[Congressional Record Volume 160, Number 119 (Monday, July 28, 2014)]
[House]
[Pages H6908-H6922]
NATIONAL CYBERSECURITY AND CRITICAL INFRASTRUCTURE PROTECTION ACT OF
2014
Mr. McCAUL. Mr. Speaker, I move to suspend the rules and pass the
bill (H.R. 3696) to amend the Homeland Security Act of 2002 to make
certain improvements regarding cybersecurity
[[Page H6909]]
and critical infrastructure protection, and for other purposes, as
amended.
The Clerk read the title of the bill.
The text of the bill is as follows:
H.R. 3696
Be it enacted by the Senate and House of Representatives of
the United States of America in Congress assembled,
SECTION 1. SHORT TITLE.
This Act may be cited as the ``National Cybersecurity and
Critical Infrastructure Protection Act of 2014''.
SEC. 2. TABLE OF CONTENTS.
The table of contents for this Act is as follows:
Sec. 1. Short title.
Sec. 2. Table of contents.
TITLE I--SECURING THE NATION AGAINST CYBER ATTACK
Sec. 101. Homeland Security Act of 2002 definitions.
Sec. 102. Enhancement of cybersecurity.
Sec. 103. Protection of critical infrastructure and information
sharing.
Sec. 104. National Cybersecurity and Communications Integration Center.
Sec. 105. Cyber incident response and technical assistance.
Sec. 106. Streamlining of Department cybersecurity organization.
TITLE II--PUBLIC-PRIVATE COLLABORATION ON CYBERSECURITY
Sec. 201. Public-private collaboration on cybersecurity.
Sec. 202. SAFETY Act and qualifying cyber incidents.
Sec. 203. Prohibition on new regulatory authority.
Sec. 204. Prohibition on additional authorization of appropriations.
Sec. 205. Prohibition on collection activities to track individuals'
personally identifiable information.
Sec. 206. Cybersecurity scholars.
Sec. 207. National Research Council study on the resilience and
reliability of the Nation's power grid.
TITLE III--HOMELAND SECURITY CYBERSECURITY WORKFORCE
Sec. 301. Homeland security cybersecurity workforce.
Sec. 302. Personnel authorities.
TITLE I--SECURING THE NATION AGAINST CYBER ATTACK
SEC. 101. HOMELAND SECURITY ACT OF 2002 DEFINITIONS.
Section 2 of the Homeland Security Act of 2002 (6 U.S.C.
101) is amended by adding at the end the following new
paragraphs:
``(19) The term `critical infrastructure' has the meaning
given that term in section 1016(e) of the USA Patriot Act (42
U.S.C. 5195c(e)).
``(20) The term `critical infrastructure owner' means a
person that owns critical infrastructure.
``(21) The term `critical infrastructure operator' means a
critical infrastructure owner or other person that manages,
runs, or operates, in whole or in part, the day-to-day
operations of critical infrastructure.
``(22) The term `cyber incident' means an incident, or an
attempt to cause an incident, that, if successful, would--
``(A) jeopardize or imminently jeopardize, without lawful
authority, the security, integrity, confidentiality, or
availability of an information system or network of
information systems or any information stored on, processed
on, or transiting such a system or network;
``(B) constitute a violation or imminent threat of
violation of law, security policies, security procedures, or
acceptable use policies related to such a system or network,
or an act of terrorism against such a system or network; or
``(C) result in the denial of access to or degradation,
disruption, or destruction of such a system or network, or
the defeat of an operations control or technical control
essential to the security or operation of such a system or
network.
``(23) The term `cybersecurity mission' means activities
that encompass the full range of threat reduction,
vulnerability reduction, deterrence, incident response,
resiliency, and recovery activities to foster the security
and stability of cyberspace.
``(24) The term `cybersecurity purpose' means the purpose
of ensuring the security, integrity, confidentiality, or
availability of, or safeguarding, an information system or
network of information systems, including protecting such a
system or network, or data residing on such a system or
network, including protection of such a system or network,
from--
``(A) a vulnerability of such a system or network;
``(B) a threat to the security, integrity, confidentiality,
or availability of such a system or network, or any
information stored on, processed on, or transiting such a
system or network;
``(C) efforts to deny access to or degrade, disrupt, or
destroy such a system or network; or
``(D) efforts to gain unauthorized access to such a system
or network, including to gain such unauthorized access for
the purpose of exfiltrating information stored on, processed
on, or transiting such a system or network.
``(25) The term `cyber threat' means any action that may
result in unauthorized access to, exfiltration of,
manipulation of, harm of, or impairment to the security,
integrity, confidentiality, or availability of an information
system or network of information systems, or information that
is stored on, processed by, or transiting such a system or
network.
``(26) The term `cyber threat information' means
information directly pertaining to--
``(A) a vulnerability of an information system or network
of information systems of a government or private entity;
``(B) a threat to the security, integrity, confidentiality,
or availability of such a system or network of a government
or private entity, or any information stored on, processed
on, or transiting such a system or network;
``(C) efforts to deny access to or degrade, disrupt, or
destroy such a system or network of a government or private
entity;
``(D) efforts to gain unauthorized access to such a system
or network, including to gain such unauthorized access for
the purpose of exfiltrating information stored on, processed
on, or transiting such a system or network; or
``(E) an act of terrorism against an information system or
network of information systems.
``(27) The term `Federal civilian information systems'--
``(A) means information, information systems, and networks
of information systems that are owned, operated, controlled,
or licensed for use by, or on behalf of, any Federal agency,
including such systems or networks used or operated by
another entity on behalf of a Federal agency; but
``(B) does not include--
``(i) a national security system; or
``(ii) information, information systems, and networks of
information systems that are owned, operated, controlled, or
licensed solely for use by, or on behalf of, the Department
of Defense, a military department, or an element of the
intelligence community.
``(28) The term `information security' means the protection
of information, information systems, and networks of
information systems from unauthorized access, use,
disclosure, disruption, modification, or destruction in order
to provide--
``(A) integrity, including guarding against improper
information modification or destruction, including ensuring
nonrepudiation and authenticity;
``(B) confidentiality, including preserving authorized
restrictions on access and disclosure, including means for
protecting personal privacy and proprietary information; and
``(C) availability, including ensuring timely and reliable
access to and use of information.
``(29) The term `information system' means the underlying
framework and functions used to process, transmit, receive,
or store information electronically, including programmable
electronic devices, communications networks, and industrial
or supervisory control systems and any associated hardware,
software, or data.
``(30) The term `private entity' means any individual or
any private or publically-traded company, public or private
utility (including a utility that is a unit of a State or
local government, or a political subdivision of a State
government), organization, or corporation, including an
officer, employee, or agent thereof.
``(31) The term `shared situational awareness' means an
environment in which cyber threat information is shared in
real time between all designated Federal cyber operations
centers to provide actionable information about all known
cyber threats.''.
SEC. 102. ENHANCEMENT OF CYBERSECURITY.
(a) In General.--Subtitle C of title II of the Homeland
Security Act of 2002 is amended by adding at the end the
following new section:
``SEC. 226. ENHANCEMENT OF CYBERSECURITY.
``The Secretary, in collaboration with the heads of other
appropriate Federal Government entities, shall conduct
activities for cybersecurity purposes, including the
provision of shared situational awareness to each other to
enable real-time, integrated, and operational actions to
protect from, prevent, mitigate, respond to, and recover from
cyber incidents.''.
(b) Clerical Amendments.--
(1) Subtitle heading.--The heading for subtitle C of title
II of such Act is amended to read as follows:
``Subtitle C--Cybersecurity and Information Sharing''.
(2) Table of contents.--The table of contents in section
1(b) of such Act is amended--
(A) by adding after the item relating to section 225 the
following new item:
``Sec. 226. Enhancement of cybersecurity.'';
and
(B) by striking the item relating to subtitle C of title II
and inserting the following new item:
``Subtitle C--Cybersecurity and Information Sharing''.
SEC. 103. PROTECTION OF CRITICAL INFRASTRUCTURE AND
INFORMATION SHARING.
(a) In General.--Subtitle C of title II of the Homeland
Security Act of 2002, as amended by section 102, is further
amended by adding at the end the following new section:
``SEC. 227. PROTECTION OF CRITICAL INFRASTRUCTURE AND
INFORMATION SHARING.
``(a) Protection of Critical Infrastructure.--
[[Page H6910]]
``(1) In general.--The Secretary shall coordinate, on an
ongoing basis, with Federal, State, and local governments,
national laboratories, critical infrastructure owners,
critical infrastructure operators, and other cross sector
coordinating entities to--
``(A) facilitate a national effort to strengthen and
maintain secure, functioning, and resilient critical
infrastructure from cyber threats;
``(B) ensure that Department policies and procedures enable
critical infrastructure owners and critical infrastructure
operators to receive real-time, actionable, and relevant
cyber threat information;
``(C) seek industry sector-specific expertise to--
``(i) assist in the development of voluntary security and
resiliency strategies; and
``(ii) ensure that the allocation of Federal resources are
cost effective and reduce any burden on critical
infrastructure owners and critical infrastructure operators;
``(D) upon request of entities, facilitate and assist risk
management efforts of such entities to reduce
vulnerabilities, identify and disrupt threats, and minimize
consequences to their critical infrastructure;
``(E) upon request of critical infrastructure owners or
critical infrastructure operators, provide education and
assistance to such owners and operators on how they may use
protective measures and countermeasures to strengthen the
security and resilience of the Nation's critical
infrastructure; and
``(F) coordinate a research and development strategy to
facilitate and promote advancements and innovation in
cybersecurity technologies to protect critical
infrastructure.
``(2) Additional responsibilities.--The Secretary shall--
``(A) manage Federal efforts to secure, protect, and ensure
the resiliency of Federal civilian information systems using
a risk-based and performance-based approach, and, upon
request of critical infrastructure owners or critical
infrastructure operators, support such owners' and operators'
efforts to secure, protect, and ensure the resiliency of
critical infrastructure from cyber threats;
``(B) direct an entity within the Department to serve as a
Federal civilian entity by and among Federal, State, and
local governments, private entities, and critical
infrastructure sectors to provide multi-directional sharing
of real-time, actionable, and relevant cyber threat
information;
``(C) build upon existing mechanisms to promote a national
awareness effort to educate the general public on the
importance of securing information systems;
``(D) upon request of Federal, State, and local government
entities and private entities, facilitate expeditious cyber
incident response and recovery assistance, and provide
analysis and warnings related to threats to and
vulnerabilities of critical information systems, crisis and
consequence management support, and other remote or on-site
technical assistance with the heads of other appropriate
Federal agencies to Federal, State, and local government
entities and private entities for cyber incidents affecting
critical infrastructure;
``(E) engage with international partners to strengthen the
security and resilience of domestic critical infrastructure
and critical infrastructure located outside of the United
States upon which the United States depends; and
``(F) conduct outreach to educational institutions,
including historically black colleges and universities,
Hispanic serving institutions, Native American colleges, and
institutions serving persons with disabilities, to encourage
such institutions to promote cybersecurity awareness.
``(3) Rule of construction.--Nothing in this section may be
construed to require any private entity to request assistance
from the Secretary, or require any private entity requesting
such assistance to implement any measure or recommendation
suggested by the Secretary.
``(b) Critical Infrastructure Sectors.--The Secretary, in
collaboration with the heads of other appropriate Federal
agencies, shall designate critical infrastructure sectors
(that may include subdivisions of sectors within a sector as
the Secretary may determine appropriate). The critical
infrastructure sectors designated under this subsection may
include the following:
``(1) Chemical.
``(2) Commercial facilities.
``(3) Communications.
``(4) Critical manufacturing.
``(5) Dams.
``(6) Defense Industrial Base.
``(7) Emergency services.
``(8) Energy.
``(9) Financial services.
``(10) Food and agriculture.
``(11) Government facilities.
``(12) Healthcare and public health.
``(13) Information technology.
``(14) Nuclear reactors, materials, and waste.
``(15) Transportation systems.
``(16) Water and wastewater systems.
``(17) Such other sectors as the Secretary determines
appropriate.
``(c) Sector Specific Agencies.--The Secretary, in
collaboration with the relevant critical infrastructure
sector and the heads of other appropriate Federal agencies,
shall recognize the Federal agency designated as of November
1, 2013, as the `Sector Specific Agency' for each critical
infrastructure sector designated under subsection (b). If the
designated Sector Specific Agency for a particular critical
infrastructure sector is the Department, for the purposes of
this section, the Secretary shall carry out this section. The
Secretary, in coordination with the heads of each such Sector
Specific Agency shall--
``(1) support the security and resilience activities of the
relevant critical infrastructure sector in accordance with
this subtitle; and
``(2) provide institutional knowledge and specialized
expertise to the relevant critical infrastructure sector.
``(d) Sector Coordinating Councils.--
``(1) Recognition.--The Secretary, in collaboration with
each critical infrastructure sector and the relevant Sector
Specific Agency, shall recognize and partner with the Sector
Coordinating Council for each critical infrastructure sector
designated under subsection (b) to coordinate with each such
sector on security and resilience activities and emergency
response and recovery efforts.
``(2) Membership.--
``(A) In general.--The Sector Coordinating Council for a
critical infrastructure sector designated under subsection
(b) shall--
``(i) be comprised exclusively of relevant critical
infrastructure owners, critical infrastructure operators,
private entities, and representative trade associations for
the sector;
``(ii) reflect the unique composition of each sector; and
``(iii) as appropriate, include relevant small, medium, and
large critical infrastructure owners, critical infrastructure
operators, private entities, and representative trade
associations for the sector.
``(B) Prohibition.--No government entity with regulating
authority shall be a member of the Sector Coordinating
Council.
``(C) Limitation.--The Secretary shall have no role in the
determination of the membership of a Sector Coordinating
Council.
``(3) Roles and responsibilities.--The Sector Coordinating
Council for a critical infrastructure sector shall--
``(A) serve as a self-governing, self-organized primary
policy, planning, and strategic communications entity for
coordinating with the Department, the relevant Sector-
Specific Agency designated under subsection (c), and the
relevant Information Sharing and Analysis Centers under
subsection (e) on security and resilience activities and
emergency response and recovery efforts;
``(B) establish governance and operating procedures, and
designate a chairperson for the sector to carry out the
activities described in this subsection;
``(C) coordinate with the Department, the relevant
Information Sharing and Analysis Centers under subsection
(e), and other Sector Coordinating Councils to update,
maintain, and exercise the National Cybersecurity Incident
Response Plan in accordance with section 229(b); and
``(D) provide any recommendations to the Department on
infrastructure protection technology gaps to help inform
research and development efforts at the Department.
``(e) Sector Information Sharing and Analysis Centers.--
``(1) Recognition.--The Secretary, in collaboration with
the relevant Sector Coordinating Council and the critical
infrastructure sector represented by such Council, and in
coordination with the relevant Sector Specific Agency, shall
recognize at least one Information Sharing and Analysis
Center for each critical infrastructure sector designated
under subsection (b) for purposes of paragraph (3). No other
Information Sharing and Analysis Organizations, including
Information Sharing and Analysis Centers, may be precluded
from having an information sharing relationship within the
National Cybersecurity and Communications Integration Center
established pursuant to section 228. Nothing in this
subsection or any other provision of this subtitle may be
construed to limit, restrict, or condition any private entity
or activity utilized by, among, or between private entities.
``(2) Roles and responsibilities.--In addition to such
other activities as may be authorized by law, at least one
Information Sharing and Analysis Center for a critical
infrastructure sector shall--
``(A) serve as an information sharing resource for such
sector and promote ongoing multi-directional sharing of real-
time, relevant, and actionable cyber threat information and
analysis by and among such sector, the Department, the
relevant Sector Specific Agency, and other critical
infrastructure sector Information Sharing and Analysis
Centers;
``(B) establish governance and operating procedures to
carry out the activities conducted under this subsection;
``(C) serve as an emergency response and recovery
operations coordination point for such sector, and upon
request, facilitate cyber incident response capabilities in
coordination with the Department, the relevant Sector
Specific Agency and the relevant Sector Coordinating Council;
``(D) facilitate cross-sector coordination and sharing of
cyber threat information to prevent related or consequential
impacts to other critical infrastructure sectors;
``(E) coordinate with the Department, the relevant Sector
Coordinating Council, the relevant Sector Specific Agency,
and other critical infrastructure sector Information Sharing
and Analysis Centers on the development, integration, and
implementation of procedures to support technology neutral,
[[Page H6911]]
real-time information sharing capabilities and mechanisms
within the National Cybersecurity and Communications
Integration Center established pursuant to section 228,
including--
``(i) the establishment of a mechanism to voluntarily
report identified vulnerabilities and opportunities for
improvement;
``(ii) the establishment of metrics to assess the
effectiveness and timeliness of the Department's and
Information Sharing and Analysis Centers' information sharing
capabilities; and
``(iii) the establishment of a mechanism for anonymous
suggestions and comments;
``(F) implement an integration and analysis function to
inform sector planning, risk mitigation, and operational
activities regarding the protection of each critical
infrastructure sector from cyber incidents;
``(G) combine consequence, vulnerability, and threat
information to share actionable assessments of critical
infrastructure sector risks from cyber incidents;
``(H) coordinate with the Department, the relevant Sector
Specific Agency, and the relevant Sector Coordinating Council
to update, maintain, and exercise the National Cybersecurity
Incident Response Plan in accordance with section 229(b); and
``(I) safeguard cyber threat information from unauthorized
disclosure.
``(3) Funding.--Of the amounts authorized to be
appropriated for each of fiscal years 2014, 2015, and 2016
for the Cybersecurity and Communications Office of the
Department, the Secretary is authorized to use not less than
$25,000,000 for any such year for operations support at the
National Cybersecurity and Communications Integration Center
established under section 228(a) of all recognized
Information Sharing and Analysis Centers under paragraph (1)
of this subsection.
``(f) Clearances.--The Secretary--
``(1) shall expedite the process of security clearances
under Executive Order 13549 or successor orders for
appropriate representatives of Sector Coordinating Councils
and the critical infrastructure sector Information Sharing
and Analysis Centers; and
``(2) may so expedite such processing to--
``(A) appropriate personnel of critical infrastructure
owners and critical infrastructure operators; and
``(B) any other person as determined by the Secretary.
``(g) Public-Private Collaboration.--The Secretary, in
collaboration with the critical infrastructure sectors
designated under subsection (b), such sectors' Sector
Specific Agencies recognized under subsection (c), and the
Sector Coordinating Councils recognized under subsection (d),
shall--
``(1) conduct an analysis and review of the existing
public-private partnership model and evaluate how the model
between the Department and critical infrastructure owners and
critical infrastructure operators can be improved to ensure
the Department, critical infrastructure owners, and critical
infrastructure operators are equal partners and regularly
collaborate on all programs and activities of the Department
to protect critical infrastructure;
``(2) develop and implement procedures to ensure
continuous, collaborative, and effective interactions between
the Department, critical infrastructure owners, and critical
infrastructure operators; and
``(3) ensure critical infrastructure sectors have a
reasonable period for review and comment of all jointly
produced materials with the Department.
``(h) Recommendations Regarding New Agreements.--Not later
than 180 days after the date of the enactment of this
section, the Secretary shall submit to the appropriate
congressional committees recommendations on how to expedite
the implementation of information sharing agreements for
cybersecurity purposes between the Secretary and critical
information owners and critical infrastructure operators and
other private entities. Such recommendations shall address
the development and utilization of a scalable form that
retains all privacy and other protections in such agreements
in existence as of such date, including Cooperative and
Research Development Agreements. Such recommendations should
also include any additional authorities or resources that may
be needed to carry out the implementation of any such new
agreements.
``(i) Rule of Construction.--No provision of this title may
be construed as modifying, limiting, or otherwise affecting
the authority of any other Federal agency under any other
provision of law.''.
(b) Clerical Amendment.--The table of contents in section
1(b) of such Act is amended by adding after the item relating
to section 226 (as added by section 102) the following new
item:
``Sec. 227. Protection of critical infrastructure and information
sharing.''.
SEC. 104. NATIONAL CYBERSECURITY AND COMMUNICATIONS
INTEGRATION CENTER.
(a) In General.--Subtitle C of title II of the Homeland
Security Act of 2002, as amended by sections 102 and 103, is
further amended by adding at the end the following new
section:
``SEC. 228. NATIONAL CYBERSECURITY AND COMMUNICATIONS
INTEGRATION CENTER.
``(a) Establishment.--There is established in the
Department the National Cybersecurity and Communications
Integration Center (referred to in this section as the
`Center'), which shall be a Federal civilian information
sharing interface that provides shared situational awareness
to enable real-time, integrated, and operational actions
across the Federal Government, and share cyber threat
information by and among Federal, State, and local government
entities, Information Sharing and Analysis Centers, private
entities, and critical infrastructure owners and critical
infrastructure operators that have an information sharing
relationship with the Center.
``(b) Composition.--The Center shall include each of the
following entities:
``(1) At least one Information Sharing and Analysis Center
established under section 227(e) for each critical
infrastructure sector.
``(2) The Multi-State Information Sharing and Analysis
Center to collaborate with State and local governments.
``(3) The United States Computer Emergency Readiness Team
to coordinate cyber threat information sharing, proactively
manage cyber risks to the United States, collaboratively
respond to cyber incidents, provide technical assistance to
information system owners and operators, and disseminate
timely notifications regarding current and potential cyber
threats and vulnerabilities.
``(4) The Industrial Control System Cyber Emergency
Response Team to coordinate with industrial control systems
owners and operators and share industrial control systems-
related security incidents and mitigation measures.
``(5) The National Coordinating Center for
Telecommunications to coordinate the protection, response,
and recovery of national security emergency communications.
``(6) Such other Federal, State, and local government
entities, private entities, organizations, or individuals as
the Secretary may consider appropriate that agree to be
included.
``(c) Cyber Incident.--In the event of a cyber incident,
the Secretary may grant the entities referred to in
subsection (a) immediate temporary access to the Center as a
situation may warrant.
``(d) Roles and Responsibilities.--The Center shall--
``(1) promote ongoing multi-directional sharing by and
among the entities referred to in subsection (a) of timely
and actionable cyber threat information and analysis on a
real-time basis that includes emerging trends, evolving
threats, incident reports, intelligence information, risk
assessments, and best practices;
``(2) coordinate with other Federal agencies to streamline
and reduce redundant reporting of cyber threat information;
``(3) provide, upon request, timely technical assistance
and crisis management support to Federal, State, and local
government entities and private entities that own or operate
information systems or networks of information systems to
protect from, prevent, mitigate, respond to, and recover from
cyber incidents;
``(4) facilitate cross-sector coordination and sharing of
cyber threat information to prevent related or consequential
impacts to other critical infrastructure sectors;
``(5) collaborate and facilitate discussions with Sector
Coordinating Councils, Information Sharing and Analysis
Centers, Sector Specific Agencies, and relevant critical
infrastructure sectors on the development of prioritized
Federal response efforts, if necessary, to support the
defense and recovery of critical infrastructure from cyber
incidents;
``(6) collaborate with the Sector Coordinating Councils,
Information Sharing and Analysis Centers, Sector Specific
Agencies, and the relevant critical infrastructure sectors on
the development and implementation of procedures to support
technology neutral real-time information sharing capabilities
and mechanisms;
``(7) collaborate with the Sector Coordinating Councils,
Information Sharing and Analysis Centers, Sector Specific
Agencies, and the relevant critical infrastructure sectors to
identify requirements for data and information formats and
accessibility, system interoperability, and redundant systems
and alternative capabilities in the event of a disruption in
the primary information sharing capabilities and mechanisms
at the Center;
``(8) within the scope of relevant treaties, cooperate with
international partners to share information and respond to
cyber incidents;
``(9) safeguard sensitive cyber threat information from
unauthorized disclosure;
``(10) require other Federal civilian agencies to--
``(A) send reports and information to the Center about
cyber incidents, threats, and vulnerabilities affecting
Federal civilian information systems and critical
infrastructure systems and, in the event a private vendor
product or service of such an agency is so implicated, the
Center shall first notify such private vendor of the
vulnerability before further disclosing such information;
``(B) provide to the Center cyber incident detection,
analysis, mitigation, and response information; and
``(C) immediately send and disclose to the Center cyber
threat information received by such agencies;
``(11) perform such other duties as the Secretary may
require to facilitate a national effort to strengthen and
maintain secure, functioning, and resilient critical
infrastructure from cyber threats;
``(12) implement policies and procedures to--
[[Page H6912]]
``(A) provide technical assistance to Federal civilian
agencies to prevent and respond to data breaches involving
unauthorized acquisition or access of personally identifiable
information that occur on Federal civilian information
systems;
``(B) require Federal civilian agencies to notify the
Center about data breaches involving unauthorized acquisition
or access of personally identifiable information that occur
on Federal civilian information systems without unreasonable
delay after the discovery of such a breach; and
``(C) require Federal civilian agencies to notify all
potential victims of a data breach involving unauthorized
acquisition or access of personally identifiable information
that occur on Federal civilian information systems without
unreasonable delay, based on a reasonable determination of
the level of risk of harm and consistent with the needs of
law enforcement; and
``(13) participate in exercises run by the Department's
National Exercise Program, where appropriate.
``(e) Integration and Analysis.--The Center, in
coordination with the Office of Intelligence and Analysis of
the Department, shall maintain an integration and analysis
function, which shall --
``(1) integrate and analyze all cyber threat information
received from other Federal agencies, State and local
governments, Information Sharing and Analysis Centers,
private entities, critical infrastructure owners, and
critical infrastructure operators, and share relevant
information in near real-time;
``(2) on an ongoing basis, assess and evaluate consequence,
vulnerability, and threat information to share with the
entities referred to in subsection (a) actionable assessments
of critical infrastructure sector risks from cyber incidents
and to assist critical infrastructure owners and critical
infrastructure operators by making recommendations to
facilitate continuous improvements to the security and
resiliency of the critical infrastructure of the United
States;
``(3) facilitate cross-sector integration, identification,
and analysis of key interdependencies to prevent related or
consequential impacts to other critical infrastructure
sectors;
``(4) collaborate with the Information Sharing and Analysis
Centers to tailor the analysis of information to the specific
characteristics and risk to a relevant critical
infrastructure sector; and
``(5) assess and evaluate consequence, vulnerability, and
threat information regarding cyber incidents in coordination
with the Office of Emergency Communications of the Department
to help facilitate continuous improvements to the security
and resiliency of public safety communications networks.
``(f) Report of Cyber Attacks Against Federal Government
Networks.--The Secretary shall submit to the Committee on
Homeland Security of the House of Representatives, the
Committee on Homeland Security and Governmental Affairs of
the Senate, and the Comptroller General of the United States
an annual report that summarizes major cyber incidents
involving Federal civilian agency information systems and
provides aggregate statistics on the number of breaches, the
extent of any personally identifiable information that was
involved, the volume of data exfiltrated, the consequential
impact, and the estimated cost of remedying such breaches.
``(g) Report on the Operations of the Center.--The
Secretary, in consultation with the Sector Coordinating
Councils and appropriate Federal Government entities, shall
submit to the Committee on Homeland Security of the House of
Representatives, the Committee on Homeland Security and
Governmental Affairs of the Senate, and the Comptroller
General of the United States an annual report on--
``(1) the capability and capacity of the Center to carry
out its cybersecurity mission in accordance with this
section, and sections 226, 227, 229, 230, 230A, and 230B;
``(2) the extent to which the Department is engaged in
information sharing with each critical infrastructure sector
designated under section 227(b), including--
``(A) the extent to which each such sector has
representatives at the Center; and
``(B) the extent to which critical infrastructure owners
and critical infrastructure operators of each critical
infrastructure sector participate in information sharing at
the Center;
``(3) the volume and range of activities with respect to
which the Secretary collaborated with the Sector Coordinating
Councils and the Sector-Specific Agencies to promote greater
engagement with the Center; and
``(4) the volume and range of voluntary technical
assistance sought and provided by the Department to each
critical infrastructure owner and critical infrastructure
operator.''.
(b) Clerical Amendment.--The table of contents in section
1(b) of such Act is amended by adding after the item relating
to section 227 (as added by section 103) the following new
item:
``Sec. 228. National Cybersecurity and Communications Integration
Center.''.
(c) GAO Report.--Not later than one year after the date of
the enactment of this Act, the Comptroller General of the
United States shall submit to the Committee on Homeland
Security of the House of Representatives and the Committee on
Homeland Security and Governmental Affairs of the Senate a
report on the effectiveness of the National Cybersecurity and
Communications Integration Center established under section
228 of the Homeland Security Act of 2002, as added by
subsection (a) of this section, in carrying out its
cybersecurity mission (as such term is defined in section 2
of the Homeland Security Act of 2002, as amended by section
101) in accordance with this Act and such section 228 and
sections 226, 227, 229, 230, 230A, and 230B of the Homeland
Security Act of 2002, as added by this Act.
SEC. 105. CYBER INCIDENT RESPONSE AND TECHNICAL ASSISTANCE.
(a) In General.--Subtitle C of title II of the Homeland
Security Act of 2002, as amended by sections 102, 103, and
104, is further amended by adding at the end the following
new section:
``SEC. 229. CYBER INCIDENT RESPONSE AND TECHNICAL ASSISTANCE.
``(a) In General.--The Secretary shall establish Cyber
Incident Response Teams to--
``(1) upon request, provide timely technical assistance and
crisis management support to Federal, State, and local
government entities, private entities, and critical
infrastructure owners and critical infrastructure operators
involving cyber incidents affecting critical infrastructure;
and
``(2) upon request, provide actionable recommendations on
security and resilience measures and countermeasures to
Federal, State, and local government entities, private
entities, and critical infrastructure owners and critical
infrastructure operators prior to, during, and after cyber
incidents.
``(b) Coordination.--In carrying out subsection (a), the
Secretary shall coordinate with the relevant Sector Specific
Agencies, if applicable.
``(c) Cyber Incident Response Plan.--The Secretary, in
coordination with the Sector Coordinating Councils,
Information Sharing and Analysis Centers, and Federal, State,
and local governments, shall develop, regularly update,
maintain, and exercise a National Cybersecurity Incident
Response Plan which shall--
``(1) include effective emergency response plans associated
with cyber threats to critical infrastructure, information
systems, or networks of information systems;
``(2) ensure that such National Cybersecurity Incident
Response Plan can adapt to and reflect a changing cyber
threat environment, and incorporate best practices and
lessons learned from regular exercises, training, and after-
action reports; and
``(3) facilitate discussions on the best methods for
developing innovative and useful cybersecurity exercises for
coordinating between the Department and each of the critical
infrastructure sectors designated under section 227(b).
``(d) Update to Cyber Incident Annex to the National
Response Framework.--The Secretary, in coordination with the
heads of other Federal agencies and in accordance with the
National Cybersecurity Incident Response Plan under
subsection (c), shall regularly update, maintain, and
exercise the Cyber Incident Annex to the National Response
Framework of the Department.''.
(b) Clerical Amendment.--The table of contents in section
1(b) of such Act is amended by adding after the item relating
to section 228 (as added by section 104) the following new
item:
``Sec. 229. Cyber incident response and technical assistance.''.
SEC. 106. STREAMLINING OF DEPARTMENT CYBERSECURITY
ORGANIZATION.
(a) Cybersecurity and Infrastructure Protection
Directorate.--The National Protection and Programs
Directorate of the Department of Homeland Security shall,
after the date of the enactment of this Act, be known and
designated as the ``Cybersecurity and Infrastructure
Protection Directorate''. Any reference to the National
Protection and Programs Directorate of the Department in any
law, regulation, map, document, record, or other paper of the
United States shall be deemed to be a reference to the
Cybersecurity and Infrastructure Protection Directorate of
the Department.
(b) Senior Leadership of the Cybersecurity and
Infrastructure Protection Directorate.--
(1) In general.--Paragraph (1) of section 103(a) of the
Homeland Security Act of 2002 (6 U.S.C. 113(a)) is amended by
adding at the end the following new subparagraphs:
``(K) Under Secretary for Cybersecurity and Infrastructure
Protection.
``(L) Deputy Under Secretary for Cybersecurity.
``(M) Deputy Under Secretary for Infrastructure
Protection.''.
(2) Continuation in office.--The individuals who hold the
positions referred to in subparagraphs (K), (L), and (M) of
subsection (a) of section 103 of the Homeland Security Act of
2002 (as added by paragraph (1) of this subsection) as of the
date of the enactment of this Act may continue to hold such
positions.
(c) Report on Improving the Capability and Effectiveness of
the Cybersecurity and Communications Office.--To improve the
operational capability and effectiveness in carrying out the
cybersecurity mission (as such term is defined in section 2
of the Homeland Security Act of 2002, as amended by section
101) of the Department of Homeland Security, the Secretary of
Homeland Security shall submit to the Committee on Homeland
Security of the House of Representatives and the Committee on
Homeland Security and Governmental Affairs of the Senate a
report on--
[[Page H6913]]
(1) the feasibility of making the Cybersecurity and
Communications Office of the Department an operational
component of the Department;
(2) recommendations for restructuring the SAFETY Act Office
within the Department to protect and maintain operations in
accordance with the Office's mission to provide incentives
for the development and deployment of anti-terrorism
technologies while elevating the profile and mission of the
Office, including the feasibility of utilizing third-party
registrars for improving the throughput and effectiveness of
the certification process.
(d) Report on Cybersecurity Acquisition Capabilities.--The
Secretary of Homeland Security shall assess the effectiveness
of the Department of Homeland Security's acquisition
processes and the use of existing authorities for acquiring
cybersecurity technologies to ensure that such processes and
authorities are capable of meeting the needs and demands of
the Department's cybersecurity mission (as such term is
defined in section 2 of the Homeland Security Act of 2002, as
amended by section 101). Not later than 180 days after the
date of the enactment of this Act, the Secretary shall submit
to the Committee on Homeland Security of the House of
Representatives and the Committee on Homeland Security and
Governmental Affairs of the Senate a report on the
effectiveness of the Department's acquisition processes for
cybersecurity technologies.
(e) Resource Information.--The Secretary of Homeland
Security shall make available Department of Homeland Security
contact information to serve as a resource for Sector
Coordinating Councils and critical infrastructure owners and
critical infrastructure operators to better coordinate
cybersecurity efforts with the Department relating to
emergency response and recovery efforts for cyber incidents.
TITLE II--PUBLIC-PRIVATE COLLABORATION ON CYBERSECURITY
SEC. 201. PUBLIC-PRIVATE COLLABORATION ON CYBERSECURITY.
(a) National Institute of Standards and Technology.--
(1) In general.--The Director of the National Institute of
Standards and Technology, in coordination with the Secretary
of Homeland Security, shall, on an ongoing basis, facilitate
and support the development of a voluntary, industry-led set
of standards, guidelines, best practices, methodologies,
procedures, and processes to reduce cyber risks to critical
infrastructure. The Director, in coordination with the
Secretary--
(A) shall--
(i) coordinate closely and continuously with relevant
private entities, critical infrastructure owners and critical
infrastructure operators, Sector Coordinating Councils,
Information Sharing and Analysis Centers, and other relevant
industry organizations, and incorporate industry expertise to
the fullest extent possible;
(ii) consult with the Sector Specific Agencies, Federal,
State and local governments, the governments of other
countries, and international organizations;
(iii) utilize a prioritized, flexible, repeatable,
performance-based, and cost-effective approach, including
information security measures and controls, that may be
voluntarily adopted by critical infrastructure owners and
critical infrastructure operators to help them identify,
assess, and manage cyber risks;
(iv) include methodologies to--
(I) identify and mitigate impacts of the cybersecurity
measures or controls on business confidentiality; and
(II) protect individual privacy and civil liberties;
(v) incorporate voluntary consensus standards and industry
best practices, and align with voluntary international
standards to the fullest extent possible;
(vi) prevent duplication of regulatory processes and
prevent conflict with or superseding of regulatory
requirements, mandatory standards, and processes; and
(vii) include such other similar and consistent elements as
determined necessary; and
(B) shall not prescribe or otherwise require--
(i) the use of specific solutions;
(ii) the use of specific information technology products or
services; or
(iii) that information technology products or services be
designed, developed, or manufactured in a particular manner.
(2) Limitation.--Information shared with or provided to the
Director of the National Institute of Standards and
Technology or the Secretary of Homeland Security for the
purpose of the activities under paragraph (1) may not be used
by any Federal, State, or local government department or
agency to regulate the activity of any private entity.
(b) Amendment.--
(1) In general.--Subtitle C of title II of the Homeland
Security Act of 2002, as amended by sections 102, 103, 104,
and 105, is further amended by adding at the end the
following new section:
``SEC. 230. PUBLIC-PRIVATE COLLABORATION ON CYBERSECURITY.
``(a) Meetings.--The Secretary shall meet with the Sector
Coordinating Council for each critical infrastructure sector
designated under section 227(b) on a biannual basis to
discuss the cybersecurity threat to critical infrastructure,
voluntary activities to address cybersecurity, and ideas to
improve the public-private partnership to enhance
cybersecurity, in which the Secretary shall--
``(1) provide each Sector Coordinating Council an
assessment of the cybersecurity threat to each critical
infrastructure sector designated under section 227(b),
including information relating to--
``(A) any actual or assessed cyber threat, including a
consideration of adversary capability and intent,
preparedness, target attractiveness, and deterrence
capabilities;
``(B) the extent and likelihood of death, injury, or
serious adverse effects to human health and safety caused by
an act of terrorism or other disruption, destruction, or
unauthorized use of critical infrastructure;
``(C) the threat to national security caused by an act of
terrorism or other disruption, destruction, or unauthorized
use of critical infrastructure; and
``(D) the harm to the economy that would result from an act
of terrorism or other disruption, destruction, or
unauthorized use of critical infrastructure; and
``(2) provide recommendations, which may be voluntarily
adopted, on ways to improve cybersecurity of critical
infrastructure.
``(b) Report.--
``(1) In general.--Starting 30 days after the end of the
fiscal year in which the National Cybersecurity and Critical
Infrastructure Protection Act of 2013 is enacted and annually
thereafter, the Secretary shall submit to the appropriate
congressional committees a report on the state of
cybersecurity for each critical infrastructure sector
designated under section 227(b) based on discussions between
the Department and the Sector Coordinating Council in
accordance with subsection (a) of this section. The Secretary
shall maintain a public copy of each report, and each report
may include a non-public annex for proprietary, business-
sensitive information, or other sensitive information. Each
report shall include, at a minimum information relating to--
``(A) the risk to each critical infrastructure sector,
including known cyber threats, vulnerabilities, and potential
consequences;
``(B) the extent and nature of any cybersecurity incidents
during the previous year, including the extent to which cyber
incidents jeopardized or imminently jeopardized information
systems;
``(C) the current status of the voluntary, industry-led set
of standards, guidelines, best practices, methodologies,
procedures, and processes to reduce cyber risks within each
critical infrastructure sector; and
``(D) the volume and range of voluntary technical
assistance sought and provided by the Department to each
critical infrastructure sector.
``(2) Sector coordinating council response.--Before making
public and submitting each report required under paragraph
(1), the Secretary shall provide a draft of each report to
the Sector Coordinating Council for the critical
infrastructure sector covered by each such report. The Sector
Coordinating Council at issue may provide to the Secretary a
written response to such report within 45 days of receiving
the draft. If such Sector Coordinating Council provides a
written response, the Secretary shall include such written
response in the final version of each report required under
paragraph (1).
``(c) Limitation.--Information shared with or provided to a
Sector Coordinating Council, a critical infrastructure
sector, or the Secretary for the purpose of the activities
under subsections (a) and (b) may not be used by any Federal,
State, or local government department or agency to regulate
the activity of any private entity.''.
(2) Clerical amendment.--The table of contents in section
1(b) of such Act is amended by adding after the item relating
to section 229 (as added by section 105) the following new
item:
``Sec. 230. Public-private collaboration on cybersecurity.''.
SEC. 202. SAFETY ACT AND QUALIFYING CYBER INCIDENTS.
(a) In General.--The Support Anti-Terrorism By Fostering
Effective Technologies Act of 2002 (6 U.S.C. 441 et seq.) is
amended--
(1) in section 862(b) (6 U.S.C. 441(b))--
(A) in the heading, by striking ``Designation of Qualified
Anti-Terrorism Technologies'' and inserting ``Designation of
Anti-Terrorism and Cybersecurity Technologies'';
(B) in the matter preceding paragraph (1), by inserting
``and cybersecurity'' after ``anti-terrorism'';
(C) in paragraphs (3), (4), and (5), by inserting ``or
cybersecurity'' after ``anti-terrorism'' each place it
appears; and
(D) in paragraph (7)--
(i) by inserting ``or cybersecurity technology'' after
``Anti-terrorism technology''; and
(ii) by inserting ``or qualifying cyber incidents'' after
``acts of terrorism'';
(2) in section 863 (6 U.S.C. 442)--
(A) by inserting ``or cybersecurity'' after ``anti-
terrorism'' each place it appears;
(B) by inserting ``or qualifying cyber incident'' after
``act of terrorism'' each place it appears; and
(C) by inserting ``or qualifying cyber incidents'' after
``acts of terrorism'' each place it appears;
(3) in section 864 (6 U.S.C. 443)--
(A) by inserting ``or cybersecurity'' after ``anti-
terrorism'' each place it appears; and
(B) by inserting ``or qualifying cyber incident'' after
``act of terrorism'' each place it appears; and
(4) in section 865 (6 U.S.C. 444)--
[[Page H6914]]
(A) in paragraph (1)--
(i) in the heading, by inserting ``or cybersecurity'' after
``anti-terrorism'';
(ii) by inserting ``or cybersecurity'' after ``anti-
terrorism'';
(iii) by inserting ``or qualifying cyber incidents'' after
``acts of terrorism''; and
(iv) by inserting ``or incidents'' after ``such acts''; and
(B) by adding at the end the following new paragraph:
``(7) Qualifying cyber incident.--
``(A) In general.--The term `qualifying cyber incident'
means any act that the Secretary determines meets the
requirements under subparagraph (B), as such requirements are
further defined and specified by the Secretary.
``(B) Requirements.--A qualifying cyber incident meets the
requirements of this subparagraph if--
``(i) the incident is unlawful or otherwise exceeds
authorized access authority;
``(ii) the incident disrupts or imminently jeopardizes the
integrity, operation, confidentiality, or availability of
programmable electronic devices, communication networks,
including hardware, software and data that are essential to
their reliable operation, electronic storage devices, or any
other information system, or the information that system
controls, processes, stores, or transmits;
``(iii) the perpetrator of the incident gains access to an
information system or a network of information systems
resulting in--
``(I) misappropriation or theft of data, assets,
information, or intellectual property;
``(II) corruption of data, assets, information, or
intellectual property;
``(III) operational disruption; or
``(IV) an adverse effect on such system or network, or the
data, assets, information, or intellectual property contained
therein; and
``(iv) the incident causes harm inside or outside the
United States that results in material levels of damage,
disruption, or casualties severely affecting the United
States population, infrastructure, economy, or national
morale, or Federal, State, local, or tribal government
functions.
``(C) Rule of construction.--For purposes of clause (iv) of
subparagraph (B), the term `severely' includes any qualifying
cyber incident, whether at a local, regional, state,
national, international, or tribal level, that affects--
``(i) the United States population, infrastructure,
economy, or national morale, or
``(ii) Federal, State, local, or tribal government
functions.''.
(b) Funding.--Of the amounts authorized to be appropriated
for each of fiscal years 2014, 2015, and 2016 for the
Department of Homeland Security, the Secretary of Homeland
Security is authorized to use not less than $20,000,000 for
any such year for the Department's SAFETY Act Office.
SEC. 203. PROHIBITION ON NEW REGULATORY AUTHORITY.
This Act and the amendments made by this Act (except that
this section shall not apply in the case of section 202 of
this Act and the amendments made by such section 202) do
not--
(1) create or authorize the issuance of any new regulations
or additional Federal Government regulatory authority; or
(2) permit regulatory actions that would duplicate,
conflict with, or supercede regulatory requirements,
mandatory standards, or related processes.
SEC. 204. PROHIBITION ON ADDITIONAL AUTHORIZATION OF
APPROPRIATIONS.
No additional funds are authorized to be appropriated to
carry out this Act and the amendments made by this Act. This
Act and such amendments shall be carried out using amounts
otherwise available for such purposes.
SEC. 205. PROHIBITION ON COLLECTION ACTIVITIES TO TRACK
INDIVIDUALS' PERSONALLY IDENTIFIABLE
INFORMATION.
Nothing in this Act shall permit the Department of Homeland
Security to engage in the monitoring, surveillance,
exfiltration, or other collection activities for the purpose
of tracking an individual's personally identifiable
information.
SEC. 206. CYBERSECURITY SCHOLARS.
The Secretary of Homeland Security shall determine the
feasibility and potential benefit of developing a visiting
security researchers program from academia, including
cybersecurity scholars at the Department of Homeland
Security's Centers of Excellence, as designated by the
Secretary, to enhance knowledge with respect to the unique
challenges of addressing cyber threats to critical
infrastructure. Eligible candidates shall possess necessary
security clearances and have a history of working with
Federal agencies in matters of national or domestic security.
SEC. 207. NATIONAL RESEARCH COUNCIL STUDY ON THE RESILIENCE
AND RELIABILITY OF THE NATION'S POWER GRID.
(a) Independent Study.--Not later than 60 days after the
date of the enactment of this Act, the Secretary of Homeland
Security, in coordination with the heads of other departments
and agencies, as necessary, shall enter into an agreement
with the National Research Council to conduct research of the
future resilience and reliability of the Nation's electric
power transmission and distribution system. The research
under this subsection shall be known as the ``Saving More
American Resources Today Study'' or the ``SMART Study''. In
conducting such research, the National Research Council
shall--
(1) research the options for improving the Nation's ability
to expand and strengthen the capabilities of the Nation's
power grid, including estimation of the cost, time scale for
implementation, and identification of the scale and scope of
any potential significant health and environmental impacts;
(2) consider the forces affecting the grid, including
technical, economic, regulatory, environmental, and
geopolitical factors, and how such forces are likely to
affect--
(A) the efficiency, control, reliability and robustness of
operation;
(B) the ability of the grid to recover from disruptions,
including natural disasters and terrorist attacks;
(C) the ability of the grid to incorporate greater reliance
on distributed and intermittent power generation and
electricity storage;
(D) the ability of the grid to adapt to changing patterns
of demand for electricity; and
(E) the economic and regulatory factors affecting the
evolution of the grid;
(3) review Federal, State, industry, and academic research
and development programs and identify technological options
that could improve the future grid;
(4) review studies and analyses prepared by the North
American Electric Reliability Corporation (NERC) regarding
the future resilience and reliability of the grid;
(5) review the implications of increased reliance on
digital information and control of the power grid for
improving reliability, resilience, and congestion and for
potentially increasing vulnerability to cyber attack;
(6) review regulatory, industry, and institutional factors
and programs affecting the future of the grid;
(7) research the costs and benefits, as well as the
strengths and weaknesses, of the options identified under
paragraph (1) to address the emerging forces described in
paragraph (2) that are shaping the grid;
(8) identify the barriers to realizing the options
identified and suggest strategies for overcoming those
barriers including suggested actions, priorities, incentives,
and possible legislative and executive actions; and
(9) research the ability of the grid to integrate existing
and future infrastructure, including utilities,
telecommunications lines, highways, and other critical
infrastructure.
(b) Cooperation and Access to Information and Personnel.--
The Secretary shall ensure that the National Research Council
receives full and timely cooperation, including full access
to information and personnel, from the Department of Homeland
Security, the Department of Energy, including the management
and operating components of the Departments, and other
Federal departments and agencies, as necessary, for the
purposes of conducting the study described in subsection (a).
(c) Report.--
(1) In general.--Not later than 18 months from the date on
which the Secretary enters into the agreement with the
National Research Council described in subsection (a), the
National Research Council shall submit to the Secretary and
the Committee on Homeland Security and the Committee on
Energy and Commerce of the House of Representatives and the
Committee on Homeland Security and Governmental Affairs and
the Committee on Energy and Natural Resources of the Senate a
report containing the findings of the research required by
that subsection.
(2) Form of report.--The report under paragraph (1) shall
be submitted in unclassified form, but may include a
classified annex.
(d) Funding.--Of the amounts authorized to be appropriated
for 2014 for the Department of Homeland Security, the
Secretary of Homeland Security is authorized to obligate and
expend not more than $2,000,000 for the National Research
Council report.
TITLE III--HOMELAND SECURITY CYBERSECURITY WORKFORCE
SEC. 301. HOMELAND SECURITY CYBERSECURITY WORKFORCE.
(a) In General.--Subtitle C of title II of the Homeland
Security Act of 2002, as amended by sections 101, 102, 103,
104, 105, and 201, is further amended by adding at the end
the following new section:
``SEC. 230A. CYBERSECURITY OCCUPATION CATEGORIES, WORKFORCE
ASSESSMENT, AND STRATEGY.
``(a) Short Title.--This section may be cited as the
`Homeland Security Cybersecurity Boots-on-the-Ground Act'.
``(b) Cybersecurity Occupation Categories.--
``(1) In general.--Not later than 90 days after the date of
the enactment of this section, the Secretary shall develop
and issue comprehensive occupation categories for individuals
performing activities in furtherance of the cybersecurity
mission of the Department.
``(2) Applicability.--The Secretary shall ensure that the
comprehensive occupation categories issued under paragraph
(1) are used throughout the Department and are made available
to other Federal agencies.
``(c) Cybersecurity Workforce Assessment.--
``(1) In general.--Not later than 180 days after the date
of the enactment of this section and annually thereafter, the
Secretary shall assess the readiness and capacity of the
workforce of the Department to meet its cybersecurity
mission.
[[Page H6915]]
``(2) Contents.--The assessment required under paragraph
(1) shall, at a minimum, include the following:
``(A) Information where cybersecurity positions are located
within the Department, specified in accordance with the
cybersecurity occupation categories issued under subsection
(b).
``(B) Information on which cybersecurity positions are--
``(i) performed by--
``(I) permanent full time departmental employees, together
with demographic information about such employees' race,
ethnicity, gender, disability status, and veterans status;
``(II) individuals employed by independent contractors; and
``(III) individuals employed by other Federal agencies,
including the National Security Agency; and
``(ii) vacant.
``(C) The number of individuals hired by the Department
pursuant to the authority granted to the Secretary in 2009 to
permit the Secretary to fill 1,000 cybersecurity positions
across the Department over a three year period, and
information on what challenges, if any, were encountered with
respect to the implementation of such authority.
``(D) Information on vacancies within the Department's
cybersecurity supervisory workforce, from first line
supervisory positions through senior departmental
cybersecurity positions.
``(E) Information on the percentage of individuals within
each cybersecurity occupation category who received essential
training to perform their jobs, and in cases in which such
training is not received, information on what challenges, if
any, were encountered with respect to the provision of such
training.
``(F) Information on recruiting costs incurred with respect
to efforts to fill cybersecurity positions across the
Department in a manner that allows for tracking of overall
recruiting and identifying areas for better coordination and
leveraging of resources within the Department.
``(d) Workforce Strategy.--
``(1) In general.--Not later than 180 days after the date
of the enactment of this section, the Secretary shall
develop, maintain, and, as necessary, update, a comprehensive
workforce strategy that enhances the readiness, capacity,
training, recruitment, and retention of the cybersecurity
workforce of the Department.
``(2) Contents.--The comprehensive workforce strategy
developed under paragraph (1) shall include--
``(A) a multiphased recruitment plan, including relating to
experienced professionals, members of disadvantaged or
underserved communities, the unemployed, and veterans;
``(B) a 5-year implementation plan;
``(C) a 10-year projection of the Department's
cybersecurity workforce needs; and
``(D) obstacles impeding the hiring and development of a
cybersecurity workforce at the Department.
``(e) Information Security Training.--Not later than 270
days after the date of the enactment of this section, the
Secretary shall establish and maintain a process to verify on
an ongoing basis that individuals employed by independent
contractors who serve in cybersecurity positions at the
Department receive initial and recurrent information security
training comprised of general security awareness training
necessary to perform their job functions, and role-based
security training that is commensurate with assigned
responsibilities. The Secretary shall maintain documentation
to ensure that training provided to an individual under this
subsection meets or exceeds requirements for such
individual's job function.
``(f) Updates.--The Secretary shall submit to the
appropriate congressional committees annual updates regarding
the cybersecurity workforce assessment required under
subsection (c), information on the progress of carrying out
the comprehensive workforce strategy developed under
subsection (d), and information on the status of the
implementation of the information security training required
under subsection (e).
``(g) GAO Study.--The Secretary shall provide the
Comptroller General of the United States with information on
the cybersecurity workforce assessment required under
subsection (c) and progress on carrying out the comprehensive
workforce strategy developed under subsection (d). The
Comptroller General shall submit to the Secretary and the
appropriate congressional committees a study on such
assessment and strategy.
``(h) Cybersecurity Fellowship Program.--Not later than 120
days after the date of the enactment of this section, the
Secretary shall submit to the appropriate congressional
committees a report on the feasibility of establishing a
Cybersecurity Fellowship Program to offer a tuition payment
plan for undergraduate and doctoral candidates who agree to
work for the Department for an agreed-upon period of time.''.
(b) Clerical Amendment.--The table of contents in section
1(b) of such Act is amended by adding after the item relating
to section 230 (as added by section 201) the following new
item:
``Sec. 230A. Cybersecurity occupation categories, workforce assessment,
and strategy.''.
SEC. 302. PERSONNEL AUTHORITIES.
(a) In General.--Subtitle C of title II of the Homeland
Security Act of 2002, as amended by sections 101, 102, 103,
104, 105, 106, 201, and 301 is further amended by adding at
the end the following new section:
``SEC. 230B. PERSONNEL AUTHORITIES.
``(a) In General.--
``(1) Personnel authorities.--The Secretary may exercise
with respect to qualified employees of the Department the
same authority that the Secretary of Defense has with respect
to civilian intelligence personnel and the scholarship
program under sections 1601, 1602, 1603, and 2200a of title
10, United States Code, to establish as positions in the
excepted service, appoint individuals to such positions, fix
pay, and pay a retention bonus to any employee appointed
under this section if the Secretary determines that such is
needed to retain essential personnel. Before announcing the
payment of a bonus under this paragraph, the Secretary shall
submit to the Committee on Homeland Security of the House of
Representatives and the Committee on Homeland Security and
Governmental Affairs of the Senate a written explanation of
such determination. Such authority shall be exercised--
``(A) to the same extent and subject to the same conditions
and limitations that the Secretary of Defense may exercise
such authority with respect to civilian intelligence
personnel of the Department of Defense; and
``(B) in a manner consistent with the merit system
principles set forth in section 2301 of title 5, United
States Code.
``(2) Civil service protections.--Sections 1221 and 2302,
and chapter 75 of title 5, United States Code, shall apply to
the positions established pursuant to the authorities
provided under paragraph (1).
``(3) Plan for execution of authorities.--Not later than
120 days after the date of the enactment of this section, the
Secretary shall submit to the Committee on Homeland Security
of the House of Representatives and the Committee on Homeland
Security and Governmental Affairs of the Senate a report that
contains a plan for the use of the authorities provided under
this subsection.
``(b) Annual Report.--Not later than one year after the
date of the enactment of this section and annually thereafter
for four years, the Secretary shall submit to the Committee
on Homeland Security of the House of Representatives and the
Committee on Homeland Security and Governmental Affairs of
the Senate a detailed report (including appropriate metrics
on actions occurring during the reporting period) that
discusses the processes used by the Secretary in implementing
this section and accepting applications, assessing
candidates, ensuring adherence to veterans' preference, and
selecting applicants for vacancies to be filled by a
qualified employee.
``(c) Definition of Qualified Employee.--In this section,
the term `qualified employee' means an employee who performs
functions relating to the security of Federal civilian
information systems, critical infrastructure information
systems, or networks of either of such systems.''.
(b) Clerical Amendment.--The table of contents in section
1(b) of such Act is amended by adding after the item relating
to section 230A (as added by section 301) the following new
item:
``Sec. 230B. Personnel authorities.''.
The SPEAKER pro tempore. Pursuant to the rule, the gentleman from
Texas (Mr. McCaul) and the gentlewoman from New York (Ms. Clarke) each
will control 20 minutes.
The Chair recognizes the gentleman from Texas.
General Leave
Mr. McCAUL. Mr. Speaker, I ask unanimous consent that all Members may
have 5 legislative days in which to revise and extend their remarks and
include any extraneous material on the bill under consideration.
The SPEAKER pro tempore. Is there objection to the request of the
gentleman from Texas?
There was no objection.
Mr. McCAUL. Mr. Speaker, I yield myself such time as I may consume.
Mr. Speaker, I rise today in support of H.R. 3696, the National
Cybersecurity and Critical Infrastructure Protection Act of 2014. I
have worked on this for a long time and introduced this bill with my
good friend and colleague, the chairman of the Cybersecurity
Subcommittee, the gentleman from Pennsylvania, Congressman Pat Meehan.
I would also like to thank Ranking Member Thompson, as well as Ranking
Member Clarke of the Cybersecurity Subcommittee, for all their hard
work in forging this bipartisan bill. These efforts once again prove
that we can work together, despite our differences, to craft
legislation that improves our national security and helps protect
American critical infrastructure from devastating cyber attacks.
Just last week, the Homeland Security Committee heard testimony that
we are at a pre-9/11 mindset when it comes to cybersecurity and that
the government needs to do a better job at warning the public about the
dangers of attacks on networks we rely upon. That was from the 9/11
Commission itself.
[[Page H6916]]
Cyber vulnerabilities in our Nation's critical infrastructure are an
Achilles heel in our homeland security defenses. Let me be very clear.
The cyber threat is real and it is happening right now. The Internet
has become the next battlefield for warfare, but unlike land, sea, and
air, cyber attacks occur at the speed of light, they are global, and
they are more difficult to attribute.
Criminals, hacktivists, terrorists, and nation-state actors such as
Russia, China, and Iran are increasingly using malicious malware to
hack into U.S. companies for espionage purposes or financial gain, our
defense systems to steal our sensitive military information, and our
critical infrastructure to gain access to our gas lines, power grids,
and water systems.
Iranian hackers, for example, continue to attack the American
financial services sector to shut down Web sites and restrict America's
access to their bank accounts. Additionally, Iran continues to build
more sophisticated cyber weapons to target U.S. energy companies and
has demonstrated these capabilities when they attacked Saudi Arabia's
national oil company, Aramco, and erased critical files on 30,000
computers. We cannot allow rogue nations like Iran to be able to shut
things down and have capabilities that match our defenses. That would
be a game-changer for our national security.
The Chinese, in particular, are hacking into major U.S. companies to
give their industries competitive economic advantages in our global
economy. I applaud the recent efforts taken by the Justice Department
for indicting five members of the Chinese government for conducting
cyber espionage attacks against U.S. industry, but more needs to be
done. Those indictments send a clear message to our adversaries that
cyber espionage and theft of American intellectual property, trade
secrets, military blueprints, and jobs will not be tolerated.
A recent McAfee and Center for Strategic and International Studies
report on the economic impact of cyber crime found an annual effect of
roughly $455 billion globally, with 200,000 jobs lost in the United
States alone as a result. In fact, former Director of the NSA, General
Keith Alexander, described cyber espionage and the loss of American
intellectual property and innovation as ``the greatest transfer of
wealth in history.''
A recent poll conducted by Defense News revealed that our top
Nation's top security analysts see cyber attacks as the greatest threat
to our Nation. In fact, Director of National Intelligence, James
Clapper, testified earlier this year that: ``Critical infrastructure,
particularly the systems used in water management, oil, and gas
pipelines, electrical power distribution, and mass transit, provides an
enticing target to malicious actors.''
{time} 1645
A cyber attack on U.S. critical infrastructure--such as gas
pipelines, financial services, transportation, and communication
networks--could result in catastrophic regional or national effects on
public health or safety, economic security, and national security.
High-profile retail breaches like the ones at Target and Neiman
Marcus that compromised the personal information of over 110 million
American consumers resonate with Americans, but as bad as those
breaches were, a successful cyber attack on our critical infrastructure
could cause much more damage in terms of lives lost and monetary
damage. We cannot and will not wait for a catastrophic 9/11-scaled
cyber attack to occur before moving greatly needed cybersecurity
legislation.
The National Cybersecurity and Critical Infrastructure Protection Act
ensures that DHS and not the military is responsible for domestic
critical infrastructure protection.
Specifically, H.R. 3696 ensures that there is a ``civilian
interface'' to the private sector to share real-time cyber threat
information across the critical infrastructure sectors, particularly in
light of the Snowden revelations.
Importantly, the bill protects civil liberties by putting a civilian
agency with the Nation's most robust privacy and civil liberties office
in charge of preventing personal information from being shared. While
also prohibiting any new regulatory authority, this bill builds upon
the groundwork already laid by industry and DHS to facilitate critical
infrastructure protection and incidence response efforts.
This bipartisan bill, which is rare in this day and age, Mr. Speaker,
is a product of 19 months of extensive outreach and great collaboration
with all stakeholders, including more than 300 meetings with experts,
industry, government agencies, academics, privacy advocates, and other
committees of jurisdiction.
We went through several drafts and countless hours of negotiations to
bring this commonsense legislation to the floor with support from all
of the critical infrastructure sectors.
I will enter in the Record some of the letters of support,
representing over 33 trade associations from across industry sectors,
U.S. businesses, national security experts, and privacy and civil
liberty advocates.
Specifically, we have received support letters from the American
Civil Liberties Union, the American Chemistry Council, AT&T, Boeing,
Con Edison, the Depository Trust and Clearing Corporation, GridWise
Alliance, and multiple trade associations in the energy sector and the
financial services sector, Information Technology Industry Council, the
Internet Security Alliance, Rapid7, National Defense Industrial
Association, Professional Services Council, Oracle, Entergy, Pepco,
Verizon, and Symantec.
I believe that is a very impressive showing on behalf of the privacy
advocates and also the private sector.
American Civil Liberties Union,
January 14, 2014.
Re H.R. 3696, the ``National Cybersecurity and Critical
Infrastructure Protection Act of 2013'' (NCCIP Act)
Hon. Michael McCaul, Chairman,
Hon. Bennie Thompson, Ranking Member,
Hon. Patrick Meehan, Subcommittee Chairman,
Hon. Yvette Clarke, Subcommittee Ranking Member,
House Homeland Security Committee,
Washington, DC.
Dear Chairmen and Ranking Members: On behalf of the
American Civil Liberties Union (ACLU), its over half a
million members, countless additional supporters and
activists, and 53 affiliates nationwide, we write in regard
to H.R. 3696, the National Cybersecurity and Critical
Infrastructure Protection Act of 2013 (NCCIP Act). We have
reviewed this legislation and have found that information
sharing provisions in this bill do not undermine current
privacy laws.
As we testified before the Committee last year, it is
crucial that civilian agencies like the Department of
Homeland Security lead domestic cybersecurity efforts and the
NCCIP Act makes strides towards that end. The bill directs
DHS to coordinate cybersecurity efforts among non-
intelligence government agencies and critical infrastructure
entities. The NCCIP Act smartly does that by focusing on
coordination and information sharing within current law and
leveraging existing structures that have proven successful in
the past. Unlike H.R. 624, the Cyber Intelligence Sharing and
Protection Act (CISPA), your bill does not create broad
exceptions to the privacy laws for cybersecurity. Instead, it
strengthens private-public partnerships by supporting
existing Information Sharing and Analysis Centers and Sector
Coordinating Councils and reinforces voluntary sharing under
current statutes that already provide for many cybersecurity
scenarios.
We commend the Committee for advancing cyber legislation
that is both pro-security and pro-privacy and we look forward
to working with you further on this matter. Please contact
Michelle Richardson, Legislative Counsel, at 202-715-0825 or
[email protected] for more information.
Sincerely,
Laura W. Murphy,
Director,
Michelle Richardson,
Legislative Counsel.
____
American Gas Association, Edison Electric Institute,
American Public Power Association, National Rural
Electric Cooperative Association,
January 8, 2014.
Hon. Michael McCaul,
Chairman, House Committee on Homeland Security, Washington,
DC.
Hon. Bennie G. Thompson,
Ranking Member, House Committee on Homeland Security,
Washington, DC.
Dear Chairman McCaul and Ranking Member Thompson: We write
to thank you and your colleagues for your outreach in
drafting H.R. 3696, the ``National Cybersecurity and Critical
Infrastructure Protection Act of 2013'' (the ``NCCIP Act'').
Like you, we are very focused on protecting the nation's
critical energy infrastructure from the impacts of a cyber
event. While thankfully the nation has yet to experience a
cyber attack that has damaged infrastructure, we appreciate
that the House
[[Page H6917]]
Committee on Homeland Security has taken the time and effort
to craft legislation that attempts to help address the
preparedness for and response to such events should they
occur in the future.
The undersigned associations represent the vast majority of
electric and gas utilities. We are proud of the efforts our
members have undertaken, collectively and individually, to
improve the reliability and resiliency of their systems. In
the gas sector, this encompasses a variety of public, private
and, jointly developed public-private sector cybersecurity
standards designed to protect pipeline infrastructure and
ensure safe and reliable gas delivery. In the electric
sector, this includes mandatory and enforceable cybersecurity
standards already in place. Developed by the North American
Electric Reliability Corporation for review and approval by
the Federal Energy Regulatory Commission and applicable
Canadian governmental authorities, these standards ensure
that owners, users, and operators of the North American bulk
electric system meet a baseline level of security.
Even considering those measures, the issue of liability
after a cyber event creates serious concerns for us and our
members. In particular, we are deeply concerned that no
matter what steps are taken, our members could face costly
and unnecessary litigation in state or federal courts after a
cyber event that would serve no purpose.
Therefore, we applaud Section II of the NCCIP Act,
specifically the section seeking to clarify the scope of the
Support Anti-Terrorism By Fostering Effective Technologies
Act of 2002 (the ``SAFETY Act''). The language of the SAFETY
Act statute as well as its Final Rule have always made clear
that the protections offered by the law applies to cyber
events, and indeed that the SAFETY Act applies regardless of
whether a ``terrorist'' group conducted such an attack.
However, in practice there has been some hesitancy on the
part of industry to utilize the SAFETY Act to protect against
federal claims arising out of cyber attacks due to the
requirement that the attack be deemed an ``act of terrorism''
by the Secretary of Homeland Security before liability
protections become available.
The decision to include in H.R. 3696 a provision that
explicitly allows the Secretary of Homeland Security to
declare that a ``qualifying cyber incident'' triggers the
liability protections of the SAFETY Act is an excellent one.
Removing the need to link a cyber attack to an ``act of
terrorism'' is a good step. While state liability actions
remain a concern, the industry and vendors of cyber security
technologies and services will be much more likely to use the
SAFETY Act program, thereby fulfilling the law's original
intent of promoting the widespread deployment of products and
services that can deter, defend against, respond to,
mitigate, defeat, or otherwise mitigate a variety of
malicious events, including those related to cyber security.
We share your goal of protecting the nation's critical
infrastructure from cyber threats and appreciate your efforts
to address this important national security issue. We look
forward to continuing to work together to ensure H.R. 3696
remains focused on these principles as it moves through the
legislative process.
Respectfully,
American Gas Association,
American Public Power Association,
Edison Electric Institute,
National Rural Electric Cooperative Association.
____
AT&T Services, Inc.,
Washington, DC, January 8, 2014.
Hon. Michael T. McCaul,
Chairman, Committee on Homeland Security, Washington, DC.
Dear Chairman McCaul: We applaud you and your staff for
working so hard to update and streamline the Homeland
Security Act of 2002 to address today's cyber security
challenges. In your efforts to update the important role of
the Department of Homeland Security within the national
policy framework for critical infrastructure protection, you
and your staff have actively listened to multiple stakeholder
concerns to ensure that the best aspects of existing private
public partnerships, which are the hallmark of our nation's
efforts to address cyber threats, remain as such.
Your bill joins other important items introduced by your
colleagues in the 113th Congress. We look forward to
continuing to work with you and your colleagues to forge a
bipartisan legislative framework for the practice of
cybersecurity in the coming decade that encourages continued
private sector investment in innovation and cyber education
and provides legal clarity in the day-to-day operational
world of identifying and addressing cyber threats in a
globally interconnected network of networks.
Sincerely,
Timothy P. McKone.
____
January 13, 2014.
Hon. Michael McCaul,
Chairman, Committee on Homeland Security, U.S. House of
Representatives, Washington, DC.
Hon. Bennie Thompson,
Ranking Member, Committee on Homeland Security, U.S. House of
Representatives, Washington, DC.
Dear Chairman McCaul and Ranking Member Thompson: The
undersigned organizations, representing the financial
services industry, appreciate your efforts to introduce H.R.
3696, the National Cybersecurity and Critical Infrastructure
Protection Act. We welcome your leadership in this crucial
fight against cyber threats and your work in forging this
commonsense, bipartisan legislation.
While Congress considers much needed legislative action,
our associations and the financial services industry have
taken major steps to address the cybersecurity threats facing
the Nation's critical infrastructure. The financial services
sector continues to invest in our infrastructure, has
improved coordination among institutions of all sizes, and is
continually enhancing our partnerships with government.
H.R. 3696 recognizes the necessary partnership between the
private and public sectors that is required to better protect
our Nation's cybersecurity infrastructure. Among other
provisions, this bill would strengthen existing mechanisms
such as the Financial Services Sector Coordinating Council
(FSSCC) and the Financial Services Information Sharing and
Analysis Center (FS-ISAC) that help our sector identify
threats, respond to cyber incidents and coordinate with
government partners. These organizations work closely with
partners throughout the government, including our sector
specific agency, the Department of Treasury, as well as the
Department of Homeland Security. Each agency has a civilian
mission and plays a unique role in sector cybersecurity
efforts and both work to strengthen the sector's
understanding of the threat environment.
Additionally H.R. 3696 seeks to improve the provisioning of
security clearances for those involved in cybersecurity
information sharing. Your recognition that this is a system
that demands improvement is strongly supported by our
industry and we further encourage the expansion of this to
specifically include individuals within critical
infrastructure responsible for key aspects of network defense
or mitigation. It is essential that all sizes of institutions
within critical infrastructure receive access to classified
threat information in a timely manner.
Finally, H.R. 3696 expands the existing Support Anti-
Terrorism by Fostering Effective Technologies Act (SAFETY
Act) to provide important legal liability protections for
providers and users of certified cybersecurity technology in
the event of a qualified Cybersecurity incident. We urge
Congress to work with the Department of Homeland Security to
ensure that, should this provision be adopted, the expanded
SAFETY Act is implemented in a manner that does not duplicate
or conflict with existing regulatory requirements, mandatory
standards, or the evolving voluntary National Institute for
Standards and Technology (NIST) Cybersecurity Framework. An
expansion of the program must be coupled with additional
funding to enable DHS to handle the increased scope of
program and subsequent increase in applicants. Further, it is
incumbent that an expansion enables DHS to streamline its
SAFETY Act review and approval process so as not to
discourage participation in the program.
Our sector has actively engaged in the implementation of
Executive Order 13636 and the development by the National
Institute of Standards and Technology of a Cybersecurity
Framework. We believe the process outlined in H.R. 3696
should reflect the Framework developed through this cross-
sector collaborative process.
Each of our organizations and respective member firms have
made cybersecurity a top priority. We are committed to
working with you as you lead in this crucial fight for
cybersecurity of critical infrastructure.
American Bankers Association, The Clearing House,
Consumer Bankers Association, Credit Union National
Association (CUNA), Electronic Funds Transfer
Association, Financial Services--Information Sharing
and Analysis Center (FS-ISAC), Financial Services
Roundtable, Independent Community Bankers Association
(ICBA) Investment Company Institute, NACHA--The
Electronic Payments Association, National Association
of Federal Credit Unions (NAFCU), Securities Industry
and Financial Markets Association (SIFMA).
Mr. McCAUL. I want to give a great deal of thanks not only to the
Members involved, but to the staff on this committee on both sides of
the aisle who have worked countless hours to bring this bill to its
fruition on the floor of the House.
I also would like to bring special attention to the endorsement from
the ACLU. They refer to H.R. 3696 as ``both pro-security and pro-
privacy.'' When have we heard these two coming together?
Striking a balance between security and privacy, I believe, is one of
the most difficult challenges in developing cybersecurity legislation,
and I am so very proud that this committee and this bill achieves that
goal.
I want to close with the threat that I see out there from cyber.
People ask me: What keeps you up at night? We can talk about al Qaeda,
Mr. Putin, or
[[Page H6918]]
ISIS in Iraq and Syria, we can talk about our border and the threats
south of the border, but when I see our offensive capability and what
we can do offensively, knowing at night that we don't have the
defensive capability to stop attacks not only to steal things, not only
criminal IP theft, not just espionage, but the power to shut things
down and to bring this country to its knees with a cyber 9/11, Mr.
Speaker, is really what keeps me up at night.
My father was a World War II bombardier on a B-17. He flew over 32
missions in Europe in support of the D-day invasion and the Battle of
the Bulge. In his days, bombs won that war.
We have a new kind of warfare out there. It is a digital warfare, and
the game has changed. It is done anonymously. There are no boundaries
to this cyber threat any more. It can come from anywhere, at any time,
without being able to attribute it back to the source from where the
attack came from.
This bill will for the first time codify DHS' ability--and the NCCIC,
which is their cyber command, to better defend and support critical
infrastructure in the United States that we so heavily depend on, and
it will ultimately protect not only our economy and our infrastructure,
but ultimately protect the American people.
With that, Mr. Speaker, I ask my colleagues to support this important
legislation to protect America, and I reserve the balance of my time.
Ms. CLARKE of New York. Mr. Speaker, I yield myself such time as I
may consume.
Mr. Speaker, I rise in strong support of H.R. 3696, the National
Cybersecurity and Critical Infrastructure Protection Act of 2014, and I
am pleased to be here today as an original cosponsor of this
legislation.
This bipartisan legislation gives the Department of Homeland Security
the legislative authority it needs to carry out its cyber mission and
to help protect our Nation's critical infrastructure from cyber attacks
and intrusions.
The approach taken in this bill is very much in line with DHS'
approach since 2007, when President Bush designated the Department as
the lead Federal civilian agency for cybersecurity.
This is a dual mission. DHS is responsible for working with Federal
civilian agencies to protect Federal IT networks and the dot-gov
domain. At the same time, DHS is responsible for effectively partnering
with the private sector to raise its level of cyber hygiene and foster
greater cybersecurity.
I am pleased that H.R. 3696 authorizes the 247 operations of the
National Cybersecurity and Communications Integration Center, also
referred to as NCCIC. The NCCIC has been the epicenter for information
sharing about the activities of cyberterrorists and criminals and the
reporting of cyber incidents by critical infrastructure owners and
operators.
Additionally, the bill codifies ongoing efforts to raise the level of
cybersecurity within critical infrastructure sectors. Specifically, it
authorizes the development and implementation, in coordination with the
private sector, of voluntary risk-based security standards.
This provision essentially codifies the process that the National
Institute of Standards and Technology, also known as NIST, undertook
pursuant to an executive order that President Obama issued in February
of 2013.
Under the approach taken in this bill, we are asking business and
government to come together to find an adaptable and cooperative
cybersecurity framework, not an off-the-shelf or check-the-box
solution, to raise the level of cybersecurity across the Nation.
I am pleased that the measured and targeted approach taken to working
with the private sector was supported by the American Civil Liberties
Union, which called our bill ``pro-security and pro-privacy.''
The President said it best:
It is the policy of the United States to enhance the
security and resilience of the Nation's critical
infrastructure and to maintain a cyber environment that
encourages efficiency, innovation, and economic prosperity
while promoting safety, security, business confidentiality,
privacy, and civil liberties.
While I am also pleased about all we do with respect to the
Department's mission to work with the private sector on cybersecurity,
I am a bit disappointed that key language that clarifies DHS' roles
with respect to other Federal agencies and protection of the dot-gov
domain is not in the bill before you today.
Unfortunately, the striking of these provisions appears to have been
the price the Committee on Homeland Security had to pay to get this
important legislation to the floor.
It seems that the provisions that would have given DHS specific
authority to respond in a more timely manner to Federal network
breaches were opposed by another committee chairman. Unfortunately,
that chairman has willfully chosen to ignore reality.
The reality is that since 2008, DHS has assumed responsibility for
working with agencies to protect the dot-gov domain, not the Office of
Management and Budget.
It is my hope that, as this legislation moves through the legislative
process, there will be progress on efforts to ensure that the law
reflects this reality.
With that, Mr. Speaker, I urge passage of H.R. 3696, and I reserve
the balance of my time.
Mr. McCAUL. Mr. Speaker, I yield such time as he may consume to the
gentleman from Pennsylvania (Mr. Meehan), chairman of the Committee on
Homeland Security's Subcommittee on Cybersecurity, Infrastructure
Protection, and Security Technologies, who has spent, I must say,
countless hours advancing this bill, meeting with the private sector
and privacy groups to get to this point where we are today.
I want to commend you, sir, for a job well done.
Mr. MEEHAN. I want to thank the gentleman from Texas and my
colleagues from both sides of the aisle.
Mr. Speaker, I rise in strong support of H.R. 3696, the National
Cybersecurity and Critical Infrastructure Protection Act of 2014.
Before I really talk about the substance, I want to associate myself
for a moment with the comments and very effective commentary of the
gentleman from Texas (Mr. McCaul), but his closing, I think, really
summed it up. It is not just what we are doing; but why does this
matter? Why does this matter now?
We have generated tremendous economic prosperity by virtue of the
creation of a global Internet, but the fact of the matter is that while
this has closed our world and enabled instantaneous communications and
other kinds of benefits, it has also created a situation, for the first
time in the history of our Nation, in which we aren't protected by two
oceans and, effectively, two friendly countries on our borders. Now, we
are able to be accessed from anywhere in the world at a moment's
notice.
It was instructive to me that I often used to say, when we were
handling a case, that you let the evidence be put in through the words
of the witnesses. If you pay attention to the words of the witness,
that is more powerful than what you can say.
It is instructive to me that the first thing former CIA Director and
former Secretary of Defense Leon Panetta did when he stepped down as
Secretary of Defense was to travel to New York and warn not just New
York, but this Nation about the potential impact of what he termed a
``cyber Pearl Harbor.''
As a result, this is a critically important and timely issue that we
are working on. As importantly, it has been addressed in an effective
bipartisan fashion.
In the wake of more aggressive and escalating cyber attacks on our
Nation's critical infrastructure, including our financial systems,
NASDAQ, and the recent Neiman Marcus and Target breaches of Americans'
personal information, we bring H.R. 3696 to the House floor.
{time} 1700
Cyber attacks and cyber hacks are now front and center in our
homeland, and the media is reporting more now than ever on what cyber
targets already know--that the threat is constant and evolving.
Americans expect Congress to act.
We who serve in Congress and government know all too well that the
cyber threat is real and imminent and can do catastrophic damage and
destruction to the critical infrastructure of our Nation--our bridges,
tunnels, oil
[[Page H6919]]
and gas pipelines, water systems, financial systems and their markets,
air traffic control systems, and more. Today, the U.S. House of
Representatives takes a significant step forward in protecting and
securing cyberspace through the cyber infrastructure act that we have
put on the floor today.
I am very proud of this bill and of all of the good work and due
diligence that went into it. Chairman McCaul and I and our staffs held
over 300 stakeholder meetings to ensure we got this legislation right.
I want to thank as well my good friends on the other side of the
aisle--Ranking Member Bennie Thompson and subcommittee Ranking Member
Yvette Clarke--for their leadership and their work collectively on
this.
This is bipartisan legislation but not just amongst those of us
working together here within the House. As the chairman identified, it
has also been supported by private sector stakeholders, by the ACLU. In
fact, the ACLU has called it--and the chairman as well--pro-security
and pro-privacy. That is because, very notably, this bill puts the
Department of Homeland Security, a civilian agency with the Nation's
first-created and most robust privacy office, in charge of preventing
personal information from getting inadvertently caught in the net,
which is a big, important part of the work that has been done here.
This bill builds upon the Department of Homeland Security's unique
public-private partnership in securing the Nation's critical
infrastructure, and it codifies the Department's critical cybersecurity
mission. Public-private is important, as 90 percent of the assets in
the cyber world are in the private sector. The Department of Homeland
Security works with the other Federal Government partners in a
collaborative effort to secure our Nation against cyber attacks, and
this bill cements DHS' critical role.
Specifically, this bill requires the Department to collaborate with
industry to facilitate both the protection of our infrastructure and
our response to a cyber attack. The bill, very importantly, strengthens
DHS' civilian, transparent interface to allow real-time cyber threat
sharing across the critical infrastructure sectors. This legislation
also strengthens the integrity of our Nation's information systems, and
it makes it more difficult for online hackers to compromise consumer
and personal information, like we saw in Target, and it prevents
hackers from stealing Americans' business and intellectual property--
another point well driven home by the chairman in talking about jobs
and of the hundreds of billions of dollars in research and development
that are stolen from America by virtue of these cyber attacks.
The ability of these attacks to take place at the level of
sophistication necessary to penetrate some of the world's most mature
networks should come as no surprise. Foreign adversaries, including
China, Iran, and Russian criminal enterprises, have spent years and
have invested billions of dollars into crafting and securing the tools
and intelligence necessary to target American citizens. Whether it is
the theft of wealth or intelligence or that of launching a malicious
attack on our Nation's energy, transportation, or chemical networks,
American lives and livelihoods remain at risk without sufficient
security.
Last year, President Obama issued an executive order on cybersecurity
because Congress failed to act on this issue, but the threshold of
securing our Nation in the 21st century cannot rely on executive orders
and Presidential directives. As Members of Congress, we have the
responsibility to act in a way that best protects the American
citizens. Our enemies live and breathe to catch us asleep at the
switch, and I am unwilling, as my colleagues are, to stand by,
speechless, when they are asked, What did you do to prevent a cyber
attack? Now is the time to show them what we have and what we can do.
This bill doesn't address every issue in cybersecurity, and it is not
a comprehensive cybersecurity fix, but it is a giant and critical step
forward. Together, we can unite our Nation against those who wish to do
us harm, and I have no doubt that we can get it done. In fact, we have
no other choice. I urge the support of H.R. 3696.
Mr. McCAUL. Mr. Speaker, I have no further requests for time. I
believe the gentlewoman from New York has a few additional speakers, so
I am prepared to close once the gentlewoman does.
I continue to reserve the balance of my time.
Ms. CLARKE of New York. Mr. Speaker, I yield 2 minutes to the
distinguished gentleman from New Jersey (Mr. Payne).
Mr. PAYNE. Mr. Speaker, I rise in support of H.R. 3696, the National
Cybersecurity and Critical Infrastructure Protection Act.
In October of 2012, Hurricane Sandy wreaked havoc up and down the
east coast, including in my home State of New Jersey. According to the
Department of Energy, between 2003 and 2012, close to 700 power outages
occurred due to weather-related events, costing the Nation an annual
average of $18 billion to $33 billion. Even worse, in 2012, Hurricane
Sandy carried an estimated price tag of between $40 billion and $52
billion, and as we have seen recently, our power systems are exposed to
cyber attacks more than ever before.
Disasters, whether manmade or by Mother Nature, are a drain on our
Nation's economy and expose us to other potentially more harmful
attacks on our financial industry, water and waste systems, chemical,
telecommunications, and energy sectors. Put simply, it is clear that
our electric grid needs an upgrade. That is why I am pleased that,
during the committee process, the committee unanimously supported my
amendment, H.R. 2962, the SMART Grid Study Act.
The study will be conducted by the National Research Council in full
cooperation with the Department of Homeland Security and other
government agencies as necessary, and will provide a comprehensive
assessment of actions necessary to expand and strengthen the
capabilities of the electric grid to prepare for, respond to, mitigate,
and recover from a natural disaster or a cyber attack. Further, it was
supported by the National Electrical Manufacturers Association, the
Demand Response and Smart Grid Coalition, and the American Public Power
Association.
The SPEAKER pro tempore. The time of the gentleman has expired.
Ms. CLARKE of New York. I yield the gentleman an additional 1 minute.
Mr. PAYNE. Mr. Speaker, in closing, I want to thank Chairman McCaul
and Ranking Member Thompson, Chairman Meehan, and Ranking Member Clarke
for really showing us what a bipartisan effort is all about. At
Homeland Security, we all have a common goal, which is to keep the
homeland and the Nation safe. I urge my colleagues to support this
bill.
Ms. CLARKE of New York. Mr. Speaker, I yield 2 minutes to the
distinguished gentleman from Rhode Island (Mr. Langevin), the cochair
of the House Cybersecurity Caucus.
(Mr. LANGEVIN asked and was given permission to revise and extend his
remarks.)
Mr. LANGEVIN. I thank the gentlewoman for yielding.
Mr. Speaker, I rise in strong support of H.R. 3696, H.R. 2952, and
H.R. 3107.
I want to thank Ranking Member Thompson, Chairman Meehan, and Ranking
Member Clarke for their hard work in bringing these bills to the floor
today.
Most especially and in particular, I want to thank Chairman McCaul,
the chairman of the full Homeland Security Committee, who also serves
with me as a founder and a cochair of the Congressional Cybersecurity
Caucus. I want to thank him for his dedication to bringing these bills
to the floor today and for his commitment to enacting strong
cybersecurity legislation. In today's political climate, moving
significant reform in a consensus manner is exceptionally difficult,
and this success reflects Chairman McCaul's bipartisan approach.
Mr. Speaker, we all know that we depend on cyberspace and the
Internet every day. It is vitally important to the American people. It
is an inseparable part of our everyday lives. It is in everything that
we do--vital to everything from banking to national security--but it is
also highly contested. Unfortunately, the pace of the threats is ever-
increasing. We see them every day, whether it is the theft of personal
information or of credit card information that is used for criminal
intent or
[[Page H6920]]
whether it is the theft of intellectual property that costs America its
competitiveness and jobs. We also know of the threats to our critical
infrastructure in particular, both to our electric grid and to our
financial system--things that I have been calling attention to for
years now.
We must tap into our creative and innovative spirit to address
today's challenges and position ourselves to be agile in the face of
both today's threats as well as tomorrow's. I believe that the three
bills that are before us today, in conjunction with the information
sharing and other measures passed by this House earlier in this
Congress, will help to enable a better future for our Nation's
cyberspace capabilities.
I know, Mr. Speaker, that we will never be 100 percent secure in
cyberspace. It is an ever-evolving and moving threat, and we will never
be 100 percent secure. Yet I do know this: that we can close that
aperture of vulnerability down to something that is much more
manageable, and I urge my colleagues to support the bills that are
before us today.
I thank the gentleman from Texas for his leadership, and I strongly
urge the support of these three bills.
Ms. CLARKE of New York. Mr. Speaker, I have no more speakers. If the
gentleman from Texas has no more speakers, then, in closing, I urge the
passage of H.R. 3696. It is legislation that will enhance DHS' ability
to execute its cybersecurity mission. I am particularly pleased that it
includes language that I authored to help ensure that DHS has the cyber
workforce it needs to execute that mission.
I would like to thank Chairman McCaul and Ranking Member Thompson, as
well as the subcommittee chair, Mr. Meehan, for their leadership and
their vision, and for their understanding that this is something that
keeps us up at night, that this is something that this body must move
forward to address--that this is a 21st century threat for which we
cannot sit idly by and do nothing about. Their leadership on H.R. 3696
and on the suite of cyber legislation on the floor today speaks volumes
to moving us in the right direction.
With that, Mr. Speaker, I urge the passage of H.R. 3696, and I yield
back the balance of my time.
Mr. McCAUL. Mr. Speaker, in closing, let me echo the sentiments of
the gentlewoman from New York.
I want to thank you and Mr. Meehan for your work on this bill. You
are truly the workhorses--the engines--behind this bill, and I want to
thank you for helping us get to this point where we are today.
Congressman Langevin, we were talking about cybersecurity before it
was cool to talk about cybersecurity.
Forming the Cybersecurity Caucus, I think, raises awareness of
Members of Congress about how important this issue really is, because,
I think, when you talk about this issue, Mr. Speaker, people's eyes
tend to glaze over. They don't understand how important this is in
protecting the American people.
This is a national security bill. I don't believe partisan politics
has a place in that. I was at The Aspen Institute with Jane Harman, who
served on our committee and on the Intelligence Committee for many
years, who also believes that our adversaries don't care whether we are
Democrat or Republican. They care about the fact that we are Americans,
and they want to hit us. We have adversaries who want to hit us--China,
Russia, Iran, and countless others--in the cybersecurity space.
This is a pro-security and pro-privacy bill. I had a reporter ask me,
How could you possibly get the ACLU to agree on any security bill? It
protects Americans' privacy but also their security through the private
civilian interface to the private sector, and that is how we do it. It
is not through the military. The NSA has a foreign intelligence role,
and the DHS has a domestic critical infrastructure role. Of course,
Director Alexander called cybersecurity and what has happened in recent
years the largest transfer of wealth in history.
{time} 1715
So when the American people say: Why is this so important; the
largest transfer of wealth in American history? Why is this so
important? Because cyber can bring down things, can shut down things in
a 9/11 style.
We have a historical moment in this Congress to pass the first
cybersecurity bill through the House and Senate and be signed into law
in the history of the Congress. As this bill passes--I hope, in a few
minutes--and we send it over to the Senate, I hope our colleagues on
the Senate side will respond to this.
They have made great progress on the Senate side in getting work done
on cybersecurity. We have a unique opportunity and a great moment here
to pass this bill out of the House, get it married with the Senate bill
in a bipartisan way to protect the American people, and get it signed
into law by the President, something that we very rarely have seen in
this Congress. So I think it is a very historic moment.
To close, Mr. Speaker, when 9/11 happened, a lot of people did a lot
of finger pointing around here and pointed to Members of Congress and
to the executive branch and said: What did you do to stop this? What
did you do to stop this?
We had a 9/11 Commission that pointed out all the vulnerabilities and
the things that we didn't do as Members of Congress. I don't want that
to happen again today. I want to be able to say, Mr. Speaker, if, God
forbid, we get hit, and we get hit hard in a cyber attack against the
United States of America, that we as Members of Congress and members of
this committee did everything within our power to stop it.
Mr. Speaker, I am proud of the great work we have done together. I
look forward to the passage of this bill.
I yield back the balance of my time.
House of Representatives, Committee on Science, Space,
and Technology,
Washington, DC, February 24, 2014.
Hon. Michael McCaul,
Chairman, Committee on Homeland Security,
Washington, DC.
Dear Chairman McCaul: I am writing to you concerning the
jurisdictional interest of the Committee on Science, Space,
and Technology in H.R. 3696, the ``National Cybersecurity and
Critical Infrastructure Protection Act of 2013.'' The bill
contains provisions that fall within the jurisdiction of the
Committee on Science, Space, and Technology.
I recognize and appreciate the desire to bring this
legislation before the House of Representatives in an
expeditious manner, and accordingly, I will waive further
consideration of this bill in Committee, notwithstanding any
provisions that fall within the jurisdiction of the Committee
on Science, Space, and Technology. This waiver, of course, is
conditional on our mutual understanding that agreeing to
waive consideration of this bill should not be construed as
waiving, reducing, or affecting the jurisdiction of the
Committee on Science, Space, and Technology.
This waiver is also given with the understanding that the
Committee on Science, Space, and Technology expressly
reserves its authority to seek conferees on any provision
within its jurisdiction during any House-Senate conference
that may be convened on this, or any similar legislation. I
ask for your commitment to support any request by the
Committee for conferees on H.R. 3696 as well as any similar
or related legislation.
I ask that a copy of this letter and your response be
included in the report on H.R. 3696 and also be placed in the
Congressional Record during consideration of this bill on the
House floor.
Sincerely,
Lamar Smith,
Chairman, Committee on Science, Space, and Technology.
____
House of Representatives,
Committee on Homeland Security
Washington, DC, February 24, 2014.
Hon. Lamar Smith,
Chairman, Committee on Science, Space, and Technology,
Washington, DC.
Dear Chairman Smith: Thank you for your letter regarding
H.R. 3696, the ``National Cybersecurity and Critical
Infrastructure Protection Act of 2014.'' I acknowledge your
Committee's jurisdictional interest in this legislation and
agree that by forgoing a sequential referral on this
legislation, your Committee is not diminishing or altering
its jurisdiction.
I also concur with you that forgoing action on H.R. 3696
does not in any way prejudice the Committee on Science,
Space, and Technology with respect to its jurisdictional
prerogatives on this bill or similar legislation in the
future. I would support your effort to seek appointment of an
appropriate number of conferees to any House-Senate
conference involving H.R. 3696 or similar legislation.
Finally, I will include your letter and this response in
the report accompanying H.R. 3696 as well as the
Congressional Record during consideration of this bill on the
House floor. I appreciate your cooperation regarding this
legislation, and I look forward to working with the Committee
on Science, Space, and Technology as H.R. 3696 moves through
the legislative process.
Sincerely,
Michael T. McCaul,
Chairman.
[[Page H6921]]
____
House of Representatives, Committee on Oversight and
Government Reform,
Washington, DC, July 23, 2014.
Hon. Michael McCaul,
Chairman, Committee on Homeland Security,
Washington, DC.
Dear Mr. Chairman: I am writing concerning H.R. 3696, the
``National Cybersecurity and Critical Infrastructure
Protection Act of 2013,'' which your Committee reported on
February 5, 2014.
H.R. 3696 contains provisions within the Committee on
Oversight and Government Reform's Rule X jurisdiction. As a
result of your having consulted with the Committee, and in
order to expedite this bill for floor consideration, the
Committee on Oversight and Government Reform will forego
action on the bill, contingent on the removal of subsection
(h) ``Protection of Federal Civilian Information Systems,''
(beginning at line 17 of page 23 of the reported version).
This is being done on the basis of our mutual understanding
that doing so will in no way diminish or alter the
jurisdiction of the Committee on Oversight and Government
Reform with respect to the appointment of conferees, or to
any future jurisdictional claim over the subject matters
contained in the bill or similar legislation.
I would appreciate your response to this letter confirming
this understanding, and would request that you include a copy
of this letter and your response in the Committee Report and
in the Congressional Record during the floor consideration of
this bill. Thank you in advance for your cooperation.
Sincerely,
Darrell Issa,
Chairman.
____
House of Representatives,
Committee on Homeland Security,
Washington, DC, July 23, 2014.
Hon. Darrell E. Issa,
Chairman, Committee on Oversight and Government Reform,
Washington, DC.
Dear Chairman Issa: Thank you for your letter regarding the
Committee on the Oversight and Government Reform's
jurisdictional interest in H.R. 3696, the ``National
Cybersecurity and Critical Infrastructure Protection Act of
2013.'' I acknowledge that by foregoing further action on
this legislation, your Committee is not diminishing or
altering its jurisdiction.
I also concur with you that forgoing action on this bill
does not in any way prejudice the Committee on Oversight and
Government Reform with respect to its jurisdictional
prerogatives on this bill or similar legislation in the
future. Moving forward, subsection (h), referred to in your
letter, will be removed from H.R. 3696 prior to consideration
on the House floor. As you have requested, I would support
your effort to seek an appointment of an appropriate number
of conferees to any House-Senate conference involving this or
similar legislation.
Finally, I will include your letter and this response in
the report accompanying H.R. 3696 and in the Congressional
Record during consideration of this bill on the House floor.
I appreciate your cooperation regarding this legislation, and
I look forward to working with the Committee on Oversight and
Government Reform as H.R. 3696 moves through the legislative
process.
Sincerely,
Michael T. McCaul,
Chairman.
____
House of Representatives,
Committee on Energy and Commerce,
Washington, DC, July 22, 2014.
Hon. Michael T. McCaul,
Chairman, Committee on Homeland Security,
Washington, DC.
Dear Chairman McCaul: I write concerning H.R. 3696, the
``National Cybersecurity and Critical Infrastructure
Protection Act of 2014.'' As you are aware, the bill was
referred primarily to the Committee on Homeland Security, but
the Committee on Energy and Commerce has a jurisdictional
interest in the bill and has requested a sequential referral.
However, given your desire to bring this legislation before
the House in an expeditious manner, I will not insist on a
sequential referral of H.R. 3696. I do so with the
understanding that, by foregoing such a referral, the
Committee on Energy and Commerce does not waive any
jurisdictional claim on this or similar matters, and the
Committee reserves the right to seek the appointment of
conferees.
I would appreciate your response to this letter confirming
this understanding, and ask that a copy of our exchange of
letters on this matter be included in the Congressional
Record during consideration of H.R. 3696 on the House floor.
Sincerely,
Fred Upton,
Chairman.
____
House of Representatives,
Committee on Homeland Security,
Washington, DC, July 23, 2014.
Hon. Fred Upton,
Chairman, Committee on Energy and Commerce,
Washington, DC.
Dear Chairman Upton: Thank you for your letter regarding
the Committee on Energy and Commerce's jurisdictional
interest in H.R. 3696, the ``National Cybersecurity and
Critical Infrastructure Protection Act of 2014.'' I
acknowledge that by foregoing a sequential referral on this
legislation, your Committee is not diminishing or altering
its jurisdiction.
I also concur with you that forgoing action on this bill
does not in any way prejudice the Committee on Energy and
Commerce with respect to its jurisdictional prerogatives on
this bill or similar legislation in the future, and I would
support your effort to seek an appointment of an appropriate
number of conferees to any House-Senate conference involving
this or similar legislation.
Finally, I will include your letter and this response in
the Congressional Record during consideration of this bill on
the House floor. I appreciate your cooperation regarding this
legislation, and I look forward to working with the Committee
on Energy and Commerce as H.R. 3696 moves through the
legislative process.
Sincerely,
Michael T. McCaul,
Chairman.
Ms. JACKSON LEE. Mr. Speaker, I rise in support of H.R. 3696, the
National Cybersecurity and Critical Infrastructure Protection Act of
2014.
I would like to thank Chairman McCaul and Ranking Member Thompson for
their leadership on the protection of our nation's critical
infrastructure.
Several Jackson Lee amendments were included in the H.R. 3696, the
``National Cybersecurity and Critical Infrastructure Protection Act of
2014.''
I submit to the committee for its consideration the following five
amendments that would:
Identify the best methods for developing exercise to challenge the
security measures taken to protect critical infrastructure from cyber
attacks or incidents;
Assure efforts to conduct outreach to education institutions to
promote cybersecurity awareness;
Provide better coordination for cyber incident emergency response and
recovery;
Explore the benefits of establishing a visiting scholars program; and
Prioritized response efforts to aid in recovery of critical
infrastructure from cyber incidents.
The Jackson Lee amendments improved H.R. 3696:
The first Jackson Lee amendment supports discussions among
stakeholders on the best methods of developing innovative cybersecurity
exercises for coordinating between the Department and each of the
critical infrastructure sectors designated under section 227.
The second Jackson Lee amendment directs the Secretary to conduct
outreach to universities, which shall include historically black
colleges and universities, Hispanic serving institutions, Native
American colleges and institutions serving persons with disabilities to
promote cybersecurity awareness.
The third Jackson Lee amendment directs the Secretary of Homeland
Security to make available Department contact information to serve as a
resource for Sector Coordinating Councils and critical infrastructure
owners and critical infrastructure operators to better coordinate
cybersecurity efforts with the agency related to emergency response and
recovery efforts for cyber incidents.
The fourth Jackson Lee amendment directs the Department of Homeland
Security to determine the feasibility and potential benefit of
developing a visiting security researchers program from academia,
including cybersecurity scholars at the Department of Homeland
Security's Centers of Excellence.
The fifth Jackson Lee amendment directs the Secretary of Homeland
Security to collaborate with Sector Coordinating Councils, Information
Sharing and Analysis Centers, Sector Specific Agencies, and relevant
critical infrastructure sectors on the development of prioritized
response efforts, if necessary, to support the defense and recovery of
critical infrastructure from cyber incidents.
Global dependence on the Internet and particularly the interconnected
nature of the cyber-space makes cyber security a very difficult public
policy challenge, but H.R. 3696 is making a significant step forward in
addressing cyber security threats.
Cyber thieves work around the clock to probe and breach computer
systems resulting in the largest unlawful transfer of wealth in
history.
H.R. 3696 emphases on public/private partnerships and information
sharing is a critically important first step in combating illegal,
damaging and expensive data breaches. This legislation already
addresses many useful and essential cybersecurity tools and initiatives
such as: enhanced education, increased research, information sharing,
data breach security and technical assistance strategies.
H.R. 3639 will allow the Department of Homeland Security to partner
with and support the efforts of critical infrastructure owners and
operators to secure their facilities and guide the agency in its work
to create resources to support the global mission of infrastructure
protection, which is vital to the nation.
[[Page H6922]]
I encourage my colleagues to vote in favor of H.R. 3696.
Mr. THOMPSON of Mississippi. Mr. Speaker, I am pleased to be here
today as an original cosponsor of this legislation, the National Cyber
Security and Critical Infrastructure Protection Act.
This bipartisan legislation gives the Department of Homeland Security
Congressional Authority to more fully carry out its civilian cyber
mission, and to increase protection for our national critical
infrastructure.
Importantly, this legislation also gives the Committee on Homeland
Security a robust oversight position to make sure the Department
carries out an innovative and cooperative relationship with industry,
to protect the nation's privately owned critical infrastructure.
By giving DHS specific civilian authorities, it codifies what the
President has already set into motion with his Cyber Executive Order
13636, issued in February of 2013, but Executive Authority goes only so
far, and the President has said that his efforts cannot take the place
Congressional action.
Mr. Speaker, we have stepped up to the plate. The legislation that
Mr. McCaul and I worked on together, directs Federal agencies and
private industry to coordinate the development and implementation of
voluntary risk-based security standards, and codifies the ongoing
process that the National Institute of Standards and Technology (NIST)
and private industry have taken on.
We are asking that business and government find an adaptable and
cooperative cyber security framework, for both government and private
companies, not an off-the-shelf, or check-the-box solution.
We must depend on strong private sector leadership and accountability
to focus on our nation's most pressing cyber vulnerabilities,
protecting critical systems that when disrupted could cause
catastrophic damage to our citizens. I believe this legislation will
allow that process to move forward.
The President said it best, ``It is the policy of the United States
to enhance the security and resilience of the Nation's critical
infrastructure and to maintain a cyber environment that encourages
efficiency, innovation, and economic prosperity while promoting safety,
security, business confidentiality, privacy and civil liberties.''
Critical infrastructure provides the essential services that underpin
American society, and I suggest that the owners and operators of
America's critical infrastructure are in a unique position to manage
their own business risks with the help of civilian government agencies,
to develop operational approaches that can make our critical
infrastructure protected and durable.
Mr. Speaker, I have worked long and hard with the chairman to hammer
out privacy and liability concerns held by myself, and many others, on
both sides of the aisle.
There are no broad exceptions to the current privacy laws in this
legislation, and it focuses on information sharing using existing
structures. In fact, the ACLU commended the construction of this
legislation by saying, ``. . . it is both pro-security and pro-privacy
. . .''
We still have much work to do to achieve a higher level of cyber
security in this country, and internationally.
We must approach the cyber threat arena in a way that is consistent
with traditional American values, and by leading on the issue of
respecting personal privacy in the efforts to achieve cyber security,
we must continue to respect the safeguards for our constitutional right
of freedom of speech.
The wrong way is to assume that we must cede all of our personal
privacy and freedoms to remain safe.
The SPEAKER pro tempore. The question is on the motion offered by the
gentleman from Texas (Mr. McCaul) that the House suspend the rules and
pass the bill, H.R. 3696, as amended.
The question was taken; and (two-thirds being in the affirmative) the
rules were suspended and the bill, as amended, was passed.
A motion to reconsider was laid on the table.
____________________