section 1104(a);
(2) in establishing such procedures and issuing such
guidelines, consult with the Secretary of Homeland Security
to ensure that such procedures and such guidelines permit the
owners and operators of critical infrastructure to receive
all appropriate cyber threat intelligence (as defined in
section 1104(h)(3) of such Act, as added by subsection (a))
in the possession of the Federal Government; and
(3) following the establishment of such procedures and the
issuance of such guidelines, expeditiously distribute such
procedures and such guidelines to appropriate departments and
agencies of the Federal Government, private-sector entities,
and utilities (as defined in section 1104(h)(9) of such Act,
as added by subsection (a)).
(c) Initial Report.--The first report required to be
submitted under subsection (e) of section 1104 of the
National Security Act of 1947, as added by subsection (a) of
this section, shall be submitted not later than one year
after the date of the enactment of this Act.
(d) Table of Contents Amendment.--The table of contents in
the first section of the National Security Act of 1947 is
amended by adding at the end the following new item:
``Sec. 1104. Cyber threat intelligence and information sharing.''.
The Acting CHAIR. No amendment to that amendment in the nature of a
substitute shall be in order except those printed in House Report 112
454. Each such amendment may be offered only in the order printed in
the report, by a Member designated in the report, shall be considered
as read, shall be debatable for the time specified in the report
equally divided and controlled by the proponent and an opponent, shall
not be subject to amendment, and shall not be subject to a demand for
division of the question.
Amendment No. 1 Offered by Mr. Langevin
The Acting CHAIR. It is now in order to consider amendment No. 1
printed in House Report 112 454.
Mr. LANGEVIN. I have an amendment at the desk.
The Acting CHAIR. The Clerk will designate the amendment.
The text of the amendment is as follows:
Page 1, line 13, strike ``Utilities'' and insert ``Critical
Infrastructure Owners and Operators''.
Page 2, line 1, strike ``utilities'' and insert ``critical
infrastructure owners and operators''.
Page 3, line 13, strike ``utility'' and insert ``critical
infrastructure owner or operator''.
Page 3, line 16, strike ``utility'' each place it appears
and insert ``critical infrastructure owner or operator''.
Page 17, strike lines 12 through 16.
The Acting CHAIR. Pursuant to House Resolution 631, the gentleman
from Rhode Island (Mr. Langevin) and a Member opposed each will control
5 minutes.
The Chair recognizes the gentleman from Rhode Island.
Mr. LANGEVIN. Madam Chair, I yield myself such time as I may consume.
[[Page H2168]]
The bill that we are considering today creates a voluntary
information-sharing network, which could provide owners and operators
of critical infrastructure with valuable threat information that would
help them to secure their networks from cyberattacks.
Unfortunately, the legislation specifies that it applies only to
``private sector entities and utilities.'' While ``utilities'' is
defined extremely broadly in the legislation as any entity that
provides ``essential services,'' including telecommunications and
transportation providers, there remains the possibility that the
definition may exclude pieces of our critical infrastructure that have
significant cybervulnerabilities.
My amendment, which I am offering with my good friend Mr. Lungren
from California, strikes the uses of the word ``utilities'' and
replaces it in each instance with the phrase ``critical infrastructure
owners and operators.'' This is a commonsense way to avoid potential
confusion and to eliminate any possibility that critical entities could
be denied the opportunity to opt into this voluntary information-
sharing framework and thereby share and receive the valuable classified
threat information that will be available under CISPA.
This amendment will not significantly expand the scope of the
legislation, but instead will help prevent interpretations of language
that could be contrary to the committee's intent, which I believe is
the same as mine.
Now, while I recognize that any regulation of critical infrastructure
would be outside the Intelligence Committee's jurisdiction, I
nonetheless want to take this opportunity to voice my strong conviction
that our efforts must not stop with the legislation that we are
considering this week.
Just as the airline industry must follow Federal Aviation
Administration safety standards, the companies that own and operate the
infrastructure on which the public most relies should be accountable
for protecting their consumers when confronted with a significant risk.
I, along with many Members on both sides of the aisle and experts
within and outside of government, have come to the same basic
conclusion: the status quo of voluntary action will not result in
strong cyberprotections for our most valuable and vulnerable
industries. The Secretary of Homeland Security emphasized last week
that our critical infrastructure control systems, which are mainly in
private hands, must come up to a certain baseline level in
cybersecurity standards.
With increased public awareness helping to build momentum for
legislative action, we have a real chance to address these threats. I
hope that we will not look back on this moment years from now,
regretting a missed opportunity after the damage has been done. While
the amendment we are offering today will not by itself provide the
protections that Mr. Lungren and I ultimately believe are necessary for
our critical infrastructure, it is a useful first step, and I am
thankful to Mr. Lungren for joining me in this effort.
With that, Madam Chair, I reserve the balance of my time.
Mr. ROGERS of Michigan. I rise in opposition to the amendment.
The Acting CHAIR. The gentleman is recognized for 5 minutes.
Mr. ROGERS of Michigan. I want to first compliment Mr. Langevin for
working with us on the cybersecurity bill. He has been an instrumental
force in pushing this cybersecurity issue to the front and in getting
the language that we have that finds that right balance.
My concern with this, which is why I thought, at least, the
President's advisers who were recommending to him that he veto the bill
were misguided, is that now we have done something in this bill that is
fairly unique. It is all voluntary, and we have separated the
government and the private sector. The government is not going to be
involved in private sector networks, and they're not going to be
involved in the government networks. Perfect. That's exactly the
balance we found.
With this, it crosses both of those, and it gets us to a place that I
think we need to have a lot more discussion on, and you can see by the
level of debate just on this issue how people are really nervous about
the Federal Government getting into their business.
{time} 1540
This, I'm afraid, opens it up to that. Here's the good news. We
believe this is already covered in the bill as far as the sharing
component, and you replace the word ``utility'' with something that
isn't defined, ``critical infrastructure, owners and operators.'' We're
not sure what that is, and in some cases you could extrapolate that to
be even the local police, who argue they're part of the national
security infrastructure. Does that mean local police are going to get
very sensitive foreign cyberintelligence information? And why would
they have it? We don't know the answers to those questions, and that's
why we're having such a hard time with this amendment.
I would argue that there does need to be a Homeland Security bill,
and it really shouldn't be done in the Intelligence Committee. It
should be done in the Homeland Security Committee.
So I would love to work with Mr. Langevin as the process works its
way through the Homeland Security Committee and believe that that
should be fully debated.
Remember, when you start getting regulation into the private sector,
including private networks, that, I argue, is troublesome and very
worrisome to me, and something I would have a hard time supporting.
So, I look forward to working with the gentleman. I would have to
oppose this amendment, but I want to thank you for all your work on the
cyberissue and, clearly, this cyber information-sharing bill.
I reserve the balance of my time.
Mr. LANGEVIN. I thank the chairman of the Intelligence Committee for
his thoughts. I respectfully disagree. The word ``utilities'' is
important, but I believe ``critical infrastructure,'' out of an
abundance of caution, is a better term than ``utilities''.
How much time do I have, Madam Chair?
The Acting CHAIR. The gentleman has 2 minutes remaining.
Mr. LANGEVIN. I yield 1\1/2\ minutes to the distinguished chairman on
the Department of Homeland Security Committee, the gentleman from
California (Mr. Daniel E. Lungren).
Mr. DANIEL E. LUNGREN of California. I think the amendment is quite
simple. As written, the bill allows for information to be shared with
the private sector and utilities, but there are those that do not fall
within that that I think we would all agree should be able to have this
relationship.
Our amendment would have the simple effect of including those
elements such as airport authorities, mass transit authorities, or
municipal hospitals, which are neither private sector nor utilities, to
be able to participate in this voluntary information-sharing regime.
I find it odd to find out that the committee is worried about the
definition of ``critical infrastructure.'' That has been defined in the
U.S. Code for over a decade. It is in the language in 42 U.S.C. 5195c,
the Critical Infrastructure Protection Act of 2001, which defines
critical infrastructure as:
Systems or assets, whether physical or virtual, so vital to
the United States that the incapacity or destruction of such
systems and assets would have a debilitating impact on
security, national economic security, national public health
or safety, or any combination of those matters.
That has been the definition that we have supported. That's been the
definition that we've worked on. Your committee, our committee, all
committees have. I find this a very simple amendment that tries to
reach what we are all trying to reach. It does not grant any more
authority to the Federal Government. It allows for the sharing of
information to vital entities, as the gentleman has suggested, that we
would all agree ought to be there.
I would hope that pride of authorship is not the problem here. We're
trying to do something that we think makes common sense. And if folks
have trouble with the definition of critical infrastructure, you would
have thought it would have been raised in the last decade.
The Acting CHAIR. The time of the gentleman has expired.
Mr. LANGEVIN. I yield the gentleman an additional 15 seconds.
Mr. DANIEL E. LUNGREN of California. I would hope that we could have
support for this bipartisan amendment brought forward by the gentleman
who
[[Page H2169]]
serves on the Intelligence Committee. I serve on the Homeland Security
Committee. I'm chairman of the Subcommittee on Cybersecurity.
It seems to me to make imminent sense. I do not understand why there
is some opposition to this amendment. I thank the gentleman.
Mr. ROGERS of Michigan. How much time do I have remaining?
The Acting CHAIR. The gentleman has 3 minutes remaining.
Mr. ROGERS of Michigan. I would just remind the gentleman that the
definition does not go back anywhere in this bill to that. It leaves it
open, and when you start, again, crossing that valley between the
government and the private sector, it causes serious issues--as you can
see, the people who are very concerned that the government is going to
get into regulating anything on the Internet.
I would say this is no pride of authorship. I don't know if Mr.
Ruppersberger and I could have any more authors participate in our bill
than we have.
The problem here is very real and very substantive. And that's why I
think both the gentlemen, who have as much passion and care and
commitment to this issue as I've seen, need to work that issue on the
Homeland Security Committee so you can do it in a way that won't rise
to the level of the objections that we have seen when just the
suggestion of regulating outside of the purview of national security
comes into discussion.
That's why I would hope the gentleman would exercise extreme caution
when taking that walk. It is perilous for the government to get into
regulating the Internet, and I oppose that completely. That's why we
have these problems, I think, arise from it. I think, if these are
issues that they can get over, that this should have substantive
debate. Remember, this very narrow bill took 1 year--1 year--of work
and negotiation and discussions to get it to where we are today.
So, I would encourage that maybe more thought ought to be put in it,
and I would look forward to working with both gentleman as they
introduce and work their bills through the Homeland Security Committee,
as I think would be appropriate.
I reserve the balance of my time.
Mr. LANGEVIN. Again, I thank the chairman of the Intelligence
Committee for his thoughts. I want to be very clear that this term
substituting ``critical infrastructure'' for ``utilities'' does not
lend to regulating critical infrastructure. It just allows for the
broadest possible definition of information-sharing among those
entities that are deemed to be critical infrastructure.
With that, I thank Chairman Lungren for his support of this
bipartisan amendment, and I yield back the balance of my time.
Mr. ROGERS of Michigan. I yield back the balance of my time.
The Acting CHAIR. The question is on the amendment offered by the
gentleman from Rhode Island (Mr. Langevin).
The question was taken; and the Acting Chair announced that the noes
appeared to have it.
Mr. LANGEVIN. Madam Chair, I demand a recorded vote.
The Acting CHAIR. Pursuant to clause 6 of rule XVIII, further
proceedings on the amendment offered by the gentleman from Rhode Island
will be postponed.
The Chair understands that amendment No. 2 will not be offered.
Amendment No. 3 Offered by Mr. Pompeo
The Acting CHAIR. It is now in order to consider amendment No. 3
printed in House Report 112 454.
Mr. POMPEO. I have an amendment at the desk.
The Acting CHAIR. The Clerk will designate the amendment.
The text of the amendment is as follows:
Page 8, beginning on line 18, strike ``or sharing
information'' and insert ``to identify or obtain cyber threat
information or for sharing such information''.
The Acting CHAIR. Pursuant to House Resolution 631, the gentleman
from Kansas (Mr. Pompeo) and a Member opposed each will control 5
minutes.
The Chair recognizes the gentleman from Kansas.
Mr. POMPEO. I want to thank Chairman Rogers and Chairman
Ruppersberger for their hard work on this important piece of
legislation. I am among those folks who, when I first learned of this
legislation, had some concerns to make sure that it was balanced and it
did the right things. Also as a former Army officer, I recognize the
deep national security implications of the cyberthreat, but I also
wanted to make sure that we also did everything that was necessary to
protect everyone's privacy rights.
This is a simple amendment. It makes clear that the liability
protection in the bill with respect to the use of such systems only
extends to the identification and acquisition of cyberthreat
information and no further.
This is an unprecedented threat from countries like China and Russia.
These are hostile nations, and they're committing resources,
unprecedented resources, to attack U.S. networks each and every minute
of every day. While this new threat is being developed by our foreign
enemies, organized criminals and foreign hackers also just as easily
deploy malicious cyberattacks to disrupt stock markets, transportation
networks, businesses, governments, and even our military operations.
A devastating cyberattack could easily be unleashed from the remote
comfort of enemies' computers thousands of miles away from our Nation.
We must take this threat very, very seriously.
Part of the challenge in cyberspace is that a line of computer code
could be just as deadly as a traditional military weapon. We've already
seen these attacks used as an instrument of war. In 2008, Georgia
suffered a significant cyberattack prior to the invasion by Russia.
This attack crippled Georgia's banking system and disrupted the
nation's cell phone services, helping to clear the battlefield for the
invading Russians.
Perhaps the most significant dangerous activity in cyberspace even
goes unnoticed. Cyberspies lay in wait for years in order to eventually
steal precious military and economic secrets. Each of these examples
further illustrates the need for legislation. Unfortunately, some civil
liberties and privacy advocates claim that liability protection in this
bill with respect to the use of cybersecurity systems could lead to
broader activities than authorized.
This legislation doesn't do that, but my amendment simply provides
clarifying language to the original language of the bill, and thus
enjoys the support of bipartisan cosponsors of the legislation, as well
as the outside groups that raise these concerns.
Madam Chair, I urge approval of this amendment.
With that, I reserve the balance of my time.
The Acting CHAIR. Does any Member seek time in opposition?
Mr. POMPEO. I yield as much time as he may consume to the gentleman
from Michigan (Mr. Rogers), the chairman of the Intelligence Committee.
{time} 1550
Mr. ROGERS of Michigan. I want to thank Mr. Pompeo for working with
us. This was an amendment negotiated with Mr. Ruppersberger and myself
and Mr. Pompeo to clearly define the intention of the bill, and I think
it offers protections. I think we should all strongly support Mr.
Pompeo's amendment.
Mr. POMPEO. Madam Chair, I yield back the balance of my time.
The Acting CHAIR. The question is on the amendment offered by the
gentleman from Kansas (Mr. Pompeo).
The amendment was agreed to.
amendment no. 4 offered by mr. rogers of michigan
The Acting CHAIR. It is now in order to consider amendment No. 4
printed in House Report 112 454.
Mr. ROGERS of Michigan. I have an amendment at the desk, Madam Chair.
The Acting CHAIR. The Clerk will designate the amendment.
The text of the amendment is as follows:
Page 9, beginning on line 2, strike ``affect any'' and
insert ``affect--''.
Page 9, strike lines 3 through 5 and insert the following:
``(A) any requirement under any other provision of law for
a person or entity to provide information to the Federal
Government; or
``(B) the applicability of other provisions of law,
including section 552 of title 5, United
[[Page H2170]]
States Code (commonly known as the `Freedom of Information
Act'), with respect to information required to be provided to
the Federal Government under such other provision of law.
The Acting CHAIR. Pursuant to House Resolution 631, the gentleman
from Michigan (Mr. Rogers) and a Member opposed each will control 5
minutes.
The Chair recognizes the gentleman from Michigan.
Mr. ROGERS of Michigan. Madam Chair, I strongly encourage the support
of this amendment. It's a simple amendment we negotiated. It is
clarifying language again on FOIA.
With that, I yield such time as he may consume to the gentleman from
California (Mr. Issa).
Mr. ISSA. I thank the gentleman for yielding. Hopefully there will be
time left over also for Mr. Chaffetz, who has worked hard on this
amendment.
I want to thank the chairman for working with our committee on this
amendment that clarifies in the Cyber Intelligence Sharing and
Protection Act that FOIA, the Freedom of Information Access Act, is in
fact clearly in effect for the vast majority of this information.
We understand that companies--I will just take an example--such as
electric utility companies may share their very vulnerabilities as a
part of a process to reduce or eliminate these vulnerabilities. We
certainly understand that that's not FOIAable. National security is not
FOIAable. However, we, in this amendment, ensure that everything is at
least possibly FOIAable whenever it would be appropriate, and then the
only question is does it stand for one of the exclusions. So by making
it narrow, we tell the American people that the Freedom of Information
Act is in effect on cybersecurity and will not be unreasonably
withheld.
I think this is critical at a time when greater transparency is the
promise and there is a great deal of concern about cybersecurity
somehow being something that would take away America's freedoms. Just
the opposite is true. Our freedom of the Internet, our freedom to have
an effective and efficient system on which to build our infrastructure
both for electricity and other utilities, but also for our everyday
life, essentially requires the kind of cooperation that we anticipate.
Mr. RUPPERSBERGER. Madam Chair, I claim time in opposition to the
amendment; however, I do not oppose the amendment.
The Acting CHAIR. Without objection, the gentleman from Maryland is
recognized for 5 minutes.
There was no objection.
Mr. RUPPERSBERGER. I agree with Mr. Issa's comments. This is a joint
amendment of Mr. Rogers and me. The amendment would make it clear that
while FOIA exemption protects information obtained under the bill,
regulatory information required by other authorities remains subject to
FOIA requests.
The chairman and I agree the law should not create a broad change.
The type of information that is available under the Freedom of
Information Act, we have a responsibility to protect classified
information from disclosure, but we also understand the need to keep
information open to the public. The amendment makes clear that
information available under other authorities remains subject to FOIA,
and I urge all Members to support this bipartisan amendment.
Mr. CHAFFETZ. Will the gentleman yield?
Mr. RUPPERSBERGER. I yield to the gentleman from Utah.
Mr. CHAFFETZ. I thank the gentleman for yielding.
I appreciate the bipartisan nature in which this is moving forward. I
appreciate specifically Chairman Rogers, Chairman Issa, and the ranking
member.
I stand in support of this amendment. I think FOIA is a very
important principle we have in this, and this just strengthens that.
I would also say, Madam Chair, that I was opposed to SOPA. I was
adamantly opposed to this. But this bill in particular is desperately
needed in this country. Cybersecurity is a very real threat, and this
bill is something that is needed in this country. I think it is strong
in its Fourth Amendment protections. I think it's appropriate for this
Nation to do this. We need to make sure that we're smart in how we
advance.
There have been some much-needed amendments that were adopted. But
again, the bill, as we see it moving forward, I think, will strengthen
cybersecurity in this country, and I'm proud of the fact that Chairman
Rogers is bringing this bill to the floor.
I urge the support of this amendment and the underlying bill.
Mr. ROGERS of Michigan. Madam Chair, I yield back the balance of my
time.
Mr. RUPPERSBERGER. I yield back the balance of my time.
The Acting CHAIR. The question is on the amendment offered by the
gentleman from Michigan (Mr. Rogers).
The question was taken; and the Acting Chair announced that the ayes
appeared to have it.
Mr. RUPPERSBERGER. Madam Chair, I demand a recorded vote.
The Acting CHAIR. Pursuant to clause 6 of rule XVIII, further
proceedings on the amendment offered by the gentleman from Michigan
will be postponed.
It is now in order to consider amendment No. 5 printed in House
Report 112 454.
Amendment No. 6 Offered by Mr. Quayle
The Acting CHAIR. It is now in order to consider amendment No. 6
printed in House Report 112 454.
Mr. QUAYLE. Madam Chair, I have an amendment at the desk.
The Acting CHAIR. The Clerk will designate the amendment.
The text of the amendment is as follows:
Page 9, strike lines 8 through 18 and insert the following:
``(1) Limitation.--The Federal Government may use cyber
threat information shared with the Federal Government in
accordance with subsection (b)--
``(A) for cybersecurity purposes;
``(B) for the investigation and prosecution of
cybersecurity crimes;
``(C) for the protection of individuals from the danger of
death or serious bodily harm and the investigation and
prosecution of crimes involving such danger of death or
serious bodily harm;
``(D) for the protection of minors from child pornography,
any risk of sexual exploitation, and serious threats to the
physical safety of such minor, including kidnapping and
trafficking and the investigation and prosecution of crimes
involving child pornography, any risk of sexual exploitation,
and serious threats to the physical safety of minors,
including kidnapping and trafficking, and any crime referred
to in 2258A(a)(2) of title 18, United States Code; or
``(E) to protect the national security of the United
States.
Page 16, before line 1 insert the following:
``(4) Cybersecurity crime.--The term `cybersecurity crime'
means--
``(A) a crime under a Federal or State law that involves--
``(i) efforts to degrade, disrupt, or destroy a system or
network;
``(ii) efforts to gain unauthorized access to a system or
network; or
``(iii) efforts to exfiltrate information from a system or
network without authorization; or
``(B) the violation of a provision of Federal law relating
to computer crimes, including a violation of any provision of
title 18, United States Code, created or amended by the
Computer Fraud and Abuse Act of 1986 (Public Law 99 474).''.
The Acting CHAIR. Pursuant to House Resolution 631, the gentleman
from Arizona (Mr. Quayle) and a Member opposed each will control 5
minutes.
The Chair recognizes the gentleman from Arizona.
Mr. QUAYLE. Madam Chair, I yield myself such time as I may consume.
I appreciate the opportunity to speak in favor of this bipartisan
amendment that I'm offering along with Congresswoman Eshoo, Congressman
Thompson, and Congressman Broun.
H.R. 3523 is designed to increase the sharing of government
intelligence and cyberthreats with the private sector and allow private
sector companies to share threat information on a voluntary basis. The
bill is consistent with our founding principles and our Constitution.
Indeed, as the nature of the threats facing our Nation change, I
believe this legislation is vital to protecting our country.
Every day our military intelligence communities work to counter
traditional threats like nuclear and biological weapons in order to
prevent a catastrophic attack on U.S. soil, but today's security
threats are becoming less traditional. Four nations have chosen
cyberspace as an area of particular
[[Page H2171]]
vulnerability for America and are targeting critical military and
economic cyberinfrastructure.
Admiral Mike Mullen, the former Chairman of the Joint Chiefs of
Staff, lists cyberattacks as one of the top threats facing the United
States. Secretary of Defense and former CIA Director Leon Panetta
warned that the next Pearl Harbor we confront could very well be a
cyberattack that cripples our power systems, our grid, our security
systems, our financial systems, our governmental systems.
This legislation not only protects our national security and
intellectual property, it also provides private and public entities to
voluntarily work with the government to protect every individual's
personal information from nation-state actors like China, Russia, and
Iran, who are determined to use cyberattacks to steal from us and
weaken us.
{time} 1600
This bipartisan amendment will further solidify protecting the
homeland from foreign nation-states wishing to do us harm, while
protecting civil liberties.
This amendment significantly narrows the bill's current limitation of
the Federal Government's use of cyberthreat information that is
voluntarily shared by the private sector. Specifically, this amendment
strictly limits the Federal Government's use of voluntarily shared
cyberthreat information to the following five purposes: cybersecurity
purposes; investigation and prosecution of cybersecurity crimes;
protection of individuals from danger of death or serious bodily harm;
and protection of minors from child pornography, any risk of sexual
exploitation, and serious threats to the physical safety of a minor;
finally, protection of the national security of the United States.
If the government violates the use limitation, the bill provides for
government liability for actual damages, costs, and attorney fees in
Federal court. These provisions together ensure that information cannot
be shared with the government or used under this bill unless there's a
direct tie to cybersecurity.
Cyberterrorists work fast, so Congress needs to work faster to
protect America. Enabling information-sharing between the government
and private sector is the quickest and easiest way to prevent a
cyberattack on our Nation. Our amendment ensures we can accomplish this
goal while also protecting the privacy of all Americans, and I urge my
colleagues to support it.
Mr. RUPPERSBERGER. I rise to claim time in opposition, but I do not
oppose the amendment.
The Acting CHAIR. Without objection, the gentleman from Maryland is
recognized for 5 minutes.
There was no objection.
Mr. RUPPERSBERGER. I yield to the gentleman from California (Mr.
Thompson). He is on the Intelligence Committee and also a sponsor of
this amendment.
Mr. THOMPSON of California. I thank the gentleman for yielding.
Madam Chair, I rise in support of the Thompson-Eshoo-Quayle-Broun
amendment to this bill. The threat of a devastating cyberattack is real
and cannot be understated. I believe the Federal Government and private
companies need to work together to protect our national and economic
security. But in doing so, we still have a responsibility to protect
the constitutional rights of law-abiding citizens.
I'm concerned that the underlying bill is drafted in a way where
consumer information could be shared too broadly and used in ways
unrelated to combating cybersecurity threats. The Thompson-Eshoo-
Quayle-Broun amendment will tighten the bill's limitation on the
Federal Government's use of cyberthreat information shared under this
legislation. Specifically, our amendment will limit the Federal
Government's use of shared information only for cybersecurity purposes,
for the investigation and prosecution of cybersecurity crimes, to
protect against the threat of imminent harm, and protect our country's
national security.
This bill, even with our amendment, isn't perfect. As this
legislation moves forward, I expect the word of the chairman to be
honored when he says that our committee will work together to further
protect personal information and limit its use. For example, further
narrowing terms in this bill, such as ``to protect the national
security of the United States,'' will be necessary, I believe, to fully
protect our civil liberties.
Mr. QUAYLE. I yield 30 seconds to the chairman of the Intelligence
Committee, Mr. Rogers.
Mr. ROGERS of Michigan. Thank you, Mr. Quayle.
Again, this is an amendment worked out with Mr. Ruppersberger, Mr.
Thompson, Mr. Quayle, and myself. Ms. Eshoo is also on the amendment.
This is in consultation with all of the privacy groups and the civil
liberty groups. We wanted to make sure that the intent matched the
language. And we think this is a limiting amendment on what it can be
used for, which is very narrow, is very specific; and we think this
enhances already good privacy protections in the bill, and I strongly
support it and would encourage the House to strongly support the
bipartisan amendment.
Mr. RUPPERSBERGER. I yield back the balance of my time.
Mr. QUAYLE. I just want to thank the chairman and the ranking member
and their staffs for working tirelessly on this bill. It's a good bill,
and this amendment, I believe, strengthens it.
I urge my colleagues to support it, and I yield back the balance of
my time.
The Acting CHAIR. The question is on the amendment offered by the
gentleman from Arizona (Mr. Quayle).
The question was taken; and the Acting Chair announced that the ayes
appeared to have it.
Mr. RUPPERSBERGER. Madam Chair, I demand a recorded vote.
The Acting CHAIR. Pursuant to clause 6 of rule XVIII, further
proceedings on the amendment offered by the gentleman from Arizona will
be postponed.
Amendment No. 7 Offered by Mr. Amash
The Acting CHAIR. It is now in order to consider amendment No. 7
printed in House Report 112 454.
Mr. AMASH. I have an amendment at the desk.
The Acting CHAIR. The Clerk will designate the amendment.
The text of the amendment is as follows:
Page 10, after line 10, insert the following new paragraph:
``(4) Protection of sensitive personal documents.--The
Federal Government may not use the following information,
containing information that identifies a person, shared with
the Federal Government in accordance with subsection (b):
``(A) Library circulation records.
``(B) Library patron lists.
``(C) Book sales records.
``(D) Book customer lists.
``(E) Firearms sales records.
``(F) Tax return records.
``(G) Educational records.
``(H) Medical records.
The Acting CHAIR. Pursuant to House Resolution 631, the gentleman
from Michigan (Mr. Amash) and a Member opposed each will control 5
minutes.
The Chair recognizes the gentleman from Michigan.
Mr. AMASH. I yield myself such time as I may consume.
I'm extremely concerned about the privacy implications of the bill.
The liability waiver goes too far, and the government can access too
much of Americans' private information and use it in too many ways.
Our amendment addresses that last concern. Our amendment prohibits
CISPA from being used to snoop through sensitive documents that can
personally identify Americans. The documents that our amendment makes
off-limits to the government are library and book records, information
on gun sales, tax returns, educational records, and medical records.
We didn't pull this list out of thin air. In fact, the list already
exists in Federal law as part of the PATRIOT Act. Under the PATRIOT
Act, the Federal Government can obtain these documents as part of a
foreign intelligence investigation only if senior FBI officials request
the documents and a Federal judge approves.
Many have questioned the wisdom of allowing the government access to
sensitive documents even in those more limited circumstances. If the
PATRIOT Act requires the approval of a Federal judge and a senior FBI
official, surely we can't allow access to such personal information
without any judicial or agency oversight. I don't know why the
[[Page H2172]]
government would want to snoop through library lists or tax returns to
counter a cyberattack. But if the government wants these records, it
has existing legal processes to obtain them. Our constituents' privacy
demands that we not give the government unfettered and unsupervised
access to these documents in the name of cybersecurity.
Please support the bipartisan Amash-Labrador-Nadler-Paul-Polis
amendment.
I reserve the balance of my time.
The Acting CHAIR. Does any Member seek recognition in opposition to
the amendment?
Mr. AMASH. I yield back the balance of my time.
Mr. NADLER. Madam Chair, I rise in strong support of the Amash-
Labrador-Nadler-Paul-Polis Amendment.
While I believe most Members agree both that a cyber attack could be
devastating and that sharing information will help to fight that
threat, the underlying bill is overly broad and intrusive. Our
amendment will add at least a modicum of protection for Americans'
privacy.
While the idea of privacy may seem quaint to some in this day of
social networking and the Internet, most Americans still believe that
they have a zone of privacy vis-a-vis the government. As such, it is
important we protect private actions from the prying eyes of
government. Moreover, the government has a history of misusing such
information and so we need to be very circumspect in what we allow it
access to.
Our amendment prohibits records or information regarding what books
you bought or checked out of the library, your medical records, tax
returns, and so on from being used by the government for any purpose if
it obtained that information pursuant to this bill. There is no need
for the government to have this most personal of information--I don't
see how any of it could be possibly relevant to cyber security. And, if
the information can't be legally used, hopefully that will discourage
companies from sharing it in the first place.
The categories of information in our amendment are already given a
protected status in the Foreign Intelligence Surveillance Act (FISA).
FISA requires a court order and the approval of a high-ranking FBI
official to request these personal materials. If that is the standard
under FISA, we should not let companies cavalierly hand such records to
the government with no independent review at all.
I urge my colleagues to support this amendment.
The Acting CHAIR. The question is on the amendment offered by the
gentleman from Michigan (Mr. Amash).
The question was taken; and the Acting Chair announced that the ayes
appeared to have it.
Mr. AMASH. Madam Chair, I demand a recorded vote.
The Acting CHAIR. Pursuant to clause 6 of rule XVIII, further
proceedings on the amendment offered by the gentleman from Michigan
will be postponed.
Amendment No. 8 Offered by Mr. Mulvaney
The Acting CHAIR. It is now in order to consider amendment No. 8
printed in House Report 112 454.
Mr. MULVANEY. I have an amendment at the desk.
The Acting CHAIR. The Clerk will designate the amendment.
The text of the amendment is as follows:
Page 10, after line 10 insert the following:
``(4) Notification of non-cyber threat information.--If a
department or agency of the Federal Government receiving
information pursuant to subsection (b)(1) determines that
such information is not cyber threat information, such
department or agency shall notify the entity or provider
sharing such information pursuant to subsection (b)(1).
``(5) Retention and use of cyber threat information.--No
department or agency of the Federal Government shall retain
or use information shared pursuant to subsection (b)(1) for
any use other than a use permitted under subsection (c)(1).
``(6) Protection of individual information.--The Federal
Government may, consistent with the need to protect Federal
systems and critical information infrastructure from
cybersecurity threats and to mitigate such threats, undertake
reasonable efforts to limit the impact on privacy and civil
liberties of the sharing of cyber threat information with the
Federal Government pursuant to this subsection.
Page 14, after line 13, insert the following:
``(4) Use and retention of information.--Nothing in this
section shall be construed to authorize, or to modify any
existing authority of, a department or agency of the Federal
Government to retain or use information shared pursuant to
subsection (b)(1) for any use other than a use permitted
under subsection (c)(1).''.
The Acting CHAIR. Pursuant to House Resolution 631, the gentleman
from South Carolina (Mr. Mulvaney) and a Member opposed each will
control 5 minutes.
The Chair recognizes the gentleman from South Carolina.
Mr. MULVANEY. I yield myself such time as I may consume.
Madam Chair, I appreciate the opportunity to rise today to speak in
favor to this amendment to the Cyber Intelligence Sharing and
Protection Act. CISPA is fundamentally based on the authority granted
to Congress in article I of the Constitution and article IV of the
Constitution, specifically to provide for the common defense and to
protect the Nation against invasion--in fact, the only affirmative duty
that this government is obligated to meet under the terms of our
Constitution.
This bill protects our Nation from foreign cyberthreats through the
voluntary sharing of cyberthreat information. It is important for
Members to understand this bill allows for only voluntary sharing of
information on cybersecurity threats to the United States between the
government and the private sector.
{time} 1610
It includes no mandates to the private sector. It contains no new
spending and strictly limits how the government can use the information
that is voluntarily provided by the private sector. The amendment that
I've offered with Mr. Dicks today goes one step further to protect the
private information of American citizens. It explicitly prohibits the
Federal Government from retaining or using the information for purposes
other than specifically specified or set forth in the legislation.
Let's make it clear. The government cannot keep or use the shared
information to see if you failed to pay your taxes. The government
cannot use this information to read your emails. The government cannot
use this information to track your credit card purchases or look at the
Web sites that you've been visiting. Under our amendment, the Federal
Government cannot use retained information unless it was directly
related to a cyber or national security threat.
Finally, this bipartisan amendment requires--requires--the Federal
Government to notify any private sector entity that shares information
with the government if that information is not, in fact, cyberthreat
information so that it doesn't happen again, and the government must
delete that information.
The privacy of American citizens is simply too important to dismiss.
Our amendment narrows the scope of the bill to ensure personal
information is protected and that we are focusing on the true threat--
advanced, foreign state-sponsored cyberattacks against America and its
private entities.
With that, I would yield such time as he may consume to the chairman.
Mr. ROGERS of Michigan. Madam Chair, I just want to rise in strong
support of this amendment. I appreciate Mr. Mulvaney's working with the
committee.
This is a limiting amendment, and I think it, again, is in response
to making sure that the intent of the bill meets the language of the
bill, and this is well done to continue to protect privacy and civil
liberties of all Americans and still allow for the government to share
malicious source code with the private sector.
Mr. RUPPERSBERGER. Madam Chair, I rise in opposition to the
amendment; although I do not oppose the amendment.
The Acting CHAIR. Without objection, the gentleman from Maryland is
recognized for 5 minutes.
There was no objection.
Mr. RUPPERSBERGER. I also support this amendment. It is very
important. It's another example of what we're attempting to do to
protect the privacy and civil liberties of our citizens but yet have a
bill that we clearly need to protect them from a national security
perspective.
I yield back the balance of my time.
Mr. MULVANEY. I yield back the balance of my time.
The Acting CHAIR. The question is on the amendment offered by the
gentleman from South Carolina (Mr. Mulvaney).
The question was taken; and the Acting Chair announced that the ayes
appeared to have it.
[[Page H2173]]
Mr. MULVANEY. Madam Chair, I demand a recorded vote.
The Acting CHAIR. Pursuant to clause 6 of rule XVIII, further
proceedings on the amendment offered by the gentleman from South
Carolina will be postponed.
Amendment No. 9 Offered by Mr. Flake
The Acting CHAIR. It is now in order to consider amendment No. 9
printed in House Report 112 454.
Mr. FLAKE. I have an amendment at the desk.
The Acting CHAIR. The Clerk will designate the amendment.
The text of the amendment is as follows:
Page 12, after line 18, insert the following new
subparagraph:
``(E) a list of the department or agency receiving such
information;
The Acting CHAIR. Pursuant to House Resolution 631, the gentleman
from Arizona (Mr. Flake) and a Member opposed each will control 5
minutes.
The Chair recognizes the gentleman from Arizona.
Mr. FLAKE. This amendment is straightforward. It would require the
inspector general of the intelligence community to include a list of
federal agencies and departments receiving information shared with the
government in the report already required by the underlying
legislation.
This act is an important piece of legislation that will help private
entities and utilities protect themselves from catastrophic attacks to
their networks by creating the authority for private entities and
utilities to voluntarily share information pertaining to cyberattacks
with the Federal Government and vice versa.
H.R. 3523 avoids placing costly mandates on private industry and the
creation of a new regulatory structure. That's what I really appreciate
about this legislation, as I'm sure everyone does--it's voluntary.
As with any new intelligence program, however, it's incumbent on us
to make sure robust protections exist to safeguard privacy rights. The
inspector general report required under H.R. 3523 will provide a
thorough review of the information shared under these new authorities
and will address any impacts such sharing has on privacy and civil
liberties. Adding the list of the departments and agencies that were
recipients of this shared information, as my amendment would do, would
add information on which government agencies exactly are receiving
shared information. Such information will further mitigate the risk of
abuse to privacy rights and increase the effectiveness of the inspector
general's report.
I commend my colleagues from Michigan and Maryland. They've been
working hard to put together this bipartisan measure, working up until
the very last minute to ensure that Members' concerns are addressed,
and I believe that this is an important piece of legislation.
I'd like to yield to the gentleman from Michigan such time as he may
consume.
Mr. ROGERS of Michigan. I want to thank the gentleman from Arizona
for working with us. This, again, was a negotiated amendment. The
gentleman approached us with concerns to make sure that the IG report
adequately reflected and allowed us to perform the adequate oversight.
This amendment does that. I appreciate his work and effort, and I think
this strengthens the bill and continues to provide the oversight and
protection of civil liberties and privacy for all Americans.
The Acting CHAIR. Does any Member seek recognition in opposition?
Mr. FLAKE. I just want to say I support the legislation in the
underlying bill, and I would urge support for this amendment as well,
and I yield back the balance of my time.
The Acting CHAIR. The question is on the amendment offered by the
gentleman from Arizona (Mr. Flake).
The amendment was agreed to.
Amendment No. 11 Offered by Mr. Pompeo
The Acting CHAIR. It is now in order to consider amendment No. 11
printed in House Report 112 454.
Mr. POMPEO. Madam Chair, I have an amendment at the desk.
The Acting CHAIR. The Clerk will designate the amendment.
The text of the amendment is as follows:
Page 14, after line 13, insert the following:
``(4) Limitation on federal government use of cybersecurity
systems.--Nothing in this section shall be construed to
provide additional authority to, or modify an existing
authority of, any entity to use a cybersecurity system owned
or controlled by the Federal Government on a private-sector
system or network to protect such private-sector system or
network.''.
The Acting CHAIR. Pursuant to House Resolution 631, the gentleman
from Kansas (Mr. Pompeo) and a Member opposed each will control 5
minutes.
The Chair recognizes the gentleman from Kansas.
Mr. POMPEO. Madam Chairman, I appreciate this opportunity to offer a
second amendment to this incredibly important piece of legislation
that's been worked on for an awfully long time to balance the security
needs of our Nation and the privacy rights of every United States
citizen.
Similar to the first amendment I offered, this amendment addresses
some of the concerns raised by me, privacy folks, and civil libertarian
advocates to make very clear the intentions of this legislation. I
talked earlier about the threat we face today. It's real, it's foreign,
it's domestic, and these cyberattacks are an enormous risk to our
national security and to our economic security.
I now strongly support this legislation. I've had a chance to work
with Chairman Rogers and Ranking Member Ruppersberger to solidify
limitations on this legislation that make it very clear that this
government's use of this information will be limited.
I think some have claimed incorrectly that the current bill could be
read to provide new authority to the Federal Government to install its
Einstein system on private sector networks and to monitor traffic and
send it back to the government with absolutely no limitations. That's
wrong.
This amendment, however, makes it even more clear. This amendment
makes clear that nothing in this bill would alter existing authorities
or provide any new authority to any entity to use a Federal Government-
owned or -operated cybersecurity system on a private sector system or
network to protect such a system or network.
Again, I'm pleased to support the legislation. It doesn't create any
new regulatory regime. It doesn't create any more Federal bureaucracy.
And it has no additional spending. I urge my colleagues to support this
amendment and final passage of CISPA.
I yield whatever time he might consume to the chairman of the
Intelligence Committee.
Mr. ROGERS of Michigan. This is an important amendment, and again, I
think it alleviates some of the concerns. They were misguided, but this
locks it down, makes it very tight and makes it very clear on the
limiting of this information, which is the intent of this bill. So I
think this amendment addresses the privacy and civil liberties
advocates' claims that the liability protection in the bill with
respect to the use of cybersecurity systems could be read to be broader
than the activities authorized by the legislation.
As I said, that was not true, certainly not the intent. This
amendment makes that very clear in the bill that that would not be its
purpose, and it is a limiting amendment. I strongly support this
amendment. It is a bipartisan amendment as well.
Mr. POMPEO. Madam Chairwoman, I yield back the balance of my time.
The Acting CHAIR. The question is on the amendment offered by the
gentleman from Kansas (Mr. Pompeo).
The amendment was agreed to.
{time} 1620
Amendment No. 12 Offered by Mr. Woodall
The Acting CHAIR. It is now in order to consider amendment No. 12
printed in House Report 112 454.
Mr. WOODALL. Madam Chair, I have an amendment at the desk.
The Acting CHAIR. The Clerk will designate the amendment.
The text of the amendment is as follows:
Page 14, after line 13 insert the following:
``(4) No liability for non-participation.--Nothing in this
section shall be construed to subject a protected entity,
self-protected entity, cyber security provider, or an
officer, employee, or agent of a protected entity, self-
protected entity, or cybersecurity provider, to liability for
choosing not to engage in the voluntary activities authorized
under this section.
The Acting CHAIR. Pursuant to House Resolution 631, the gentleman
[[Page H2174]]
from Georgia (Mr. Woodall) and a Member opposed each will control 5
minutes.
The Chair recognizes the gentleman from Georgia.
Mr. WOODALL. Madam Chair, my amendment is a simple amendment. What
we're doing here in this bill today, to the great credit of the
chairman and the ranking member, is instituting a voluntary system by
which our private companies and utilities can cooperate in the name of
securing America's cyberspace. But what happens so often is, when the
Federal Government creates a so-called ``voluntary'' standard, suddenly
those folks who choose not to play on that playing field are subject to
new liabilities because they rejected that voluntary standard.
Well, if it's going to be a truly voluntary standard, we have to
ensure that those who reject it are not held to any new liabilities. I
believe that was the intent of the committee as they crafted this
legislation, but my amendment makes that clear to say that no new
liabilities arise for any company that chooses not to participate in
this new truly voluntary cybersecurity cooperative regime.
With that, I reserve the balance of my time.
The Acting CHAIR. Does any Member seek recognition in opposition?
Mr. WOODALL. With that, I want to thank the ranking member and the
chairman for their tremendous openness throughout this entire process.
Briefing after briefing, phone call after phone call, they both made
themselves available to Members on both sides of the aisle so that we
could get our questions answered in what is sometimes a difficult area
to understand and digest. I thank them both for their leadership, and I
yield back the balance of my time.
The Acting CHAIR. The question is on the amendment offered by the
gentleman from Georgia (Mr. Woodall).
The amendment was agreed to.
Amendment No. 13 Offered by Mr. Goodlatte
The Acting CHAIR. It is now in order to consider amendment No. 13
printed in House Report 112 454.
Mr. GOODLATTE. Madam Chairman, I have an amendment at the desk.
The Acting CHAIR. The Clerk will designate the amendment.
The text of the amendment is as follows:
Page 14, after line 14 insert the following:
``(1) Availability.--The term `availability' means ensuring
timely and reliable access to and use of information.
Page 15, strike lines 1 through 25 and insert the
following:
``(2) Confidentiality.--The term `confidentiality' means
preserving authorized restrictions on access and disclosure,
including means for protecting personal privacy and
proprietary information.
``(3) Cyber threat information.--
``(A) In general.--The term `cyber threat information'
means information directly pertaining to--
``(i) a vulnerability of a system or network of a
government or private entity;
``(ii) a threat to the integrity, confidentiality, or
availability of a system or network of a government or
private entity or any information stored on, processed on, or
transiting such a system or network;
``(iii) efforts to degrade, disrupt, or destroy a system or
network of a government or private entity; or
``(iv) efforts to gain unauthorized access to a system or
network of a government or private entity, including to gain
such unauthorized access for the purpose of exfiltrating
information stored on, processed on, or transiting a system
or network of a government or private entity.
``(B) Exclusion.-- Such term does not include information
pertaining to efforts to gain unauthorized access to a system
or network of a government or private entity that solely
involve violations of consumer terms of service or consumer
licensing agreements and do not otherwise constitute
unauthorized access.
``(4) Cyber threat intelligence.--
``(A) In general.--The term `cyber threat intelligence'
means intelligence in the possession of an element of the
intelligence community directly pertaining to--
``(i) a vulnerability of a system or network of a
government or private entity;
``(ii) a threat to the integrity, confidentiality, or
availability of a system or network of a government or
private entity or any information stored on, processed on, or
transiting such a system or network;
``(iii) efforts to degrade, disrupt, or destroy a system or
network of a government or private entity; or
``(iv) efforts to gain unauthorized access to a system or
network of a government or private entity, including to gain
such unauthorized access for the purpose of exfiltrating
information stored on, processed on, or transiting a system
or network of a government or private entity.
``(B) Exclusion.-- Such term does not include intelligence
pertaining to efforts to gain unauthorized access to a system
or network of a government or private entity that solely
involve violations of consumer terms of service or consumer
licensing agreements and do not otherwise constitute
unauthorized access.
Page 16, strike line 5 and all that follows through page
17, line 2, and insert the following:
``(5) Cybersecurity purpose.--
``(A) In general.--The term `cybersecurity purpose' means
the purpose of ensuring the integrity, confidentiality, or
availability of, or safeguarding, a system or network,
including protecting a system or network from--
``(i) a vulnerability of a system or network;
``(ii) a threat to the integrity, confidentiality, or
availability of a system or network or any information stored
on, processed on, or transiting such a system or network;
``(iii) efforts to degrade, disrupt, or destroy a system or
network; or
``(iv) efforts to gain unauthorized access to a system or
network, including to gain such unauthorized access for the
purpose of exfiltrating information stored on, processed on,
or transiting a system or network.
``(B) Exclusion.-- Such term does not include the purpose
of protecting a system or network from efforts to gain
unauthorized access to such system or network that solely
involve violations of consumer terms of service or consumer
licensing agreements and do not otherwise constitute
unauthorized access.
``(6) Cybersecurity system.--
``(A) In general.--The term `cybersecurity system' means a
system designed or employed to ensure the integrity,
confidentiality, or availability of, or safeguard, a system
or network, including protecting a system or network from--
``(i) a vulnerability of a system or network;
``(ii) a threat to the integrity, confidentiality, or
availability of a system or network or any information stored
on, processed on, or transiting such a system or network;
``(iii) efforts to degrade, disrupt, or destroy a system or
network; or
``(iv) efforts to gain unauthorized access to a system or
network, including to gain such unauthorized access for the
purpose of exfiltrating information stored on, processed on,
or transiting a system or network.
``(B) Exclusion.-- Such term does not include a system
designed or employed to protect a system or network from
efforts to gain unauthorized access to such system or network
that solely involve violations of consumer terms of service
or consumer licensing agreements and do not otherwise
constitute unauthorized access.
Page 17, after line 2 insert the following:
``(7) Integrity.--The term `integrity' means guarding
against improper information modification or destruction,
including ensuring information nonrepudiation and
authenticity.
The Acting CHAIR. Pursuant to House Resolution 631, the gentleman
from Virginia (Mr. Goodlatte) and a Member opposed each will control 5
minutes.
The Chair recognizes the gentleman from Virginia.
Mr. GOODLATTE. Madam Chair, I rise to offer an amendment to H.R.
3523. This amendment is the result of a series of long discussions
between Members of the bipartisan coalition supporting this bill and
various privacy and civil liberties groups.
As many know, I have long worked with these outside groups and with
industry to make sure that where Congress acts with respect to
technology, it does so in a way that is thoughtful, intelligent, and
shows a strong respect for privacy and civil liberties.
I am a firm believer that Congress can craft legislation that
addresses technology issues and allows the private sector to flourish
while also protecting the rights of Americans. This amendment seeks to
move the legislation further down that path.
To do so, this amendment carefully narrows the definitions of the key
terms in the bill--``cyberthreat information,'' ``cyberthreat
intelligence,'' ``cybersecurity purposes,'' and ``cybersecurity
systems''--and adds in three new definitions from the existing law.
Together, these new definitions ensure that companies in the private
sector can protect themselves against very real cyberthreats. At the
same time, they limit what information the private sector can identify,
obtain, and share with others, and they do so in a way that is
technology neutral so that the definitions we write into law today do
not become obsolete before the ink is dry.
Specifically, these new definitions remove language from prior
versions of the bill that could have been interpreted in broad ways.
They remove or modify definitions that could have
[[Page H2175]]
been thought to cover things that the bill did not intend to cover,
like unauthorized access to a system or network that purely involves
violations of a terms of service. These revised definitions also rely
in part on existing law to cover the appropriate set of threats to
networks and systems without being overly broad.
I would note that these definitional changes are important on their
own for the narrowing function they serve. In the view of groups like
the Center for Democracy and Technology and the Constitution Project,
this amendment represents ``important privacy improvement.''
Specifically, the change to the definitions addresses a number of key
issues raised by a variety of groups, and many in the Internet user
community. As such, these amendments move an already important bill in
an even better direction.
I reserve the balance of my time.
Mr. RUPPERSBERGER. Madam Chairman, I rise in opposition to the
amendment, but I do not oppose the amendment.
The Acting CHAIR. Without objection, the gentleman from Maryland is
recognized for 5 minutes.
There was no objection.
Mr. RUPPERSBERGER. I yield 1 minute to the gentleman from Texas (Mr.
Poe).
Mr. POE of Texas. I thank the gentleman for yielding.
Anytime the government gets involved in data sharing and data
storage, there is going to be the possibility for abuse.
I hear from my constituents in Texas and U.S. companies that they
continue to lose information to cyberattacks from abroad. Most of these
attacks come from none other than the organized crime syndicate of
China, as I call it. They steal our intellectual property, and then
they use the stolen information to compete against the United States.
We need a commonsense information-sharing system to combat the
growing threat to this way of life that we have in America. However, we
have to do it in such a way that protects our privacy and
constitutional rights of citizens.
While I believe the intent of the base bill was never to allow the
government to use information it obtained for any other purposes than
cybersecurity, I believe that the clear and simple language in Mr.
Goodlatte's amendment is necessary to make it 100 percent clear that
this is strictly prohibited.
As we remember from the 2012 NDAA debate, it's important, especially
when dealing with legislation that affects civil liberties and
constitutional rights, Congress needs to be perfectly 100 percent
clear. I believe the Goodlatte amendment does this. I urge all Members
to support it.
Mr. GOODLATTE. Madam Chairman, at this time, I am pleased to yield 1
minute to the chairman of the Intelligence Committee, the gentleman
from Michigan (Mr. Rogers).
Mr. ROGERS of Michigan. I want to thank the distinguished former
chairman and member, Mr. Goodlatte, for his commonsense amendment.
Again, this is working to make sure that this bill is restricted for
both information use, privacy, and civil liberties, and why the
coalition, I argue, continues to grow because of the good work of folks
like Mr. Goodlatte. It's bipartisan in nature, and I would strongly
urge the body's support for the Goodlatte amendment.
Mr. GOODLATTE. Madam Chairman, I am not aware of any other speakers
on this amendment, so I would urge my colleagues to support the
amendment. It is, as the chairman indicated and the ranking member
indicated, bipartisan legislation that will improve the underlying bill
in significant ways and protect the civil liberties of American
citizens in a more clear fashion.
I thank all of those in the Chamber and outside who contributed ideas
to help us craft this amendment and urge all of my colleagues to
support it.
I yield back the balance of my time.
The Acting CHAIR. The question is on the amendment offered by the
gentleman from Virginia (Mr. Goodlatte).
The question was taken; and the Acting Chair announced that the ayes
appeared to have it.
Mr. ROGERS of Michigan. Madam Chair, I demand a recorded vote.
The Acting CHAIR. Pursuant to clause 6 of rule XVIII, further
proceedings on the amendment offered by the gentleman from Virginia
will be postponed.
Mr. ROGERS of Michigan. Madam Chair, I move that the Committee do now
rise.
The motion was agreed to.
Accordingly, the Committee rose; and the Speaker pro tempore (Mr.
Woodall) having assumed the chair, Mrs. Capito, Acting Chair of the
Committee of the Whole House on the state of the Union, reported that
that Committee, having had under consideration the bill (H.R. 3523) to
provide for the sharing of certain cyber threat intelligence and cyber
threat information between the intelligence community and cybersecurity
entities, and for other purposes, had come to no resolution thereon.
Mr. ROGERS of Michigan. Mr. Speaker, I ask unanimous consent that
during further consideration of H.R. 3523, pursuant to House Resolution
631, amendments No. 10 and No. 5 in House Report 112 454 may be
considered out of sequence.
The SPEAKER pro tempore. Is there objection to the request of the
gentleman from Michigan?
There was no objection.
The SPEAKER pro tempore. Pursuant to House Resolution 631 and rule
XVIII, the Chair declares the House in the Committee of the Whole House
on the state of the Union for the further consideration of the bill,
H.R. 3523.
Will the gentlewoman from West Virginia (Mrs. Capito) kindly resume
the chair.
{time} 1630
In the Committee of the Whole
Accordingly, the House resolved itself into the Committee of the
Whole House on the state of the Union for the further consideration of
the bill (H.R. 3523) to provide for the sharing of certain cyber threat
intelligence and cyber threat information between the intelligence
community and cybersecurity entities, and for other purposes, with Mrs.
Capito (Acting Chair) in the chair.
The Clerk read the title of the bill.
The Acting CHAIR. When the Committee of the Whole rose earlier today,
a request for a recorded vote on amendment No. 13 printed in House
Report 112 454 by the gentleman from Virginia (Mr. Goodlatte) had been
postponed.
Amendment No. 14 Offered by Mr. Turner of Ohio
The Acting CHAIR. It is now in order to consider amendment No. 14
printed in House Report 112 454.
Mr. TURNER of Ohio. Madam Chair, I have an amendment at the desk.
The Acting CHAIR. The Clerk will designate the amendment.
The text of the amendment is as follows:
Page 15, line 7, insert ``deny access to or'' before
``degrade''.
Page 15, line 20, insert ``deny access to or'' before
``degrade''.
Page 16, line 10, insert ``deny access to or'' before
``degrade''.
Page 16, line 21, insert ``deny access to or'' before
``degrade''.
The Acting CHAIR. Pursuant to House Resolution 631, the gentleman
from Ohio (Mr. Turner) and a Member opposed each will control 5
minutes.
The Chair recognizes the gentleman from Ohio.
Mr. TURNER of Ohio. Madam Chairman, this amendment would make a
technical correction to the definition sections of this bill to ensure
that U.S. cybersecurity policies remain consistent for protections
against threats to our government and private sector networks.
This amendment will maintain consistency among this bill and other
cybersecurity policies. The terms ``deny, degrade, disrupt or destroy''
are found throughout our national cybersecurity strategy and our
guidance documents. The term ``deny'' was inadvertently omitted from
H.R. 3523. Inserting ``deny'' makes the bill consistent with other
national documents in the discussion of cybersecurity.
The increase in cybersecurity incidents led to the development of
centers like the Air Force's Cyberspace Technical Center of Excellence
at Wright Patterson Air Force base in my district in Dayton, Ohio. To
combat this growing trend in the sophistication of cyberattacks, the
Center of Technical Excellence has been turned to that focus.
The need to protect U.S. networks from denial-of-service attacks was
made clear when, for 3 weeks in 2007, Estonia was the target of a
large-scale
[[Page H2176]]
series of denial-of-service attacks against government Web sites,
banks, universities, and Estonian newspapers.
I urge all of my colleagues to support this amendment and the
underlying bill.
I yield 30 seconds to the chairman.
Mr. ROGERS of Michigan. Madam Chair, I want to, again, thank Mr.
Turner for this important clarification amendment and working with us
to improve the status of the bill to make sure that we are able to
protect America's networks and increases the ability for us to protect
privacy and civil liberties.
I appreciate the gentleman's good effort, and I would encourage the
House to support the Turner amendment.
The Acting CHAIR. Does any Member seek recognition in opposition?
Mr. TURNER of Ohio. Madam Chair, I yield back the balance of my time.
The Acting CHAIR. The question is on the amendment offered by the
gentleman from Ohio (Mr. Turner).
The amendment was agreed to.
Amendment No. 15 Offered by Mr. Mulvaney
The Acting CHAIR. It is now in order to consider amendment No. 15
printed in House Report 112 454.
Mr. MULVANEY. Madam Chair, I have an amendment at the desk.
The Acting CHAIR. The Clerk will designate the amendment.
The text of the amendment is as follows:
At the end of the bill, add the following new section:
SEC. 3. SUNSET.
Effective on the date that is five years after the date of
the enactment of this Act--
(1) section 1104 of the National Security Act of 1947, as
added by section 2(a) of this Act, is repealed; and
(2) the table of contents in the first section of the
National Security Act of 1947, as amended by section 2(d) of
this Act, is amended by striking the item relating to section
1104, as added by such section 2(d).
The Acting CHAIR. Pursuant to House Resolution 631, the gentleman
from South Carolina (Mr. Mulvaney) and a Member opposed each will
control 5 minutes.
The Chair recognizes the gentleman from South Carolina.
Mr. MULVANEY. This amendment, ladies and gentlemen, is fairly simple
and straightforward, but it bears discussion for a few moments. It
requires the bill to expire of its own terms within 5 years. It's what
we call in this business a sunset clause. And by its own terms, if the
bill is passed, it will automatically cease to be, cease to be
enforceable after 5 years unless this body acts affirmatively to renew
it.
Generally, I think this is good policy with most things that we do in
Washington, D.C. In fact, several people say that one of the biggest
difficulties we have in this town is that we simply create laws all the
time and they never go away. So generally speaking, I think sunset
clauses are to be admired and to be encouraged.
Even more so is the case, however, when we deal with situations where
we have concerns regarding individual liberties. We've worked very,
very hard to make this bill a good bill. It is an excellent bill. I'm
proud to be a cosponsor of this bill.
But every single time that we start moving into the realm where the
government action starts to bump up against individual liberties, it's
a good idea to take a pause after this certain amount of time, in this
case 5 years, and look our hands over, look over the actual
implementation of the bill and make sure that we did exactly what we
thought that we were going to do.
Finally, I think in a case when we're dealing with technology, which
moves so very rapidly--in fact, we've written this bill as well as we
possibly could to try and deal with unanticipated development in
technology--but when you're dealing with technology that moves so
rapidly and changes so quickly, I think it's important, after a certain
period of time, again, here, 5 years, to step back, look our hands over
and make sure that things worked exactly as we thought they would.
So, for that reason, Madam Chairman, I ask that this amendment be
considered and be approved.
With that, I yield back the balance of my time.
The Acting CHAIR. Does any Member seek recognition in opposition to
the Member's amendment?
The question is on the amendment offered by the gentleman from South
Carolina (Mr. Mulvaney).
The question was taken; and the Acting Chair announced that the ayes
appeared to have it.
Mr. MULVANEY. Madam Chair, I demand a recorded vote.
The Acting CHAIR. Pursuant to clause 6 of rule XVIII, further
proceedings on the amendment offered by the gentleman from South
Carolina will be postponed.
Amendment No. 5 Offered by Ms. Jackson Lee of Texas
The Acting CHAIR. It is now in order to consider amendment No. 5
printed in House Report 112 454.
Ms. JACKSON LEE of Texas. Madam Chair, I have an amendment at the
desk.
The Acting CHAIR. The Clerk will designate the amendment.
The text of the amendment is as follows:
Page 9, after line 5, insert the following:
``(c) Cybersecurity Operational Activity.--
``(1) In general.--In receiving information authorized to
be shared with the Federal Government under this section, the
Secretary of Homeland Security is authorized, notwithstanding
any other provision of law, to acquire, intercept, retain,
use, and disclose communications and other system traffic
that are transiting to or from or stored on Federal systems
and to deploy countermeasures with regard to such
communications and system traffic for cybersecurity purposes
provided that the Secretary certifies that--
``(A) such acquisitions, interceptions, and countermeasures
are reasonable necessary for the purpose of protection
Federal systems from cybersecurity threats;
``(B) the content of communications will be collected and
retained only when the communication is associated with known
or reasonably suspected cybersecurity threat, and
communications and system traffic will not be subject to the
operation of a countermeasure unless associated with such
threats;
``(C) information obtained pursuant to activities
authorized under this subsection will only be retained, used
or disclosed to protect Federal systems from cybersecurity
threats, mitigate against such threats, or, with the approval
of the Attorney General, for law enforcement purposes when
the information is evidence of a crime which has been, is
being, or is about to be committed; and
``(D) notice has been provided to users of Federal systems
concerning the potential for acquisition, interception,
retention, use, and disclosure of communications and other
system traffic.
``(2) Contracts.-- The Secretary may enter into contracts
or other agreements, or otherwise request and obtain the
assistance of, private entities that provide electronic
communication or cybersecurity services to acquire,
intercept, retain, use, and disclose communications and other
system traffic consistent with paragraph (1).
``(3) Privileged communications.--No otherwise privileged
communication obtained in accordance with, or in violation
of, this section shall lose its privileged character.
``(4) Policies and procedures.-- The Secretary of Homeland
Security shall establish policies and procedures that--
``(A) minimize the impact on privacy and civil liberties,
consistent with the need to protect Federal systems and
critical information infrastructure from cybersecurity
threats and mitigate cybersecurity threats;
``(B) reasonably limit the acquisition, interception,
retention, use, and disclosure of communications, records,
system traffic, or other information associated with specific
persons consistent with the need to carry out the
responsibilities of this section, including establishing a
process for the timely destruction on recognition of
communications, records, system traffic, or other information
that is acquired or intercepted pursuant to this section that
does not reasonably appear to be related to protecting
Federal systems and critical information infrastructure from
cybersecurity threats and mitigating cybersecurity threats;
``(C) include requirements to safeguard communications,
records, system traffic, or other information that can be
used to identify specific persons from unauthorized access or
acquisition; and
``(D) protect the confidentiality of disclosed
communications, records, system traffic, or other information
associated with specific persons to the greatest extent
practicable and require recipients of such information to be
informed that the communications, records, system traffic, or
other information disclosed may only be used for protecting
information systems against cybersecurity threats, mitigating
against cybersecurity threats, or law enforcement purposes
when the information is evidence of a crime that has been, is
being, or is about to be committed, as specified by the
Secretary.
Page 14, after line 24, insert the following:
``(2) Countermeasure.--The term `countermeasure' means an
automated action with defensive intent to modify or block
data packets associated with electronic or wire
communications, internet traffic, program code, or other
system traffic transiting to or from or stored on an
information system to counteract a cybersecurity threat.''.
The Acting CHAIR. Pursuant to House Resolution 631, the gentlewoman
from Texas (Ms. Jackson Lee) and a
[[Page H2177]]
Member opposed each will control 5 minutes.
The Chair recognizes the gentlewoman from Texas.
Ms. JACKSON LEE of Texas. Madam Chair, let me thank you for your
courtesy. Let me thank the chairperson for his courtesy and the ranking
member for his courtesy. I was very appreciative, with the overlapping
committee work, for the courtesy of the floor. I thank you very much.
Let me hold up the Constitution and say that I believe in the
Constitution and the Bill of Rights, particularly, that protects us
against unreasonable search and seizure. And I also recognize the
bipartisan effort of this particular legislation and recognize that we
may have disagreement.
My amendment ensures that comprehensive policies and procedures are
implemented by the Department of Homeland Security to protect Federal
systems from cybersecurity threats and minimize the impact on privacy.
What it does not do is allow Homeland Security and the Justice
Department to spy on Americans.
Let me be very clear. It does not allow the infrastructure of
Homeland Security and the Justice Department to spy on Americans. I
would not adhere to that.
It is a shame that oversight of our Nation's critical infrastructure,
however, was not included in this bill. The hard work that has been
done by the Committee on Homeland Security, Mr. Lungren and Ms. Clarke,
joined with other Members, was worthy of consideration.
I understand the strictures that we're dealing with. My amendment is
designed to put in place comprehensive privacy protections in order to
prevent any gross infringement of an individual's civil liberties or
privacy rights. It allows the Department of Homeland Security to
protect Federal systems that enable air traffic controllers to operate.
Madam Chairperson, we know the climate that we live in. God has
blessed us, if I might even say that, but more importantly, the hard
work of men and women who happen to be Federal employees, that no
action has occurred on our soil since 9/11.
This amendment would allow the Department of Homeland Security to
protect Federal systems that enable air traffic controllers to operate,
that enable Congress to operate, that enable all Federal agencies to
operate.
My amendment is intentionally narrowly tailored to go after known or
reasonable threats to our Federal systems. Let me be very clear. This
is not a reflection on this legislation from the extent of hard work.
{time} 1640
I am just saying that, coming from my perspective, I would hope that
we would look at infrastructure.
I am not advocating for the bill. I am advocating for an open
discussion on this issue that certain elements have to be resolved in
dealing with the cyberthreats that we face. I've long been an advocate
for protecting the right to privacy and the civil liberties of all
Americans--that is very much a part of this amendment--but I am also
mindful of the importance of the infrastructure.
As we assess cybersecurity measures and take steps to implement
legislation, I believe we must be sure to strike the proper balance
between effective and strong security for our digital networks and
protecting the privacy of individuals as well as infrastructure that
involves transportation. I am ever mindful that we must be careful not
to go about strengthening cybersecurity at the expense of infringing on
people's privacy rights and civil liberties, which is why my amendment
is narrowly tailored and sets clear restrictions on the scope of
communications addressed and why and how that information can be used.
Our Nation's critical infrastructures are composed of public and
private institutions in the sectors of agriculture, food, water, public
health, emergency services, government, defense industrial base,
information and telecommunications, energy, transportation, banking and
finance, chemicals and hazardous materials.
I ask my colleagues to support the amendment, and I reserve the
balance of my time.
Mr. ROGERS of Michigan. I rise in opposition to the amendment.
The Acting CHAIR. The gentleman is recognized for 5 minutes.
Mr. ROGERS of Michigan. I yield myself 1\1/2\ minutes.
If you thought it was good for the businesses to require Facebook to
give them your passwords, you'll love this. If not, you should go
apoplectic. I think that's an awful practice on Facebook. This is
worse. I want to read just from the law. Notwithstanding any other
provision, it allows them to:
acquire, intercept, retain, use, and disclose
communications and other system traffic that are transiting
to and from or are stored on the Federal systems and to
deploy countermeasures with regard to such communications and
system traffic for cybersecurity purposes.
This is dangerous. It's dangerous. For the very narrow bill that has
been misrepresented from what we do, this is Big Brother on steroids.
We cannot allow this to happen. This would be the government tracking
communications or your medical records from the veterans' association.
It would track your IRS forms coming in and out of the Federal
Government. This is exactly what scares people about trying to get into
the business of making sure we protect our networks, but we can't do it
by trampling on privacy and civil liberties.
This is awful. I am just shocked, after all of this debate and all of
this discussion on our very narrow bill, that my friends would come up
with something that wholesale monitors the Internet and gets all of the
information which we've fought so hard to protect on behalf of average
Americans.
I yield 2 minutes to the gentleman from Georgia (Mr. Westmoreland).
Mr. WESTMORELAND. I want to thank the chairman for yielding.
Let me say this to my colleague from Texas: that we have had a number
of amendments here today that have tried to streamline this bill in
order to make it even narrower and to take out any perception that it
would be personal information and limit what government can do and be
very explicit in the terms of what this sharing is, which is voluntary,
which is narrowly drawn.
The chairman and the ranking member have done a wonderful job of
working with other Members to allow these amendments to make this bill
better. I am very disappointed. This amendment basically guts the
bill--it expands it--when everybody who has been down here so far has
been trying to narrow it. This just expands it even more. This is the
type of amendment that people fear in that we would give Homeland
Security the ability to intercept and keep the transmissions. That is
totally out of hand.
I just hope that we will vote against this amendment and support the
underlying bill.
Ms. JACKSON LEE of Texas. What an exaggeration. I know that they have
been propelled by all of the media that has given them great support.
They know that the underlying bill, in fact, is considered an
invasion of privacy; but if you look at my amendment, it is only when
the communication is associated with a known or a reasonably suspected
cybersecurity threat. It is narrow, but more importantly, it has a
privacy provision. I believe in privacy. Let me just say that I was not
going to be denied the right to come to the floor to be able to frame
what we should be doing--looking at infrastructure and the complement
of making sure that privacy is protected.
This particular book, even with the amendments they have, will
probably not draw this to the point of acceptance. So I would argue
that this is a productive debate but that the amendment that Jackson
Lee has submitted does not, in fact, at all violate privacy. I would
say to them that I look forward to being able to address this question
as we go forward.
I am going to ask, at this time, unanimous consent to withdraw this
amendment for the misinterpretation that my friends on the other side
of the aisle have predicted or thought that they were going to put on
this particular amendment.
The Acting CHAIR. Without objection, the amendment is withdrawn.
There was no objection.
Amendment No. 10 Offered by Ms. Richardson
The Acting CHAIR. It is now in order to consider amendment No. 10
printed in House Report 112 454.
[[Page H2178]]
Ms. RICHARDSON. Madam Chairwoman, I have an amendment at the desk.
The Acting CHAIR. The Clerk will designate the amendment.
The text of the amendment is as follows:
Page 14, after line 6, insert the following new
subparagraph:
``(C) prohibit a department or agency of the Federal
Government from providing cyber threat information to owners
and operators of critical infrastructure;
The Acting CHAIR. Pursuant to House Resolution 631, the gentlewoman
from California (Ms. Richardson) and a Member opposed each will control
5 minutes.
The Chair recognizes the gentlewoman from California.
Ms. RICHARDSON. I stand today in support of the Richardson amendment
to H.R. 3523; but I would like to take a moment to thank the majority
leader, Mr. Cantor, Chairman Rogers, and Ranking Member Ruppersberger
for their tolerance in allowing us to come to the floor. I was ranking
member of a committee that was in operation at this time, and I thank
you for allowing us to come forward.
The Richardson amendment ensures that owners and operators of
critical infrastructure systems that are potential targets to
cyberattacks receive information about cyberthreats. Some examples of
our critical infrastructure systems that this amendment would apply to
are: energy facilities, banking and finance facilities, chemical
facilities, dams, nuclear plants, emergency services, agriculture and
food systems, water treatment systems. Many of these would be in great
danger and would need information.
Every single Member of Congress has critical infrastructure sectors
in their districts, whether they be public or private, and every
community in this Nation has some critical infrastructure presence that
should be protected and advised of threats. In my district, I have the
Home Depot Athletic Center, which holds up to 27,000 people. There is
the Boeing Company, which manufactures the C 17 planes. There is the
Long Beach Police and Fire Department EOC center, the Long Beach Gas
and Oil Department, and water treatment facilities. The numbers go on.
We need to make sure that not only ports and government facilities but
also private facilities are approved and entitled to have this same
information.
Some inherent complications are that there are 18 different Federal
Government agencies that have jurisdiction over critical infrastructure
sectors. For example, the Department of Homeland Security has
jurisdiction over chemical, commercial facilities, dams, emergency
services, and nuclear power alone.
H.R. 3523, as currently drafted, does not mention how critical
infrastructure sectors that do not fall within the jurisdiction of
government intelligence agencies would receive critical cyberthreat
information or have the systems in place to share information
appropriately. This amendment makes an important improvement to that
legislation.
I would like to commend Chairman Rogers and Ranking Member
Ruppersberger, who mentioned in their testimony before the Rules
Committee and the Intelligence Committee that there was a key fault
here in this critical infrastructure section. I am further pleased that
the Rules Committee acknowledged that by finding this amendment in
order, and I urge my colleagues to consider this seriously.
While Chairman Lungren's original cyber bill did not make it to the
House floor, I offer this Richardson amendment in the same bipartisan
spirit that I did when his bill was brought forward in our
subcommittee. Mr. Lungren and Mr. Langevin spoke earlier on the
bipartisan amendment regarding critical infrastructure, hence my
building my comments on that.
Richardson amendment No. 10 ensures that our critical infrastructure
sectors will not be left out from receiving information that could
protect their systems against a terrorist attack.
{time} 1650
This amendment makes sure that industries most at risk of a
cyberattack receive information that they need to protect the public
and the facilities at large. My amendment makes explicit that critical
infrastructure sectors be included in information-sharing relationships
and does not include any new Federal authorities.
With that, Madam Chairwoman, I urge my colleagues to support the
amendment.
Mr. ROGERS from Michigan. Madam Chair, I rise in opposition to the
amendment.
The Acting CHAIR. The gentleman is recognized for 5 minutes.
Mr. ROGERS of Michigan. I appreciate the gentlelady's effort. Again,
we were pretty careful in this year-long process of trying to find a
very narrow solution because of all of the challenges that come with
trying to get a piece of legislation across the House to the Senate to
the President's desk.
I argue that the Homeland Security Committee should engage in a
critical infrastructure debate. Here's the problem: it's not defined
for the purposes of this bill. So we don't know what that means. We've
been very careful to separate the government from the private sector.
There is no government involvement in the private sector networks. It
is just information, malicious source code-sharing. That's it.
This, we're not sure where it goes. Many in industry believe that
they're talking about the backbone of the Internet. Are they talking
about the backbone of the Internet? We don't know. It's not well
defined. That would mean, then, that the government for the first time
gets into the backbone of the Internet. I think that's a horrible,
terrible idea.
So I don't think that's what the gentlelady intends, but the problem
is that's not what the language says.
I look forward to working with the gentlelady as she works through
those issues on Homeland Security because these are hard. They are
tricky. Sometimes a word will get you in trouble, as we have found
along the path here, and as it should. We should be really careful
about how we're doing this.
So I would encourage the gentlelady to work with us. I know Mr.
Ruppersberger, since we've been through this, we can provide some help
along the way, and we look forward to the product that you all work on
that is geared toward the infrastructure piece. Again, this was never
intended to solve all the problems. It was intended to be a very narrow
first step to say, Hey, if your house is being robbed, we want to tell
you before the robber gets there. That's all this bill does. It tells
if your computer is going to get hacked and your personal information
stolen, we want you to have the malicious code so you can protect
yourself. That's all this bill does.
So we get a little nervous when it starts crossing that divide that
we've established between the government and the private sector. You
start crossing that divide, we think you can get into some serious
trouble in a hurry without very clearly defined language and
definition.
Unfortunately, I have to oppose the amendment, but I look forward to
working with the gentlelady on a very important issue, infrastructure
protection, as the Homeland Security does its work.
Mr. RUPPERSBERGER. Will the gentleman yield?
Mr. ROGERS of Michigan. I yield to the gentleman from Maryland.
Mr. RUPPERSBERGER. As we said before, our bill is extremely limited,
and we're attempting again to allow our government, our intelligence
community, to give the information that's necessary to protect our
citizens from these cyberattacks.
Ours is the most active bill that is out there now. Our bill,
hopefully, will pass and go to the Senate, and there will be a lot more
negotiation. But there is a lot of work to do in other areas, too, such
as Homeland Security; and I know there are other issues involved in the
Homeland Security markup, I know that there are issues involving
Judiciary.
I can say this: I know that the chairman and I for 1 year now have
worked very openly with every group that we think would be involved in
this bill. Because of different positions taken, including HLU, we
listened. This bill is better, and we hope that it passes.
So we clearly will work with you, but we on the Intelligence
Committee are very limited to our jurisdiction, and that's why a lot of
these issues we can't deal with other than what is in our bill right
now.
[[Page H2179]]
I thank the gentleman for yielding.
Ms. RICHARDSON. Again, I'd like to thank both the chairman and the
ranking member and look forward to the opportunity to work with you.
I would just give you one analogy to consider as we move forward. As
you recall on 9/11 when the planes hit those two Twin Towers, the
government had the ability to notify the private airlines to scramble
the planes and to demand that all of the planes would be landed because
we didn't know where they were going to go.
At that point, the government had the ability to work with the
private sector, with the airline industry, to communicate information
that they were now becoming aware of.
I'm certainly not suggesting that we interfere with the free-flowing
ideas of the Internet. What this amendment is suggesting, and I look
forward to working with you in the future, is that the government does
have the ability if in the event something happens with dropping some
chemicals into water, for example, treatment facilities, that the
government should certainly have the ability to work with those private
sector companies to be able to notify them and ensure that the public
is protected.
I thank you for hearing the amendment, and I look forward to working
with you going forward.
I yield back the balance of my time.
Mr. ROGERS of Michigan. I thank the gentlelady, and I look forward to
that opportunity.
I yield back the balance of my time.
The Acting CHAIR. The question is on the amendment offered by the
gentlewoman from California (Ms. Richardson).
The amendment was rejected.
Announcement by the Acting Chair
The Acting CHAIR. The Chair understands that amendment No. 16 will
not be offered.
Pursuant to clause 6 of rule XVIII, proceedings will now resume on
those amendments printed in House Report 112 454 on which further
proceedings were postponed, in the following order:
Amendment No. 1 by Mr. Langevin of Rhode Island.
Amendment No. 4 by Mr. Rogers of Michigan.
Amendment No. 6 by Mr. Quayle of Arizona.
Amendment No. 7 by Mr. Amash of Michigan.
Amendment No. 8 by Mr. Mulvaney of South Carolina.
Amendment No. 13 by Mr. Goodlatte of Virginia.
Amendment No. 15 by Mr. Mulvaney of South Carolina.
The Chair will reduce to 2 minutes the minimum time for any
electronic vote after the first vote in this series.
Amendment No. 1 Offered by Mr. Langevin
The Acting CHAIR. The unfinished business is the demand for a
recorded vote on the amendment offered by the gentleman from Rhode
Island (Mr. Langevin) on which further proceedings were postponed and
on which the noes prevailed by voice vote.
The Clerk will redesignate the amendment.
The Clerk redesignated the amendment.
Recorded Vote
The Acting CHAIR. A recorded vote has been demanded.
A recorded vote was ordered.
The vote was taken by electronic device, and there were--ayes 167,
noes 243, not voting 21, as follows:
[Roll No. 184]
AYES--167
Ackerman
Andrews
Baldwin
Bass (CA)
Becerra
Berkley
Berman
Bishop (GA)
Bishop (NY)
Bonamici
Boren
Boswell
Brady (TX)
Braley (IA)
Brown (FL)
Butterfield
Capps
Capuano
Carnahan
Carney
Carson (IN)
Castor (FL)
Chandler
Chu
Cicilline
Clarke (MI)
Clay
Cleaver
Clyburn
Coffman (CO)
Cohen
Connolly (VA)
Conyers
Cooper
Costa
Critz
Cuellar
Cummings
Davis (CA)
Davis (IL)
DeFazio
DeGette
DeLauro
Dent
Deutch
Dicks
Dingell
Doggett
Doyle
Edwards
Ellison
Engel
Farr
Fattah
Frank (MA)
Fudge
Garamendi
Gibson
Gonzalez
Green, Al
Grijalva
Grimm
Gutierrez
Hahn
Hanabusa
Hastings (FL)
Heinrich
Higgins
Himes
Hinchey
Hochul
Holt
Honda
Hoyer
Israel
Jackson (IL)
Jackson Lee (TX)
Johnson, E. B.
Kaptur
Keating
Kildee
Kind
King (NY)
Kissell
Kucinich
Langevin
Larsen (WA)
Larson (CT)
Lee (CA)
Levin
Lewis (GA)
Lipinski
Loebsack
Lofgren, Zoe
Lowey
Lujan
Lungren, Daniel E.
Lynch
Markey
Matsui
McCollum
McDermott
McGovern
McIntyre
Meehan
Meeks
Michaud
Miller (NC)
Miller, George
Moore
Moran
Nadler
Neal
Olver
Owens
Pallone
Pascrell
Pastor (AZ)
Pelosi
Perlmutter
Peters
Pingree (ME)
Polis
Price (NC)
Quigley
Reyes
Richardson
Richmond
Rothman (NJ)
Roybal-Allard
Ruppersberger
Rush
Ryan (OH)
Sanchez, Linda T.
Sanchez, Loretta
Sarbanes
Schakowsky
Schiff
Schwartz
Scott (VA)
Serrano
Sewell
Shuler
Smith (WA)
Speier
Stark
Sutton
Thompson (CA)
Thompson (MS)
Thornberry
Tierney
Tonko
Towns
Tsongas
Turner (NY)
Van Hollen
Velazquez
Visclosky
Walz (MN)
Wasserman Schultz
Waters
Watt
Waxman
Wilson (FL)
Woodall
Woolsey
Yarmuth
NOES--243
Adams
Aderholt
Akin
Alexander
Altmire
Amash
Amodei
Austria
Baca
Bachmann
Bachus
Barletta
Barrow
Bartlett
Barton (TX)
Bass (NH)
Benishek
Berg
Biggert
Bilbray
Bilirakis
Bishop (UT)
Black
Blackburn
Bonner
Bono Mack
Boustany
Brady (PA)
Brooks
Broun (GA)
Buchanan
Buerkle
Burgess
Burton (IN)
Calvert
Camp
Campbell
Capito
Carter
Cassidy
Chabot
Chaffetz
Coble
Cole
Conaway
Costello
Courtney
Cravaack
Crawford
Crenshaw
Crowley
Culberson
Denham
DesJarlais
Diaz-Balart
Dold
Donnelly (IN)
Dreier
Duffy
Duncan (SC)
Duncan (TN)
Ellmers
Emerson
Eshoo
Farenthold
Fincher
Fitzpatrick
Flake
Fleischmann
Fleming
Flores
Forbes
Fortenberry
Foxx
Franks (AZ)
Frelinghuysen
Gallegly
Gardner
Garrett
Gerlach
Gibbs
Gingrey (GA)
Gohmert
Goodlatte
Gosar
Gowdy
Granger
Graves (GA)
Graves (MO)
Green, Gene
Griffin (AR)
Griffith (VA)
Guinta
Guthrie
Hall
Hanna
Harper
Harris
Hartzler
Hastings (WA)
Hayworth
Heck
Hensarling
Herger
Herrera Beutler
Hinojosa
Huelskamp
Huizenga (MI)
Hultgren
Hunter
Hurt
Issa
Jenkins
Johnson (IL)
Johnson (OH)
Johnson, Sam
Jones
Jordan
Kelly
King (IA)
Kingston
Kinzinger (IL)
Kline
Labrador
Lamborn
Lance
Landry
Lankford
Latham
LaTourette
Latta
Lewis (CA)
LoBiondo
Long
Lucas
Luetkemeyer
Lummis
Mack
Manzullo
Marchant
Matheson
McCarthy (CA)
McCarthy (NY)
McCaul
McClintock
McCotter
McKeon
McKinley
McMorris Rodgers
McNerney
Mica
Miller (FL)
Miller (MI)
Miller, Gary
Mulvaney
Murphy (PA)
Myrick
Napolitano
Neugebauer
Noem
Nugent
Nunes
Nunnelee
Olson
Palazzo
Paulsen
Pearce
Peterson
Petri
Pitts
Platts
Poe (TX)
Pompeo
Posey
Price (GA)
Quayle
Rahall
Reed
Rehberg
Reichert
Renacci
Ribble
Rigell
Rivera
Roby
Roe (TN)
Rogers (AL)
Rogers (KY)
Rogers (MI)
Rohrabacher
Rokita
Rooney
Ros-Lehtinen
Roskam
Ross (AR)
Ross (FL)
Royce
Runyan
Ryan (WI)
Scalise
Schilling
Schmidt
Schock
Schrader
Schweikert
Scott (SC)
Scott, Austin
Sensenbrenner
Sessions
Sherman
Shimkus
Shuster
Simpson
Smith (NE)
Smith (NJ)
Smith (TX)
Southerland
Stearns
Stivers
Stutzman
Sullivan
Terry
Thompson (PA)
Tiberi
Tipton
Turner (OH)
Upton
Walberg
Walden
Walsh (IL)
Webster
Welch
West
Westmoreland
Whitfield
Wilson (SC)
Wittman
Wolf
Womack
Yoder
Young (AK)
Young (FL)
Young (IN)
NOT VOTING--21
Blumenauer
Bucshon
Canseco
Cantor
Cardoza
Clarke (NY)
Davis (KY)
Filner
Hirono
Holden
Johnson (GA)
Maloney
Marino
McHenry
Murphy (CT)
Paul
Pence
Rangel
Scott, David
Sires
Slaughter
{time} 1723
Messrs. ALEXANDER, COSTELLO, DUNCAN of South Carolina, REHBERG,
COURTNEY and PEARCE changed their vote from ``aye'' to ``no.''
Mr. BRADY of Texas, Ms. SEWELL, Ms. LORETTA SANCHEZ of California,
Mr. CONYERS, Ms. WATERS, Ms. McCOLLUM and Ms. PINGREE of Maine changed
their vote from ``no'' to ``aye.''
So the amendment was rejected.
The result of the vote was announced as above recorded.
Stated for:
Mr. FILNER. Mr. Chair, on rollcall 184, I was away from the Capitol
due to prior commitments to my constituents. Had I been present, I
would have voted ``aye.''
[[Page H2180]]
Amendment No. 4 Offered by Mr. Rogers of Michigan
The Acting CHAIR (Mr. Chaffetz). The unfinished business is the
demand for a recorded vote on the amendment offered by the gentleman
from Michigan (Mr. Rogers) on which further proceedings were postponed
and on which the ayes prevailed by voice vote.
The Clerk will redesignate the amendment.
The Clerk redesignated the amendment.
Recorded Vote
The Acting CHAIR. A recorded vote has been demanded.
A recorded vote was ordered.
The Acting CHAIR. This will be a 2-minute vote.
The vote was taken by electronic device, and there were--ayes 412,
noes 0, not voting 19, as follows:
[Roll No. 185]
AYES--412
Ackerman
Adams
Aderholt
Akin
Alexander
Altmire
Amash
Amodei
Andrews
Austria
Baca
Bachmann
Bachus
Baldwin
Barletta
Barrow
Bartlett
Barton (TX)
Bass (CA)
Bass (NH)
Becerra
Benishek
Berg
Berkley
Berman
Biggert
Bilbray
Bilirakis
Bishop (GA)
Bishop (NY)
Bishop (UT)
Black
Blackburn
Bonamici
Bonner
Bono Mack
Boren
Boswell
Boustany
Brady (PA)
Brady (TX)
Braley (IA)
Brooks
Broun (GA)
Brown (FL)
Buchanan
Buerkle
Burgess
Burton (IN)
Butterfield
Calvert
Camp
Campbell
Cantor
Capito
Capps
Capuano
Cardoza
Carnahan
Carney
Carson (IN)
Carter
Cassidy
Castor (FL)
Chabot
Chaffetz
Chandler
Chu
Cicilline
Clarke (MI)
Clay
Cleaver
Clyburn
Coble
Coffman (CO)
Cohen
Cole
Conaway
Connolly (VA)
Conyers
Cooper
Costa
Costello
Courtney
Cravaack
Crawford
Crenshaw
Critz
Crowley
Cuellar
Culberson
Cummings
Davis (CA)
Davis (IL)
DeFazio
DeGette
DeLauro
Denham
Dent
DesJarlais
Deutch
Diaz-Balart
Dicks
Dingell
Doggett
Dold
Donnelly (IN)
Doyle
Dreier
Duffy
Duncan (SC)
Duncan (TN)
Edwards
Ellison
Ellmers
Emerson
Engel
Eshoo
Farenthold
Farr
Fattah
Fincher
Fitzpatrick
Flake
Fleischmann
Fleming
Flores
Forbes
Fortenberry
Foxx
Frank (MA)
Franks (AZ)
Frelinghuysen
Fudge
Gallegly
Garamendi
Gardner
Garrett
Gerlach
Gibbs
Gibson
Gingrey (GA)
Gohmert
Gonzalez
Goodlatte
Gosar
Gowdy
Granger
Graves (GA)
Graves (MO)
Green, Al
Green, Gene
Griffin (AR)
Griffith (VA)
Grijalva
Grimm
Guinta
Guthrie
Gutierrez
Hahn
Hall
Hanabusa
Hanna
Harper
Harris
Hartzler
Hastings (FL)
Hastings (WA)
Hayworth
Heck
Heinrich
Hensarling
Herger
Herrera Beutler
Higgins
Himes
Hinchey
Hinojosa
Hochul
Holt
Honda
Hoyer
Huelskamp
Huizenga (MI)
Hultgren
Hunter
Hurt
Israel
Issa
Jackson (IL)
Jackson Lee (TX)
Jenkins
Johnson (IL)
Johnson (OH)
Johnson, E. B.
Johnson, Sam
Jones
Jordan
Kaptur
Keating
Kelly
Kildee
Kind
King (IA)
King (NY)
Kingston
Kinzinger (IL)
Kissell
Kline
Kucinich
Labrador
Lamborn
Lance
Langevin
Lankford
Larsen (WA)
Larson (CT)
Latham
LaTourette
Latta
Lee (CA)
Levin
Lewis (CA)
Lewis (GA)
Lipinski
LoBiondo
Loebsack
Lofgren, Zoe
Long
Lowey
Lucas
Luetkemeyer
Lujan
Lummis
Lungren, Daniel E.
Lynch
Mack
Manzullo
Marchant
Markey
Matheson
Matsui
McCarthy (CA)
McCarthy (NY)
McCaul
McClintock
McCollum
McCotter
McDermott
McGovern
McIntyre
McKeon
McKinley
McMorris Rodgers
McNerney
Meehan
Meeks
Mica
Michaud
Miller (FL)
Miller (MI)
Miller (NC)
Miller, Gary
Miller, George
Moore
Moran
Mulvaney
Murphy (CT)
Murphy (PA)
Myrick
Nadler
Napolitano
Neal
Neugebauer
Noem
Nugent
Nunes
Nunnelee
Olson
Olver
Owens
Palazzo
Pallone
Pascrell
Pastor (AZ)
Paulsen
Pearce
Pelosi
Perlmutter
Peters
Peterson
Petri
Pingree (ME)
Pitts
Platts
Poe (TX)
Polis
Pompeo
Posey
Price (GA)
Price (NC)
Quayle
Quigley
Rahall
Reed
Rehberg
Reichert
Renacci
Reyes
Ribble
Richardson
Richmond
Rigell
Rivera
Roby
Roe (TN)
Rogers (AL)
Rogers (KY)
Rogers (MI)
Rohrabacher
Rokita
Rooney
Ros-Lehtinen
Roskam
Ross (AR)
Ross (FL)
Rothman (NJ)
Roybal-Allard
Royce
Runyan
Ruppersberger
Rush
Ryan (OH)
Ryan (WI)
Sanchez, Linda T.
Sanchez, Loretta
Sarbanes
Scalise
Schakowsky
Schiff
Schilling
Schmidt
Schock
Schwartz
Schweikert
Scott (SC)
Scott (VA)
Scott, Austin
Scott, David
Sensenbrenner
Serrano
Sessions
Sewell
Sherman
Shimkus
Shuler
Shuster
Simpson
Smith (NE)
Smith (NJ)
Smith (TX)
Smith (WA)
Southerland
Speier
Stark
Stearns
Stivers
Stutzman
Sullivan
Sutton
Terry
Thompson (CA)
Thompson (MS)
Thompson (PA)
Thornberry
Tiberi
Tierney
Tipton
Tonko
Towns
Tsongas
Turner (NY)
Turner (OH)
Upton
Van Hollen
Velazquez
Visclosky
Walberg
Walden
Walsh (IL)
Walz (MN)
Wasserman Schultz
Waters
Watt
Waxman
Webster
Welch
West
Westmoreland
Whitfield
Wilson (FL)
Wilson (SC)
Wittman
Wolf
Womack
Woodall
Woolsey
Yarmuth
Yoder
Young (AK)
Young (FL)
Young (IN)
NOT VOTING--19
Blumenauer
Bucshon
Canseco
Clarke (NY)
Davis (KY)
Filner
Hirono
Holden
Johnson (GA)
Landry
Maloney
Marino
McHenry
Paul
Pence
Rangel
Schrader
Sires
Slaughter
{time} 1727
Mr. CUMMINGS changed his vote from ``no'' to ``aye.''
So the amendment was agreed to.
The result of the vote was announced as above recorded.
Stated for:
Mr. FILNER. Mr. Chair, on rollcall No. 185, I was away from the
Capitol due to prior commitments to my constituents. Had I been
present, I would have voted ``aye.''
Amendment No. 6 Offered by Mr. Quayle
The Acting CHAIR. The unfinished business is the demand for a
recorded vote on the amendment offered by the gentleman from Arizona
(Mr. Quayle) on which further proceedings were postponed and on which
the ayes prevailed by voice vote.
The Clerk will redesignate the amendment.
The Clerk redesignated the amendment.
Recorded Vote
The Acting CHAIR. A recorded vote has been demanded.
A recorded vote was ordered.
The Acting CHAIR. This will be a 2-minute vote.
The vote was taken by electronic device, and there were--ayes 410,
noes 3, not voting 18, as follows:
[Roll No. 186]
AYES--410
Ackerman
Adams
Aderholt
Akin
Alexander
Altmire
Amash
Amodei
Andrews
Austria
Baca
Bachmann
Bachus
Baldwin
Barletta
Barrow
Bartlett
Barton (TX)
Bass (CA)
Bass (NH)
Becerra
Benishek
Berg
Berkley
Berman
Biggert
Bilbray
Bilirakis
Bishop (GA)
Bishop (NY)
Bishop (UT)
Black
Blackburn
Bonamici
Bonner
Bono Mack
Boren
Boswell
Boustany
Brady (PA)
Brady (TX)
Braley (IA)
Brooks
Broun (GA)
Brown (FL)
Buchanan
Buerkle
Burgess
Burton (IN)
Butterfield
Calvert
Camp
Campbell
Cantor
Capito
Capps
Capuano
Cardoza
Carnahan
Carney
Carson (IN)
Carter
Cassidy
Castor (FL)
Chabot
Chaffetz
Chandler
Chu
Cicilline
Clarke (MI)
Clarke (NY)
Clay
Cleaver
Clyburn
Coble
Coffman (CO)
Cohen
Cole
Conaway
Connolly (VA)
Conyers
Cooper
Costa
Costello
Courtney
Cravaack
Crawford
Crenshaw
Critz
Crowley
Cuellar
Culberson
Cummings
Davis (CA)
Davis (IL)
DeFazio
DeGette
DeLauro
Denham
Dent
DesJarlais
Deutch
Diaz-Balart
Dicks
Dingell
Doggett
Dold
Donnelly (IN)
Doyle
Dreier
Duffy
Duncan (SC)
Duncan (TN)
Edwards
Ellison
Ellmers
Emerson
Engel
Eshoo
Farenthold
Farr
Fattah
Fincher
Fitzpatrick
Flake
Fleischmann
Fleming
Flores
Forbes
Fortenberry
Foxx
Frank (MA)
Franks (AZ)
Frelinghuysen
Fudge
Gallegly
Garamendi
Gardner
Garrett
Gerlach
Gibbs
Gibson
Gingrey (GA)
Gonzalez
Goodlatte
Gosar
Gowdy
Granger
Graves (GA)
Graves (MO)
Green, Al
Green, Gene
Griffin (AR)
Griffith (VA)
Grijalva
Grimm
Guinta
Guthrie
Gutierrez
Hahn
Hall
Hanabusa
Hanna
Harper
Harris
Hartzler
Hastings (FL)
Hastings (WA)
Hayworth
Heck
Heinrich
Hensarling
Herger
Herrera Beutler
Higgins
Himes
Hinchey
Hinojosa
Hochul
Holt
Honda
Hoyer
Huelskamp
Huizenga (MI)
Hultgren
Hunter
Hurt
Israel
Issa
Jackson (IL)
Jackson Lee (TX)
Jenkins
Johnson (IL)
Johnson (OH)
Johnson, E. B.
Johnson, Sam
Jones
Jordan
Kaptur
Keating
Kelly
Kildee
Kind
King (IA)
King (NY)
Kingston
Kinzinger (IL)
Kissell
Kline
Kucinich
Labrador
Lamborn
Lance
Landry
Langevin
Lankford
Larsen (WA)
Larson (CT)
Latham
LaTourette
Latta
[[Page H2181]]
Lee (CA)
Levin
Lewis (CA)
Lewis (GA)
Lipinski
LoBiondo
Loebsack
Long
Lowey
Lucas
Luetkemeyer
Lujan
Lummis
Lungren, Daniel E.
Lynch
Mack
Manzullo
Marchant
Markey
Matheson
Matsui
McCarthy (CA)
McCarthy (NY)
McCaul
McCollum
McCotter
McDermott
McGovern
McIntyre
McKeon
McKinley
McMorris Rodgers
McNerney
Meehan
Meeks
Mica
Michaud
Miller (FL)
Miller (MI)
Miller (NC)
Miller, Gary
Miller, George
Moore
Moran
Mulvaney
Murphy (CT)
Murphy (PA)
Myrick
Nadler
Napolitano
Neal
Neugebauer
Noem
Nugent
Nunes
Nunnelee
Olson
Olver
Owens
Palazzo
Pallone
Pascrell
Pastor (AZ)
Paulsen
Pearce
Pelosi
Perlmutter
Peters
Peterson
Petri
Pingree (ME)
Pitts
Platts
Poe (TX)
Polis
Pompeo
Posey
Price (GA)
Price (NC)
Quayle
Quigley
Rahall
Reed
Rehberg
Reichert
Renacci
Reyes
Ribble
Richardson
Richmond
Rigell
Rivera
Roby
Roe (TN)
Rogers (AL)
Rogers (KY)
Rogers (MI)
Rohrabacher
Rokita
Rooney
Ros-Lehtinen
Roskam
Ross (AR)
Ross (FL)
Rothman (NJ)
Roybal-Allard
Royce
Runyan
Ruppersberger
Rush
Ryan (OH)
Ryan (WI)
Sanchez, Linda T.
Sanchez, Loretta
Sarbanes
Scalise
Schakowsky
Schiff
Schilling
Schmidt
Schock
Schwartz
Schweikert
Scott (SC)
Scott (VA)
Scott, Austin
Scott, David
Sensenbrenner
Serrano
Sessions
Sewell
Sherman
Shimkus
Shuler
Shuster
Simpson
Smith (NE)
Smith (NJ)
Smith (TX)
Smith (WA)
Southerland
Speier
Stark
Stearns
Stivers
Stutzman
Sutton
Terry
Thompson (CA)
Thompson (MS)
Thompson (PA)
Thornberry
Tiberi
Tierney
Tipton
Tonko
Towns
Tsongas
Turner (NY)
Turner (OH)
Upton
Van Hollen
Velazquez
Visclosky
Walberg
Walden
Walsh (IL)
Walz (MN)
Wasserman Schultz
Waters
Watt
Waxman
Webster
Welch
West
Westmoreland
Whitfield
Wilson (FL)
Wilson (SC)
Wittman
Wolf
Womack
Woodall
Woolsey
Yarmuth
Yoder
Young (AK)
Young (FL)
Young (IN)
NOES--3
Gohmert
Lofgren, Zoe
McClintock
NOT VOTING--18
Blumenauer
Bucshon
Canseco
Davis (KY)
Filner
Hirono
Holden
Johnson (GA)
Maloney
Marino
McHenry
Paul
Pence
Rangel
Schrader
Sires
Slaughter
Sullivan
{time} 1731
So the amendment was agreed to.
The result of the vote was announced as above recorded.
Stated for:
Mr. FILNER. Mr. Chair, on rollcall 186, I was away from the Capitol
due to prior commitments to my constituents. Had I been present, I
would have voted ``aye.''
Amendment No. 7 Offered by Amash
The Acting CHAIR. The unfinished business is the demand for a
recorded vote on the amendment offered by the gentleman from Michigan
(Mr. Amash) on which further proceedings were postponed and on which
the ayes prevailed by voice vote.
The Clerk will redesignate the amendment.
The Clerk redesignated the amendment.
Recorded Vote
The Acting CHAIR. A recorded vote has been demanded.
A recorded vote was ordered.
The Acting CHAIR. This will be a 2-minute vote.
The vote was taken by electronic device, and there were--ayes 415,
noes 0, not voting 16, as follows:
[Roll No. 187]
AYES--415
Ackerman
Adams
Aderholt
Akin
Alexander
Altmire
Amash
Amodei
Andrews
Austria
Baca
Bachmann
Bachus
Baldwin
Barletta
Barrow
Bartlett
Barton (TX)
Bass (CA)
Bass (NH)
Becerra
Benishek
Berg
Berkley
Berman
Biggert
Bilbray
Bilirakis
Bishop (GA)
Bishop (NY)
Bishop (UT)
Black
Blackburn
Bonamici
Bonner
Bono Mack
Boren
Boswell
Boustany
Brady (PA)
Brady (TX)
Braley (IA)
Brooks
Broun (GA)
Brown (FL)
Buchanan
Buerkle
Burgess
Burton (IN)
Butterfield
Calvert
Camp
Campbell
Cantor
Capito
Capps
Capuano
Cardoza
Carnahan
Carney
Carson (IN)
Carter
Cassidy
Castor (FL)
Chabot
Chaffetz
Chandler
Chu
Cicilline
Clarke (MI)
Clarke (NY)
Clay
Cleaver
Clyburn
Coble
Coffman (CO)
Cohen
Cole
Conaway
Connolly (VA)
Conyers
Cooper
Costa
Costello
Courtney
Cravaack
Crawford
Crenshaw
Critz
Crowley
Cuellar
Culberson
Cummings
Davis (CA)
Davis (IL)
DeFazio
DeGette
DeLauro
Denham
Dent
DesJarlais
Deutch
Diaz-Balart
Dicks
Dingell
Doggett
Dold
Donnelly (IN)
Doyle
Dreier
Duffy
Duncan (SC)
Duncan (TN)
Edwards
Ellison
Ellmers
Emerson
Engel
Eshoo
Farenthold
Farr
Fattah
Fincher
Fitzpatrick
Flake
Fleischmann
Fleming
Flores
Forbes
Fortenberry
Foxx
Frank (MA)
Franks (AZ)
Frelinghuysen
Fudge
Gallegly
Garamendi
Gardner
Garrett
Gerlach
Gibbs
Gibson
Gingrey (GA)
Gohmert
Gonzalez
Goodlatte
Gosar
Gowdy
Granger
Graves (GA)
Graves (MO)
Green, Al
Green, Gene
Griffin (AR)
Griffith (VA)
Grijalva
Grimm
Guinta
Guthrie
Gutierrez
Hahn
Hall
Hanabusa
Hanna
Harper
Harris
Hartzler
Hastings (FL)
Hastings (WA)
Hayworth
Heck
Heinrich
Hensarling
Herger
Herrera Beutler
Higgins
Himes
Hinchey
Hinojosa
Hochul
Holt
Honda
Hoyer
Huelskamp
Huizenga (MI)
Hultgren
Hunter
Hurt
Israel
Issa
Jackson (IL)
Jackson Lee (TX)
Jenkins
Johnson (IL)
Johnson (OH)
Johnson, E. B.
Johnson, Sam
Jones
Jordan
Kaptur
Keating
Kelly
Kildee
Kind
King (IA)
King (NY)
Kingston
Kinzinger (IL)
Kissell
Kline
Kucinich
Labrador
Lamborn
Lance
Landry
Langevin
Lankford
Larsen (WA)
Larson (CT)
Latham
LaTourette
Latta
Lee (CA)
Levin
Lewis (CA)
Lewis (GA)
Lipinski
LoBiondo
Loebsack
Lofgren, Zoe
Long
Lowey
Lucas
Luetkemeyer
Lujan
Lummis
Lungren, Daniel E.
Lynch
Mack
Manzullo
Marchant
Markey
Matheson
Matsui
McCarthy (CA)
McCarthy (NY)
McCaul
McClintock
McCollum
McCotter
McDermott
McGovern
McIntyre
McKeon
McKinley
McMorris Rodgers
McNerney
Meehan
Meeks
Mica
Michaud
Miller (FL)
Miller (MI)
Miller (NC)
Miller, Gary
Miller, George
Moore
Moran
Mulvaney
Murphy (CT)
Murphy (PA)
Myrick
Nadler
Napolitano
Neal
Neugebauer
Noem
Nugent
Nunes
Nunnelee
Olson
Olver
Owens
Palazzo
Pallone
Pascrell
Pastor (AZ)
Paulsen
Pearce
Pelosi
Perlmutter
Peters
Peterson
Petri
Pingree (ME)
Pitts
Platts
Poe (TX)
Polis
Pompeo
Posey
Price (GA)
Price (NC)
Quayle
Quigley
Rahall
Reed
Rehberg
Reichert
Renacci
Reyes
Ribble
Richardson
Richmond
Rigell
Rivera
Roby
Roe (TN)
Rogers (AL)
Rogers (KY)
Rogers (MI)
Rohrabacher
Rokita
Rooney
Ros-Lehtinen
Roskam
Ross (AR)
Ross (FL)
Rothman (NJ)
Roybal-Allard
Royce
Runyan
Ruppersberger
Rush
Ryan (OH)
Ryan (WI)
Sanchez, Linda T.
Sanchez, Loretta
Sarbanes
Scalise
Schakowsky
Schiff
Schilling
Schmidt
Schock
Schrader
Schwartz
Schweikert
Scott (SC)
Scott (VA)
Scott, Austin
Scott, David
Sensenbrenner
Serrano
Sessions
Sewell
Sherman
Shimkus
Shuler
Shuster
Simpson
Smith (NE)
Smith (NJ)
Smith (TX)
Smith (WA)
Southerland
Speier
Stark
Stearns
Stivers
Stutzman
Sullivan
Sutton
Terry
Thompson (CA)
Thompson (MS)
Thompson (PA)
Thornberry
Tiberi
Tierney
Tipton
Tonko
Towns
Tsongas
Turner (NY)
Turner (OH)
Upton
Van Hollen
Velazquez
Visclosky
Walberg
Walden
Walsh (IL)
Walz (MN)
Wasserman Schultz
Waters
Watt
Waxman
Webster
Welch
West
Westmoreland
Whitfield
Wilson (FL)
Wilson (SC)
Wittman
Wolf
Womack
Woodall
Woolsey
Yarmuth
Yoder
Young (AK)
Young (FL)
Young (IN)
NOT VOTING--16
Blumenauer
Bucshon
Canseco
Davis (KY)
Filner
Hirono
Holden
Johnson (GA)
Maloney
Marino
McHenry
Paul
Pence
Rangel
Sires
Slaughter
{time} 1736
So the amendment was agreed to.
The result of the vote was announced as above recorded.
Stated for:
Mr. FILNER. Mr. Chair, on rollcall 187, I was away from the Capitol
due to prior commitments to my constituents. Had I been present, I
would have voted ``aye.''
Amendment No. 8 Offered by Mr. Mulvaney
The Acting CHAIR. The unfinished business is the demand for a
recorded vote on the amendment offered by the gentleman from South
Carolina (Mr. Mulvaney) on which further proceedings were postponed and
on which the ayes prevailed by voice vote.
The Clerk will redesignate the amendment.
The Clerk redesignated the amendment.
[[Page H2182]]
Recorded Vote
The Acting CHAIR. A recorded vote has been demanded.
A recorded vote was ordered.
The Acting CHAIR. This will be a 2-minute vote.
The vote was taken by electronic device, and there were--ayes 416,
noes 0, not voting 15, as follows:
[Roll No. 188]
AYES--416
Ackerman
Adams
Aderholt
Akin
Alexander
Altmire
Amash
Amodei
Andrews
Austria
Baca
Bachmann
Bachus
Baldwin
Barletta
Barrow
Bartlett
Barton (TX)
Bass (CA)
Bass (NH)
Becerra
Benishek
Berg
Berkley
Berman
Biggert
Bilbray
Bilirakis
Bishop (GA)
Bishop (NY)
Bishop (UT)
Black
Blackburn
Bonamici
Bonner
Bono Mack
Boren
Boswell
Boustany
Brady (PA)
Brady (TX)
Braley (IA)
Brooks
Broun (GA)
Brown (FL)
Buchanan
Buerkle
Burgess
Burton (IN)
Butterfield
Calvert
Camp
Campbell
Cantor
Capito
Capps
Capuano
Cardoza
Carnahan
Carney
Carson (IN)
Carter
Cassidy
Castor (FL)
Chabot
Chaffetz
Chandler
Chu
Cicilline
Clarke (MI)
Clarke (NY)
Clay
Cleaver
Clyburn
Coble
Coffman (CO)
Cohen
Cole
Conaway
Connolly (VA)
Conyers
Cooper
Costa
Costello
Courtney
Cravaack
Crawford
Crenshaw
Critz
Crowley
Cuellar
Culberson
Cummings
Davis (CA)
Davis (IL)
DeFazio
DeGette
DeLauro
Denham
Dent
DesJarlais
Deutch
Diaz-Balart
Dicks
Dingell
Doggett
Dold
Donnelly (IN)
Doyle
Dreier
Duffy
Duncan (SC)
Duncan (TN)
Edwards
Ellison
Ellmers
Emerson
Engel
Eshoo
Farenthold
Farr
Fattah
Fincher
Fitzpatrick
Flake
Fleischmann
Fleming
Flores
Forbes
Fortenberry
Foxx
Frank (MA)
Franks (AZ)
Frelinghuysen
Fudge
Gallegly
Garamendi
Gardner
Garrett
Gerlach
Gibbs
Gibson
Gingrey (GA)
Gohmert
Gonzalez
Goodlatte
Gosar
Gowdy
Granger
Graves (GA)
Graves (MO)
Green, Al
Green, Gene
Griffin (AR)
Griffith (VA)
Grijalva
Grimm
Guinta
Guthrie
Gutierrez
Hahn
Hall
Hanabusa
Hanna
Harper
Harris
Hartzler
Hastings (FL)
Hastings (WA)
Hayworth
Heck
Heinrich
Hensarling
Herger
Herrera Beutler
Higgins
Himes
Hinchey
Hinojosa
Hochul
Holt
Honda
Hoyer
Huelskamp
Huizenga (MI)
Hultgren
Hunter
Hurt
Israel
Issa
Jackson (IL)
Jackson Lee (TX)
Jenkins
Johnson (GA)
Johnson (IL)
Johnson (OH)
Johnson, E. B.
Johnson, Sam
Jones
Jordan
Kaptur
Keating
Kelly
Kildee
Kind
King (IA)
King (NY)
Kingston
Kinzinger (IL)
Kissell
Kline
Kucinich
Labrador
Lamborn
Lance
Landry
Langevin
Lankford
Larsen (WA)
Larson (CT)
Latham
LaTourette
Latta
Lee (CA)
Levin
Lewis (CA)
Lewis (GA)
Lipinski
LoBiondo
Loebsack
Lofgren, Zoe
Long
Lowey
Lucas
Luetkemeyer
Lujan
Lummis
Lungren, Daniel E.
Lynch
Mack
Manzullo
Marchant
Markey
Matheson
Matsui
McCarthy (CA)
McCarthy (NY)
McCaul
McClintock
McCollum
McCotter
McDermott
McGovern
McIntyre
McKeon
McKinley
McMorris Rodgers
McNerney
Meehan
Meeks
Mica
Michaud
Miller (FL)
Miller (MI)
Miller (NC)
Miller, Gary
Miller, George
Moore
Moran
Mulvaney
Murphy (CT)
Murphy (PA)
Myrick
Nadler
Napolitano
Neal
Neugebauer
Noem
Nugent
Nunes
Nunnelee
Olson
Olver
Owens
Palazzo
Pallone
Pascrell
Pastor (AZ)
Paulsen
Pearce
Pelosi
Perlmutter
Peters
Peterson
Petri
Pingree (ME)
Pitts
Platts
Poe (TX)
Polis
Pompeo
Posey
Price (GA)
Price (NC)
Quayle
Quigley
Rahall
Reed
Rehberg
Reichert
Renacci
Reyes
Ribble
Richardson
Richmond
Rigell
Rivera
Roby
Roe (TN)
Rogers (AL)
Rogers (KY)
Rogers (MI)
Rohrabacher
Rokita
Rooney
Ros-Lehtinen
Roskam
Ross (AR)
Ross (FL)
Rothman (NJ)
Roybal-Allard
Royce
Runyan
Ruppersberger
Rush
Ryan (OH)
Ryan (WI)
Sanchez, Linda T.
Sanchez, Loretta
Sarbanes
Scalise
Schakowsky
Schiff
Schilling
Schmidt
Schock
Schrader
Schwartz
Schweikert
Scott (SC)
Scott (VA)
Scott, Austin
Scott, David
Sensenbrenner
Serrano
Sessions
Sewell
Sherman
Shimkus
Shuler
Shuster
Simpson
Smith (NE)
Smith (NJ)
Smith (TX)
Smith (WA)
Southerland
Speier
Stark
Stearns
Stivers
Stutzman
Sullivan
Sutton
Terry
Thompson (CA)
Thompson (MS)
Thompson (PA)
Thornberry
Tiberi
Tierney
Tipton
Tonko
Towns
Tsongas
Turner (NY)
Turner (OH)
Upton
Van Hollen
Velazquez
Visclosky
Walberg
Walden
Walsh (IL)
Walz (MN)
Wasserman Schultz
Waters
Watt
Waxman
Webster
Welch
West
Westmoreland
Whitfield
Wilson (FL)
Wilson (SC)
Wittman
Wolf
Womack
Woodall
Woolsey
Yarmuth
Yoder
Young (AK)
Young (FL)
Young (IN)
NOT VOTING--15
Blumenauer
Bucshon
Canseco
Davis (KY)
Filner
Hirono
Holden
Maloney
Marino
McHenry
Paul
Pence
Rangel
Sires
Slaughter
{time} 1740
So the amendment was agreed to.
The result of the vote was announced as above recorded.
Stated for:
Mr. FILNER. Mr. Chair, on rollcall 188, I was away from the Capitol
due to prior commitments to my constituents. Had I been present, I
would have voted ``aye.''
Amendment No. 13 Offered by Mr. Goodlatte
The Acting CHAIR. The unfinished business is the demand for a
recorded vote on the amendment offered by the gentleman from Virginia
(Mr. Goodlatte) on which further proceedings were postponed and on
which the ayes prevailed by voice vote.
The Clerk will redesignate the amendment.
The Clerk redesignated the amendment.
Recorded Vote
The Acting CHAIR. A recorded vote has been demanded.
A recorded vote was ordered.
The Acting CHAIR. This will be a 2-minute vote.
The vote was taken by electronic device, and there were--ayes 414,
noes 1, not voting 16, as follows:
[Roll No. 189]
AYES--414
Ackerman
Adams
Aderholt
Alexander
Altmire
Amash
Amodei
Andrews
Austria
Baca
Bachmann
Bachus
Baldwin
Barletta
Barrow
Bartlett
Barton (TX)
Bass (CA)
Bass (NH)
Becerra
Benishek
Berg
Berkley
Berman
Biggert
Bilbray
Bilirakis
Bishop (GA)
Bishop (NY)
Bishop (UT)
Black
Blackburn
Bonamici
Bonner
Bono Mack
Boren
Boswell
Boustany
Brady (PA)
Brady (TX)
Braley (IA)
Brooks
Broun (GA)
Brown (FL)
Buchanan
Buerkle
Burgess
Burton (IN)
Butterfield
Calvert
Camp
Campbell
Cantor
Capito
Capps
Capuano
Cardoza
Carnahan
Carney
Carson (IN)
Carter
Cassidy
Castor (FL)
Chabot
Chaffetz
Chandler
Chu
Cicilline
Clarke (MI)
Clarke (NY)
Clay
Cleaver
Clyburn
Coble
Coffman (CO)
Cohen
Cole
Conaway
Connolly (VA)
Conyers
Cooper
Costa
Costello
Courtney
Cravaack
Crawford
Crenshaw
Critz
Crowley
Cuellar
Culberson
Cummings
Davis (CA)
Davis (IL)
DeFazio
DeGette
DeLauro
Denham
Dent
DesJarlais
Deutch
Diaz-Balart
Dicks
Dingell
Doggett
Dold
Donnelly (IN)
Doyle
Dreier
Duffy
Duncan (SC)
Duncan (TN)
Edwards
Ellison
Ellmers
Emerson
Engel
Eshoo
Farenthold
Farr
Fattah
Fincher
Fitzpatrick
Flake
Fleischmann
Fleming
Flores
Forbes
Fortenberry
Foxx
Frank (MA)
Franks (AZ)
Frelinghuysen
Fudge
Gallegly
Garamendi
Gardner
Garrett
Gerlach
Gibbs
Gibson
Gingrey (GA)
Gohmert
Gonzalez
Goodlatte
Gosar
Gowdy
Granger
Graves (GA)
Graves (MO)
Green, Al
Green, Gene
Griffin (AR)
Griffith (VA)
Grijalva
Grimm
Guinta
Guthrie
Gutierrez
Hahn
Hall
Hanabusa
Hanna
Harper
Harris
Hartzler
Hastings (FL)
Hastings (WA)
Hayworth
Heck
Heinrich
Hensarling
Herger
Herrera Beutler
Higgins
Himes
Hinchey
Hinojosa
Hochul
Holt
Honda
Hoyer
Huelskamp
Huizenga (MI)
Hultgren
Hunter
Hurt
Israel
Issa
Jackson (IL)
Jackson Lee (TX)
Jenkins
Johnson (GA)
Johnson (IL)
Johnson (OH)
Johnson, E. B.
Johnson, Sam
Jones
Jordan
Kaptur
Keating
Kelly
Kildee
Kind
King (IA)
King (NY)
Kingston
Kinzinger (IL)
Kissell
Kline
Kucinich
Labrador
Lamborn
Lance
Landry
Langevin
Lankford
Larsen (WA)
Larson (CT)
Latham
LaTourette
Latta
Lee (CA)
Levin
Lewis (CA)
Lewis (GA)
Lipinski
LoBiondo
Loebsack
Long
Lowey
Lucas
Luetkemeyer
Lujan
Lummis
Lungren, Daniel E.
Lynch
Mack
Manzullo
Marchant
Markey
Matheson
Matsui
McCarthy (CA)
McCarthy (NY)
McCaul
McClintock
McCollum
McCotter
McDermott
McGovern
McIntyre
McKeon
McKinley
McMorris Rodgers
McNerney
Meehan
Meeks
Mica
Michaud
Miller (FL)
Miller (MI)
Miller (NC)
Miller, Gary
Miller, George
Moore
Moran
Mulvaney
Murphy (CT)
Murphy (PA)
Myrick
Nadler
Napolitano
[[Page H2183]]
Neal
Neugebauer
Noem
Nugent
Nunes
Nunnelee
Olson
Olver
Owens
Palazzo
Pallone
Pascrell
Pastor (AZ)
Paulsen
Pearce
Pelosi
Perlmutter
Peters
Peterson
Petri
Pingree (ME)
Pitts
Platts
Poe (TX)
Polis
Pompeo
Posey
Price (GA)
Price (NC)
Quayle
Quigley
Rahall
Reed
Rehberg
Reichert
Renacci
Reyes
Ribble
Richardson
Richmond
Rigell
Rivera
Roby
Roe (TN)
Rogers (AL)
Rogers (KY)
Rogers (MI)
Rohrabacher
Rokita
Rooney
Ros-Lehtinen
Roskam
Ross (AR)
Ross (FL)
Rothman (NJ)
Roybal-Allard
Royce
Runyan
Ruppersberger
Rush
Ryan (OH)
Ryan (WI)
Sanchez, Linda T.
Sanchez, Loretta
Sarbanes
Scalise
Schakowsky
Schiff
Schilling
Schmidt
Schock
Schrader
Schwartz
Schweikert
Scott (SC)
Scott (VA)
Scott, Austin
Scott, David
Sensenbrenner
Serrano
Sessions
Sewell
Sherman
Shimkus
Shuler
Shuster
Simpson
Smith (NE)
Smith (NJ)
Smith (TX)
Smith (WA)
Southerland
Speier
Stark
Stearns
Stivers
Stutzman
Sullivan
Sutton
Terry
Thompson (CA)
Thompson (MS)
Thompson (PA)
Thornberry
Tiberi
Tierney
Tipton
Tonko
Towns
Tsongas
Turner (NY)
Turner (OH)
Upton
Van Hollen
Velazquez
Visclosky
Walberg
Walden
Walsh (IL)
Walz (MN)
Wasserman Schultz
Waters
Watt
Waxman
Webster
Welch
West
Westmoreland
Whitfield
Wilson (FL)
Wilson (SC)
Wittman
Wolf
Womack
Woodall
Woolsey
Yarmuth
Yoder
Young (AK)
Young (FL)
Young (IN)
NOES--1
Lofgren, Zoe
NOT VOTING--16
Akin
Blumenauer
Bucshon
Canseco
Davis (KY)
Filner
Hirono
Holden
Maloney
Marino
McHenry
Paul
Pence
Rangel
Sires
Slaughter
{time} 1744
So the amendment was agreed to.
The result of the vote was announced as above recorded.
Stated for:
Mr. FILNER. Mr. Chair, on rollcall 189, I was away from the Capitol
due to prior commitments to my constituents. Had I been present, I
would have voted ``aye.''
Amendment No. 15 Offered by Mr. Mulvaney
The Acting CHAIR. The unfinished business is the demand for a
recorded vote on the amendment offered by the gentleman from South
Carolina (Mr. Mulvaney) on which further proceedings were postponed and
on which the ayes prevailed by voice vote.
The Clerk will redesignate the amendment.
The Clerk redesignated the amendment.
Recorded Vote
The Acting CHAIR. A recorded vote has been demanded.
A recorded vote was ordered.
The Acting CHAIR. This will be a 2-minute vote.
The vote was taken by electronic device, and there were--ayes 413,
noes 3, not voting 15, as follows:
[Roll No. 190]
AYES--413
Ackerman
Adams
Aderholt
Akin
Alexander
Altmire
Amash
Amodei
Andrews
Austria
Baca
Bachmann
Bachus
Baldwin
Barletta
Barrow
Bartlett
Barton (TX)
Bass (CA)
Bass (NH)
Becerra
Benishek
Berg
Berkley
Berman
Biggert
Bilbray
Bilirakis
Bishop (GA)
Bishop (NY)
Bishop (UT)
Black
Blackburn
Bonamici
Bonner
Bono Mack
Boren
Boswell
Boustany
Brady (PA)
Brady (TX)
Braley (IA)
Brooks
Broun (GA)
Brown (FL)
Buchanan
Buerkle
Burgess
Burton (IN)
Butterfield
Calvert
Camp
Campbell
Cantor
Capito
Capps
Capuano
Cardoza
Carnahan
Carney
Carson (IN)
Carter
Cassidy
Castor (FL)
Chabot
Chaffetz
Chandler
Chu
Cicilline
Clarke (MI)
Clarke (NY)
Clay
Cleaver
Clyburn
Coble
Coffman (CO)
Cohen
Cole
Conaway
Connolly (VA)
Conyers
Cooper
Costa
Costello
Courtney
Cravaack
Crawford
Crenshaw
Critz
Crowley
Cuellar
Culberson
Cummings
Davis (CA)
Davis (IL)
DeFazio
DeGette
DeLauro
Denham
Dent
DesJarlais
Deutch
Diaz-Balart
Dicks
Doggett
Dold
Donnelly (IN)
Doyle
Dreier
Duffy
Duncan (SC)
Duncan (TN)
Edwards
Ellison
Ellmers
Emerson
Engel
Eshoo
Farenthold
Farr
Fattah
Fincher
Fitzpatrick
Flake
Fleischmann
Fleming
Flores
Forbes
Fortenberry
Foxx
Frank (MA)
Franks (AZ)
Frelinghuysen
Fudge
Gallegly
Garamendi
Gardner
Garrett
Gerlach
Gibbs
Gibson
Gingrey (GA)
Gohmert
Gonzalez
Goodlatte
Gosar
Gowdy
Granger
Graves (GA)
Graves (MO)
Green, Al
Green, Gene
Griffin (AR)
Griffith (VA)
Grijalva
Grimm
Guinta
Guthrie
Gutierrez
Hahn
Hall
Hanabusa
Hanna
Harper
Harris
Hartzler
Hastings (FL)
Hastings (WA)
Hayworth
Heck
Heinrich
Hensarling
Herger
Herrera Beutler
Higgins
Himes
Hinchey
Hinojosa
Hochul
Holt
Honda
Hoyer
Huelskamp
Huizenga (MI)
Hultgren
Hunter
Hurt
Israel
Issa
Jackson (IL)
Jackson Lee (TX)
Jenkins
Johnson (GA)
Johnson (IL)
Johnson (OH)
Johnson, E. B.
Johnson, Sam
Jones
Jordan
Kaptur
Keating
Kelly
Kildee
Kind
King (IA)
King (NY)
Kingston
Kinzinger (IL)
Kissell
Kline
Kucinich
Labrador
Lamborn
Lance
Landry
Langevin
Lankford
Larsen (WA)
Larson (CT)
Latham
LaTourette
Latta
Lee (CA)
Levin
Lewis (CA)
Lewis (GA)
Lipinski
LoBiondo
Loebsack
Lofgren, Zoe
Long
Lowey
Lucas
Luetkemeyer
Lujan
Lummis
Lungren, Daniel E.
Lynch
Mack
Manzullo
Marchant
Markey
Matheson
Matsui
McCarthy (CA)
McCarthy (NY)
McCaul
McClintock
McCollum
McCotter
McDermott
McGovern
McIntyre
McKeon
McKinley
McMorris Rodgers
McNerney
Meehan
Meeks
Mica
Michaud
Miller (FL)
Miller (MI)
Miller (NC)
Miller, Gary
Miller, George
Moore
Moran
Mulvaney
Murphy (CT)
Murphy (PA)
Myrick
Nadler
Napolitano
Neal
Neugebauer
Noem
Nugent
Nunes
Nunnelee
Olson
Olver
Owens
Palazzo
Pallone
Pascrell
Pastor (AZ)
Paulsen
Pearce
Pelosi
Perlmutter
Peters
Peterson
Petri
Pingree (ME)
Pitts
Platts
Poe (TX)
Polis
Pompeo
Posey
Price (GA)
Price (NC)
Quayle
Quigley
Rahall
Reed
Rehberg
Reichert
Renacci
Reyes
Ribble
Richardson
Richmond
Rigell
Rivera
Roby
Roe (TN)
Rogers (AL)
Rogers (KY)
Rogers (MI)
Rohrabacher
Rokita
Rooney
Ros-Lehtinen
Roskam
Ross (AR)
Ross (FL)
Rothman (NJ)
Roybal-Allard
Royce
Runyan
Ruppersberger
Rush
Ryan (OH)
Ryan (WI)
Sanchez, Linda T.
Sanchez, Loretta
Sarbanes
Scalise
Schakowsky
Schiff
Schilling
Schmidt
Schock
Schwartz
Schweikert
Scott (SC)
Scott (VA)
Scott, Austin
Scott, David
Sensenbrenner
Serrano
Sessions
Sewell
Sherman
Shimkus
Shuler
Shuster
Simpson
Smith (NE)
Smith (NJ)
Smith (TX)
Smith (WA)
Southerland
Speier
Stark
Stearns
Stivers
Stutzman
Sullivan
Sutton
Terry
Thompson (CA)
Thompson (MS)
Thompson (PA)
Thornberry
Tiberi
Tierney
Tipton
Tonko
Towns
Tsongas
Turner (OH)
Upton
Van Hollen
Velazquez
Visclosky
Walberg
Walden
Walsh (IL)
Walz (MN)
Wasserman Schultz
Waters
Watt
Waxman
Webster
Welch
West
Westmoreland
Whitfield
Wilson (FL)
Wilson (SC)
Wittman
Wolf
Womack
Woodall
Woolsey
Yarmuth
Yoder
Young (AK)
Young (FL)
Young (IN)
NOES--3
Dingell
Schrader
Turner (NY)
NOT VOTING--15
Blumenauer
Bucshon
Canseco
Davis (KY)
Filner
Hirono
Holden
Maloney
Marino
McHenry
Paul
Pence
Rangel
Sires
Slaughter
{time} 1747
So the amendment was agreed to.
The result of the vote was announced as above recorded.
Stated for:
Mr. FILNER. Mr. Chair, on rollcall 190, I was away from the Capitol
due to prior commitments to my constituents. Had I been present, I
would have voted ``aye.''
The Acting CHAIR. The question is on the amendment in the nature of a
substitute, as amended.
The amendment was agreed to.
The Acting CHAIR. Under the rule, the Committee rises.
Accordingly, the Committee rose; and the Speaker pro tempore (Mr.
Woodall) having assumed the chair, Mr. Chaffetz, Acting Chair of the
Committee of the Whole House on the state of the Union, reported that
that Committee, having had under consideration the bill (H.R. 3523) to
provide for the sharing of certain cyber threat intelligence and cyber
threat information between the intelligence community and cybersecurity
entities, and for other purposes, and, pursuant to House Resolution
631, he reported the bill back to the House with an amendment adopted
in the Committee of the Whole.
The SPEAKER pro tempore. Under the rule, the previous question is
ordered.
[[Page H2184]]
Is a separate vote demanded on any amendment to the amendment
reported from the Committee of the Whole?
If not, the question is on the amendment in the nature of a
substitute, as amended.
The amendment was agreed to.
The SPEAKER pro tempore. The question is on the engrossment and third
reading of the bill.
The bill was ordered to be engrossed and read a third time, and was
read the third time.
Motion to Recommit
Mr. PERLMUTTER. Mr. Speaker, I have a motion to recommit at the desk.
The SPEAKER pro tempore. Is the gentleman opposed to the bill?
Mr. PERLMUTTER. In its current form, I am.
The SPEAKER pro tempore. The Clerk will report the motion to
recommit.
The Clerk read as follows:
Mr. Perlmutter moves to recommit the bill, H.R. 3523, to
the Permanent Select Committee on Intelligence with
instructions to report the same back to the House forthwith
with the following amendments:
At the end of the bill, add the following new section:
SEC. 3. PROTECTING THE PRIVACY OF INTERNET PASSWORDS AND THE
CREATIVITY OF THE INTERNET.
Nothing in this Act or the amendments made by this Act
shall be construed to--
(1) permit an employer, a prospective employer, or the
Federal Government to require the disclosure of a
confidential password for a social networking website or a
personal account of an employee or job applicant without a
court order; or
(2) permit the Federal Government to establish a mechanism
to control United States citizens' access to and use of the
Internet through the creation of a national Internet firewall
similar to the ``Great Internet Firewall of China'', as
determined by the Director of the National Intelligence.
Page 12, line 22, strike ``and''.
Page 12, line 25, strike the period and insert a semicolon.
Page 12, after line 25, insert the following:
``(G) the number of Americans who have--
``(i) been required by employers, prospective employers, or
the Federal Government to release confidential passwords for
social networking websites; and
``(ii) had personal information released to the Federal
Government under this section or obtained in connection with
a cybersecurity breach; and
``(H) the impact of the information that has been released
or obtained as referred to in subparagraph (G) on privacy,
electronic commerce, Internet usage, and online content.
The SPEAKER pro tempore. The gentleman from Colorado is recognized
for 5 minutes.
Mr. PERLMUTTER. Mr. Speaker, the House has heard this before. It's
very simple, sweet and direct, and I will take a moment and just read
it so that everybody has a chance to understand it again. What we're
doing is avoiding and prohibiting an employer, as a condition of
employment, from demanding a confidential Facebook password--Twitter,
Tumblr--or any social media of the like. It reads this way:
Nothing in this act or the amendments made by this act
shall be construed to permit an employer, a prospective
employer, or the Federal Government to require the disclosure
of a confidential password for a social networking Web site
or a personal account of an employee or job applicant without
a court order; or permit the Federal Government to establish
a mechanism to control United States citizens' access to and
use of the Internet through the creation of a national
Internet firewall, similar to the ``Great Internet Firewall
of China'', as determined by the Director of National
Intelligence.
So what this amendment does is two things. It is the final amendment
to this bill. There are no more amendments to this bill. I know some
people voted against this amendment when it was brought up a couple of
weeks ago; and for those of you who regret voting against it, you're
going to get a chance to correct that vote. This is something I've been
working on with Mr. Heinrich and Mr. McHenry. It just says we're not
going to allow as a condition of employment the requirement of a
Facebook password or the like. Now, there is a reason for this.
One, there is all sorts of personal information that I may have or
that somebody else may have with respect to Facebook or Twitter or
LinkedIn, whatever it might be; and they're entitled to have an
expectation of privacy, a sense that their freedom of speech--their
freedom to peaceably assemble, in effect--is not violated. So that's
the first reason.
The second reason is if an employer or the Federal Government poses
as somebody, by having their Facebook passwords, then they can
impersonate; they can become imposters. It is a two-way exchange of
information so that somebody who is completely unrelated to the
employment now is communicating with an impostor. That's another reason
for this.
The third reason is for the employers, themselves, to avoid liability
by learning information that may then cause them to take actions that
would violate a protected group. So there are at least three good
reasons to do this.
We have precedent in our law, and it is the Employee Polygraph
Protection Act of 1988. We said we're not going to allow as a condition
of employment the use of lie detectors. You can use background checks,
and you can use references. There are plenty of vehicles by which to
check out somebody's employment references; but we're not going to
allow lie detectors, and we should not allow that the Facebook
passwords be given up as a condition of employment. So we have
precedent in the law. We don't allow polygraphs or lie detectors as a
condition of employment. Let's use what we already have--background
checks, references, et cetera.
The second piece of this is that we will not allow the command and
control of the Internet or access to the Internet by the United States
Government, saying that which is similar: that we want to avoid what
has happened in China, that we want to avoid what has happened in Iran.
We don't want the Internet taken down and our access, individuals'
access, to the Internet broken.
So there are two pieces to this. One is not allowing the demand of a
confidential password and not allowing the government to have the
command and control and the ability to take down the Internet, an
action similar to what we've seen in other countries.
This is a very simple amendment. It's very straightforward. We've had
a lot of amendments that have garnered the support of virtually every
Member of this House. This should be one of those. This is the final
amendment. I would hope that we would uphold the Constitution by
passing this amendment, as well as by making sure that the Internet is
available to anyone who wants to use it at any time.
With that, I yield back the balance of my time.
Mr. ROGERS of Michigan. I rise in opposition to the motion to
recommit.
The SPEAKER pro tempore. The gentleman is recognized for 5 minutes.
Mr. ROGERS of Michigan. Today, 300,000 times somebody will be trying
to get into our credit card companies--300,000 times, one company. In
just the last few years, just in defense contractors, foreign nation-
states have stolen more intellectual property, which will end up
protecting this country, equivalent to 50 times the print collection of
our U.S. Library of Congress. Anonymous is attacking businesses, and
today attacked Wall Street because they're anti-capitalists. There are
people out there today who are literally robbing the future of America
for our jobs, our prosperity, and our economic prowess in the world;
and they're doing it by design.
A year ago, we set out to try to do something small. If we have some
bad software--some bad, malicious virus information--shouldn't we be
obligated to share that with the private sector so they can protect
themselves? Absolutely.
If we don't do this, a nation-state like China has geared up its
military and intelligence services for the very purpose of economically
wounding the United States--by draining our intellectual property dry.
They have done it by stealing pesticide formulas. They have done it by
stealing pharmaceutical formulas. They have done it by stealing
intellectual property when it relates to military hardware and then
have copied it, and it has cost us a tremendous amount of more money to
have had to go back and redesign it.
{time} 1800
So we can play games. We can do silly things. This amendment actually
does nothing to protect a person's private password at home. Nothing.
Not one thing. But it is serving to try to obfuscate and maybe send it
back to committee and come back.
[[Page H2185]]
This has been a bipartisan bill, and I can't tell you how
disappointing this amendment is to me. I have worked with Mr.
Ruppersberger and the members of this committee. I have worked with the
privacy groups. We've worked with civil libertarians. They threw
everything but the kitchen sink at us. By the way, this does nothing,
or this would have been thrown at us, too. You know why? Because it
doesn't do anything. I get it. Sounds great. You're going to run out
and do some bad things with it.
But this is our Nation's defense. This is the last bastion of things
we need to do to protect this country. We've done it since 9/11. We did
Homeland Security. We've done the Patriot Act. We've done other things
that this body and the other body and the President of the United
States signed to protect this country, as our Constitution tells us to
do for the common defense of this great Nation.
I will tell you something. We can have this debate. We can talk about
a bill that does absolutely nothing to protect someone's private
password at home, or we can get about the business of trying to give
the private sector just a little bit of information to protect people's
private information in the comfort of their homes, so that we can
protect this Nation from a catastrophic attack.
The director of the national security didn't say ``maybe,'' didn't
say, ``could happen.'' They said it will happen.
This is the one small thing we get to do to prepare for a whole bunch
of folks out there that want to bring this Nation down.
We ought to stand together today in a bipartisan way. We ought to
reject all of the confusion and obfuscation and all of the things that
they're saying about this bill that just are not true. We ought to
stand here and say, We respected the fact that you kept the government
stuff government, and the private stuff private, and you're not mixing
it up, and you're not surveilling. You're doing none of those things.
You're just sharing some pretty bad information so that they can apply
it to their patches that happen on your computer every single day,
thousands of times a day, to try to keep viruses off your computer, and
that's it.
We've spent a lot of time today trying to go in a different
direction. People are upset that there aren't things in the bill. Okay.
I mean, the Buffett rule isn't in the bill. I don't think that ought to
get a veto threat either.
This is where we are. This is that first small threat.
I'm going to ask all of you to join us today. Reject this red
herring, this obfuscation, and stand with America. They need it. There
are 3 million businesses with all of the associations telling us,
Please, give us that classified secret malware information that your
government has so we can protect the people we have as customers and
clients. They're begging for it because they're getting killed every
single day. It's happening right this second.
This is our chance to stand up. This was a bipartisan effort. If you
really believe in bipartisanship, if you believe that's the future of
this Chamber, and that's the dignity of the very Founding Fathers that
gave it to us, then today is the day to prove it.
Reject this amendment, stand for America. Support this bill.
I yield back the balance of my time.
The SPEAKER pro tempore. Without objection, the previous question is
ordered on the motion to recommit.
There was no objection.
The SPEAKER pro tempore. The question is on the motion to recommit.
The question was taken; and the Speaker pro tempore announced that
the noes appeared to have it.
Mr. PERLMUTTER. Mr. Speaker, on that I demand the yeas and nays.
The yeas and nays were ordered.
The SPEAKER pro tempore. Pursuant to clauses 8 and 9 of rule XX, this
15-minute vote on the motion to recommit will be followed by 5-minute
votes on passage of H.R. 3523, if ordered; and suspension of the rules
with regard to H.R. 2050, if ordered.
The vote was taken by electronic device, and there were--yeas 183,
nays 233, not voting 15, as follows:
[Roll No. 191]
YEAS--183
Ackerman
Altmire
Andrews
Baca
Baldwin
Barrow
Bass (CA)
Becerra
Berkley
Berman
Bishop (GA)
Bishop (NY)
Bonamici
Boren
Boswell
Brady (PA)
Braley (IA)
Brown (FL)
Butterfield
Capps
Capuano
Cardoza
Carnahan
Carney
Carson (IN)
Castor (FL)
Chandler
Chu
Cicilline
Clarke (MI)
Clarke (NY)
Clay
Cleaver
Clyburn
Cohen
Connolly (VA)
Conyers
Cooper
Costa
Costello
Courtney
Critz
Crowley
Cuellar
Cummings
Davis (CA)
Davis (IL)
DeFazio
DeGette
DeLauro
Deutch
Dicks
Dingell
Doggett
Donnelly (IN)
Doyle
Edwards
Ellison
Engel
Eshoo
Farr
Fattah
Frank (MA)
Fudge
Garamendi
Gonzalez
Green, Al
Green, Gene
Grijalva
Gutierrez
Hahn
Hanabusa
Hastings (FL)
Heinrich
Higgins
Himes
Hinchey
Hinojosa
Hochul
Holt
Honda
Hoyer
Israel
Jackson (IL)
Jackson Lee (TX)
Johnson (GA)
Johnson, E. B.
Jones
Kaptur
Keating
Kildee
Kind
Kissell
Kucinich
Langevin
Larsen (WA)
Larson (CT)
Lee (CA)
Levin
Lewis (GA)
Lipinski
Loebsack
Lofgren, Zoe
Lowey
Lujan
Lynch
Markey
Matheson
Matsui
McCarthy (NY)
McCollum
McDermott
McGovern
McIntyre
McNerney
Meeks
Michaud
Miller (NC)
Miller, George
Moore
Moran
Murphy (CT)
Nadler
Napolitano
Neal
Olver
Owens
Pallone
Pascrell
Pastor (AZ)
Pelosi
Perlmutter
Peters
Peterson
Pingree (ME)
Polis
Price (NC)
Quigley
Rahall
Reyes
Richardson
Richmond
Ross (AR)
Rothman (NJ)
Roybal-Allard
Ruppersberger
Rush
Ryan (OH)
Sanchez, Linda T.
Sanchez, Loretta
Sarbanes
Schakowsky
Schiff
Schrader
Schwartz
Scott (VA)
Scott, David
Serrano
Sewell
Sherman
Shuler
Smith (WA)
Speier
Stark
Sutton
Thompson (CA)
Thompson (MS)
Tierney
Tonko
Towns
Tsongas
Van Hollen
Velazquez
Visclosky
Walz (MN)
Wasserman Schultz
Waters
Watt
Waxman
Welch
Wilson (FL)
Woolsey
Yarmuth
NAYS--233
Adams
Aderholt
Akin
Alexander
Amash
Amodei
Austria
Bachmann
Bachus
Barletta
Bartlett
Barton (TX)
Bass (NH)
Benishek
Berg
Biggert
Bilbray
Bilirakis
Bishop (UT)
Black
Blackburn
Bonner
Bono Mack
Boustany
Brady (TX)
Brooks
Broun (GA)
Buchanan
Buerkle
Burgess
Burton (IN)
Calvert
Camp
Campbell
Cantor
Capito
Carter
Cassidy
Chabot
Chaffetz
Coble
Coffman (CO)
Cole
Conaway
Cravaack
Crawford
Crenshaw
Culberson
Denham
Dent
DesJarlais
Diaz-Balart
Dold
Dreier
Duffy
Duncan (SC)
Duncan (TN)
Ellmers
Emerson
Farenthold
Fincher
Fitzpatrick
Flake
Fleischmann
Fleming
Flores
Forbes
Fortenberry
Foxx
Franks (AZ)
Frelinghuysen
Gallegly
Gardner
Garrett
Gerlach
Gibbs
Gibson
Gingrey (GA)
Gohmert
Goodlatte
Gosar
Gowdy
Granger
Graves (GA)
Graves (MO)
Griffin (AR)
Griffith (VA)
Grimm
Guinta
Guthrie
Hall
Hanna
Harper
Harris
Hartzler
Hastings (WA)
Hayworth
Heck
Hensarling
Herger
Herrera Beutler
Huelskamp
Huizenga (MI)
Hultgren
Hunter
Hurt
Issa
Jenkins
Johnson (IL)
Johnson (OH)
Johnson, Sam
Jordan
Kelly
King (IA)
King (NY)
Kingston
Kinzinger (IL)
Kline
Labrador
Lamborn
Lance
Landry
Lankford
Latham
LaTourette
Latta
Lewis (CA)
LoBiondo
Long
Lucas
Luetkemeyer
Lummis
Lungren, Daniel E.
Mack
Manzullo
Marchant
McCarthy (CA)
McCaul
McClintock
McCotter
McKeon
McKinley
McMorris Rodgers
Meehan
Mica
Miller (FL)
Miller (MI)
Miller, Gary
Mulvaney
Murphy (PA)
Myrick
Neugebauer
Noem
Nugent
Nunes
Nunnelee
Olson
Palazzo
Paulsen
Pearce
Petri
Pitts
Platts
Poe (TX)
Pompeo
Posey
Price (GA)
Quayle
Reed
Rehberg
Reichert
Renacci
Ribble
Rigell
Rivera
Roby
Roe (TN)
Rogers (AL)
Rogers (KY)
Rogers (MI)
Rohrabacher
Rokita
Rooney
Ros-Lehtinen
Roskam
Ross (FL)
Royce
Runyan
Ryan (WI)
Scalise
Schilling
Schmidt
Schock
Schweikert
Scott (SC)
Scott, Austin
Sensenbrenner
Sessions
Shimkus
Shuster
Simpson
Smith (NE)
Smith (NJ)
Smith (TX)
Southerland
Stearns
Stivers
Stutzman
Sullivan
Terry
Thompson (PA)
Thornberry
Tiberi
Tipton
Turner (NY)
Turner (OH)
Upton
Walberg
Walden
Walsh (IL)
Webster
West
Westmoreland
Whitfield
Wilson (SC)
Wittman
Wolf
Womack
Woodall
Yoder
Young (AK)
Young (FL)
Young (IN)
NOT VOTING--15
Blumenauer
Bucshon
Canseco
Davis (KY)
Filner
Hirono
Holden
Maloney
Marino
McHenry
Paul
Pence
Rangel
Sires
Slaughter
[[Page H2186]]
{time} 1823
So the motion to recommit was rejected.
The result of the vote was announced as above recorded.
Stated for:
Mr. FILNER. Mr. Speaker, on rollcall 191, I was away from the Capitol
due to prior commitments to my constituents. Had I been present, I
would have voted ``aye.''
The SPEAKER pro tempore. The question is on the passage of the bill.
The question was taken; and the Speaker pro tempore announced that
the noes appeared to have it.
Recorded Vote
Mr. ROGERS of Michigan. Mr. Speaker, I demand a recorded vote.
A recorded vote was ordered.
The SPEAKER pro tempore. This will be a 5-minute vote.
The vote was taken by electronic device, and there were--ayes 248,
noes 168, not voting 15, as follows:
[Roll No. 192]
AYES--248
Adams
Aderholt
Alexander
Altmire
Amodei
Austria
Bachmann
Bachus
Barletta
Barrow
Bartlett
Bass (NH)
Benishek
Berg
Biggert
Bilbray
Bilirakis
Bishop (GA)
Bishop (NY)
Black
Blackburn
Bonner
Bono Mack
Boren
Boswell
Boustany
Brady (TX)
Broun (GA)
Buchanan
Buerkle
Burgess
Burton (IN)
Butterfield
Calvert
Camp
Campbell
Cantor
Capito
Cardoza
Carney
Carter
Cassidy
Castor (FL)
Chabot
Chaffetz
Chandler
Clyburn
Coble
Coffman (CO)
Cole
Conaway
Connolly (VA)
Cooper
Costa
Cravaack
Crawford
Crenshaw
Critz
Cuellar
Culberson
Denham
Dent
DesJarlais
Diaz-Balart
Dicks
Dold
Donnelly (IN)
Dreier
Duffy
Duncan (SC)
Duncan (TN)
Ellmers
Fincher
Fitzpatrick
Flake
Fleischmann
Flores
Forbes
Fortenberry
Foxx
Franks (AZ)
Frelinghuysen
Gallegly
Garamendi
Gardner
Garrett
Gerlach
Gibbs
Gingrey (GA)
Gonzalez
Goodlatte
Gowdy
Granger
Graves (GA)
Graves (MO)
Griffin (AR)
Griffith (VA)
Grimm
Guinta
Guthrie
Hanabusa
Hanna
Harper
Harris
Hartzler
Hastings (WA)
Hayworth
Heck
Hensarling
Herger
Herrera Beutler
Hochul
Huelskamp
Huizenga (MI)
Hultgren
Hunter
Hurt
Israel
Issa
Jenkins
Johnson (OH)
Johnson, Sam
Jordan
Kelly
King (IA)
King (NY)
Kingston
Kinzinger (IL)
Kissell
Kline
Labrador
Lamborn
Lance
Langevin
Lankford
Larsen (WA)
Latham
LaTourette
Latta
Lewis (CA)
Lipinski
LoBiondo
Long
Lucas
Luetkemeyer
Lummis
Lungren, Daniel E.
Manzullo
Matheson
McCarthy (CA)
McCarthy (NY)
McCaul
McIntyre
McKeon
McKinley
McMorris Rodgers
Meehan
Mica
Miller (FL)
Miller (MI)
Miller, Gary
Moran
Mulvaney
Murphy (PA)
Myrick
Neugebauer
Noem
Nugent
Nunes
Nunnelee
Olson
Owens
Palazzo
Paulsen
Peterson
Petri
Pitts
Platts
Poe (TX)
Pompeo
Price (GA)
Quayle
Reed
Reichert
Renacci
Ribble
Rivera
Roby
Roe (TN)
Rogers (AL)
Rogers (KY)
Rogers (MI)
Rokita
Rooney
Ros-Lehtinen
Roskam
Ross (AR)
Ross (FL)
Royce
Runyan
Ruppersberger
Ryan (WI)
Scalise
Schilling
Schmidt
Schock
Schrader
Scott (SC)
Scott, Austin
Scott, David
Sessions
Shimkus
Shuler
Shuster
Smith (NE)
Smith (NJ)
Smith (TX)
Smith (WA)
Southerland
Stearns
Stivers
Stutzman
Sullivan
Terry
Thompson (CA)
Thompson (PA)
Thornberry
Tiberi
Tipton
Towns
Turner (NY)
Turner (OH)
Upton
Walberg
Walden
Webster
West
Westmoreland
Whitfield
Wilson (SC)
Wittman
Wolf
Womack
Woodall
Yoder
Young (AK)
Young (FL)
Young (IN)
NOES--168
Ackerman
Akin
Amash
Andrews
Baca
Baldwin
Barton (TX)
Bass (CA)
Becerra
Berkley
Berman
Bishop (UT)
Bonamici
Brady (PA)
Braley (IA)
Brooks
Brown (FL)
Capps
Capuano
Carnahan
Carson (IN)
Chu
Cicilline
Clarke (MI)
Clarke (NY)
Clay
Cleaver
Cohen
Conyers
Costello
Courtney
Crowley
Cummings
Davis (CA)
Davis (IL)
DeFazio
DeGette
DeLauro
Deutch
Dingell
Doggett
Doyle
Edwards
Ellison
Emerson
Engel
Eshoo
Farenthold
Farr
Fattah
Fleming
Frank (MA)
Fudge
Gibson
Gohmert
Gosar
Green, Al
Green, Gene
Grijalva
Gutierrez
Hahn
Hall
Hastings (FL)
Heinrich
Higgins
Himes
Hinchey
Hinojosa
Holt
Honda
Hoyer
Jackson (IL)
Jackson Lee (TX)
Johnson (GA)
Johnson (IL)
Johnson, E. B.
Jones
Kaptur
Keating
Kildee
Kind
Kucinich
Landry
Larson (CT)
Lee (CA)
Levin
Lewis (GA)
Loebsack
Lofgren, Zoe
Lowey
Lujan
Lynch
Mack
Marchant
Markey
Matsui
McClintock
McCollum
McCotter
McDermott
McGovern
McNerney
Meeks
Michaud
Miller (NC)
Miller, George
Moore
Murphy (CT)
Nadler
Napolitano
Neal
Olver
Pallone
Pascrell
Pastor (AZ)
Pearce
Pelosi
Perlmutter
Peters
Pingree (ME)
Polis
Posey
Price (NC)
Quigley
Rahall
Rehberg
Reyes
Richardson
Richmond
Rigell
Rohrabacher
Rothman (NJ)
Roybal-Allard
Rush
Ryan (OH)
Sanchez, Linda T.
Sanchez, Loretta
Sarbanes
Schakowsky
Schiff
Schwartz
Schweikert
Scott (VA)
Sensenbrenner
Serrano
Sewell
Sherman
Simpson
Speier
Stark
Sutton
Thompson (MS)
Tierney
Tonko
Tsongas
Van Hollen
Velazquez
Visclosky
Walsh (IL)
Walz (MN)
Wasserman Schultz
Waters
Watt
Waxman
Welch
Wilson (FL)
Woolsey
Yarmuth
NOT VOTING--15
Blumenauer
Bucshon
Canseco
Davis (KY)
Filner
Hirono
Holden
Maloney
Marino
McHenry
Paul
Pence
Rangel
Sires
Slaughter
Announcement by the Speaker Pro Tempore
The SPEAKER pro tempore (during the vote). There are 2 minutes
remaining.
{time} 1831
Mr. HOYER changed his vote from ``aye'' to ``no.''
Mr. TIPTON changed his vote from ``no'' to aye.''
So the bill was passed.
The result of the vote was announced as above recorded.
A motion to reconsider was laid on the table.
Stated against:
Mr. FILNER. Mr. Speaker, on rollcall 192, I was away from the Capitol
due to prior commitments to my constituents. Had I been present, I
would have voted ``no.''
personal explanation
Ms. SLAUGHTER. Mr. Speaker, I was unavoidably detained and missed
rollcall vote Nos. 182, 183, 184, 185, 186, 187, 188, 189, 190, 191,
and 192. Had I been present, I would have voted ``aye'' on rollcall
vote Nos. 184, 185, 186, 187, 188, 189, 190, and 191. I would have
voted ``no'' on rollcall vote Nos. 182, 183, and 192.
____________________