[Congressional Record Volume 161, Number 125 (Tuesday, August 4, 2015)]
[Senate]
[Page S6247]
CYBER SECURITY
Mr. McCONNELL. Mr. President, I recently shared an AP news story with
my colleagues, and I think it is worth sharing again.
Here is the headline: ``Federal Agencies Are Wide Open to Hackers,
Cyberspies.''
I will read just a little bit of what it says.
The federal government, which holds secrets and sensitive
information ranging from nuclear blueprints to the tax
returns of hundreds of millions of Americans, has for years
failed to take basic steps to protect data from hackers and
thieves, records show. In the latest example, the Office of
Personnel Management is under fire for allowing its databases
to be plundered by suspected Chinese cyberspies in what is
being called one of the worst breaches in U.S. history. OPM
repeatedly neglected to implement basic cybersecurity
protections, its internal watchdog told Congress.
That story should worry every one of us, Democrats and Republicans
alike. The AP referred to the massive cyber attack that recently struck
the Obama administration as ``one of the worst breaches in U.S.
history.'' But while this massive breach may have been ``one of the
worst,'' it certainly--unless the administration can be rescued from
the cyber security Dark Ages--will not be the last.
So the Senate will be considering bipartisan cyber security
legislation this week that would help the public and private sectors
defeat cyber attacks. The modern tools it contains, through the sharing
of threat information, would provide for the construction of stronger
defenses. The top Democrat on the Intelligence Committee says this
bipartisan bill would also protect ``individual privacy and civil
liberties.'' She is right. It contains strong measures to limit the
use, retention, and diffusion of consumers' personal information.
Information sharing with the government would also be voluntary under
this bipartisan legislation.
No wonder my colleague from California joined virtually every other
Democrat and every other Republican to endorse this bipartisan bill
overwhelmingly in committee 14 to 1. No wonder this bipartisan bill is
backed by a diverse coalition of supporters, too--everyone from the
U.S. Chamber of Commerce to farm supply stores, to your local community
bank.
This is a strong bipartisan, transparent bill that has been
meticulously vetted by both parties in committee and that has been
available online for literally months for anyone to read. My friend the
Democratic leader has also publicly declared that the Senate could
finish this bill in ``a couple of days.''
``In a couple of days,'' he said, ``at the most.''
So with cooperation, we can pass the bipartisan bill this week. There
will also be an opportunity for Members of both parties to offer
amendments. I urge colleagues who wish to do so to begin working with
the bill managers right now.
This legislation is the work of many Members. I mentioned Ranking
Member Feinstein earlier, who has been a key player on this issue. I
also wish to thank Chairman Burr for his strong leadership and his hard
work across the aisle in developing this bipartisan bill. I urge the
Senate to allow us to act and pass it this week.
The House of Representatives has already passed two similar White
House-backed cyber security bills. The sooner we pass ours, the sooner
we conference with the House to finally get a good cyber security law
on the books, and the sooner our country can be better protected from
more of these types of attacks.
____________________
[Congressional Record Volume 161, Number 125 (Tuesday, August 4, 2015)]
[Senate]
[Pages S6256-S6263]
From the Congressional Record Online through the Government Publishing Office [www.gpo.gov]
CYBERSECURITY INFORMATION SHARING ACT OF 2015--MOTION TO PROCEED
The PRESIDING OFFICER. Under the previous order, the Senate will
resume consideration of the motion to proceed to S. 754, which the
clerk will report.
The legislative clerk read as follows:
Motion to proceed to Calendar No. 28, S. 754, a bill to
improve cybersecurity in the United States through enhanced
sharing of information about cybersecurity threats, and for
other purposes.
[...]
The PRESIDING OFFICER (Mr. Lee). The Senator from California.
Mrs. FEINSTEIN. Mr. President, I would like to speak in support of
the Cybersecurity Information Sharing Act. I had hoped Senator Burr,
the chairman of the committee, would be able to deliver the remarks
initially. However, he has been unfortunately delayed, and so I will go
ahead with my remarks as vice chairman of the committee.
There is no legislative or administrative step we can take that will
end all cyber crime and cyber warfare, but as members of the Senate
Intelligence Committee, we have heard over the course of several years
now that improving the exchange of information and the sharing of that
information, company to company and company to the government, can be
very helpful and yield a real and significant improvement to cyber
security.
Regrettably, this is the third attempt to pass a cyber security
information sharing bill. In the almost 5 years that I have been
working on this issue, two things have become abundantly clear about
passing the bill. First, it must be bipartisan. In 2012, I cosponsored
the Lieberman-Collins Cybersecurity Act, which included a title on
[[Page S6258]]
information sharing based on a bill I had introduced. It was an
important piece of legislation, but it received almost no Republican
support and could not gain the 60 votes needed to invoke cloture. It
became clear to me then that no cyber security legislation could pass
without broad bipartisan support.
The second lesson that has been learned is, it must be narrowly
focused. The Lieberman-Collins bill sought to address many critical
challenges to our Nation's cyber security. Then-Majority Leader Harry
Reid, brought the chairmen of all committees of jurisdiction on our
side together and asked them to draft legislation on cyber security in
their areas. It soon became clear that addressing so many complex
issues makes a bill very difficult to pass. That bill died on the
Senate floor in late 2012.
Based on these lessons, we have tried to take a bipartisan and
focused approach so Congress can pass a cyber security information
sharing bill. In the last Congress, in 2013 and 2014, then-vice
chairman of the Intelligence Committee Saxby Chambliss and I sought to
draft legislation on information sharing that would attract bipartisan
support. We worked through a number of difficult issues together, and
we were able to produce a bill that I believed would pass the Senate.
The Intelligence Committee approved the bill in 2014 by a strong
bipartisan vote of 12 to 3, but it never reached the Senate floor due
to privacy concerns about the legislation.
This year, Chairman Burr and I have drafted legislation that both
sides can and should support. This bill is bipartisan, it is narrowly
focused, and it puts in place a number of privacy protections, many of
which I will outline shortly. The bill's bipartisan vote of 14 to 1 in
the Senate Intelligence Committee in March underscores this fact.
I would like to thank Senator Burr for his leadership and his
willingness to negotiate a bipartisan bill that can and should receive
a strong vote. As he often says, neither one of us would have written
this bill this way if we were doing it ourselves. This Senator believes
it is also true that by negotiating this draft, we will get
substantially more votes than either of us can get on our own. I very
much hope that is true.
I note that this bill has strong support from the private sector
because it creates incentives for improving cyber security and protects
companies that take responsible steps to do so. Companies are shielded
from lawsuits if they properly use the authorities provided for in this
bill. They can be confident that sharing information with other
companies or with the government will not subject them to inappropriate
regulatory action.
For these reasons, this bill has the support of over 40 business
groups, and it is the first bill that has the support of the U.S.
Chamber of Commerce. It also has the support of the most important
cyber security and critical infrastructure companies in the Nation.
Mr. President, I would like to ask unanimous consent to have those
letters printed into the Record.
There being no objection, the material was ordered to be printed in
the Record, as follows:
August 3, 2015.
Hon. Mitch McConnell,
U.S. Senate,
Washington, DC.
Hon. Harry Reid,
U.S. Senate,
Washington, DC.
Dear Majority Leader McConnell and Minority Leader Reid: On
behalf of our diverse members, we write today in strong
support of the Cybersecurity Information Sharing Act (S.
754), a bipartisan bill approved earlier this year on a near-
unanimous basis by the Select Committee on Intelligence. We
strongly urge you to bring up S. 754 as expeditiously as
possible, defeat any amendments that would undermine this
important legislation, and support the underlying bill.
The threat of cyber-attacks is a real and omnipresent
danger to our sector, our members' customers and clients, and
to critical infrastructure providers upon which we--and the
nation as a whole--rely. S. 754 would enhance our ability to
defend the financial services sector and the sensitive data
of hundreds of millions of Americans. It is critical that
Congress get cybersecurity information sharing legislation to
the President's desk before the next crisis, not after.
Our members and the broader financial services industry are
dedicated to improving our capacity to protect customers and
their sensitive information but as it stands today, our laws
do not do enough to foster information sharing and establish
clear lines of communication with the various government
agencies responsible for cybersecurity. If adopted and signed
into law, this legislation will strengthen the nation's
ability to defend against cyber-attacks and better protect
all Americans by encouraging the business community and the
government to quickly and effectively share critical
information about these threats while ensuring privacy. More
effective information sharing provides some of the strongest
protections of privacy, as it is sensitive information from
our member firms' customers that we are asking Congress to
protect from those who attempt to steal or destroy that
information.
Each of our organizations and our respective member firms
has made cybersecurity a top priority and we are committed to
continuing to work with you and your colleagues in the Senate
so that effective cyber threat information sharing
legislation can be enacted into law.
Sincerely,
American Bankers Association; American Insurance
Association; The Clearing House; Financial Services
Institute; Financial Services Roundtable; Investment
Company Institute; NACHA--The Electronic Payments
Association; The National Association of Mutual
Insurance Companies; Property Casualty Insurers
Association of America; Securities Industry and
Financial Markets Association.
____
August 3, 2015.
Hon. Mitch McConnell,
Majority Leader, U.S. Senate,
Washington, DC.
Hon. Harry Reid,
Minority Leader, U.S. Senate,
Washington, DC.
Dear Majority Leader McConnell and Minority Leader Reid:
The undersigned organizations reiterate their support for
cybersecurity information sharing and liability protection
legislation and urge the Senate to promptly take up and pass
S. 754, the Cybersecurity Information Sharing Act (CISA) of
2015. Enactment of such legislation is urgently needed to
further enhance and encourage communication among the federal
government, the North American electric power sector, and
other critical infrastructure sectors, thus improving our
ability to defend against cyber attacks.
While the electric sector already engages in significant
information sharing activities and has in place mandatory and
enforceable reliability and cybersecurity standards, there
remains an urgent need for the government and industry to
better share actionable security information in a timely and
confidential manner, including protections against public
disclosure of sensitive security information. CISA provides a
framework to help foster even more meaningful information
sharing while maintaining a critical balance between
liability and privacy protections.
The electric power sector takes very seriously its
responsibility to maintain the reliability, safety, and
security of the electric grid. Beyond mandatory standards,
the industry maintains an all-hazards ``defense in depth''
mitigation strategy that combines preparation, prevention,
resiliency, and response and recovery efforts. We also work
closely with the federal government and other critical
infrastructure sectors on which the electric sector depends
through the Electricity Subsector Coordinating Council, and
share electric sector threat information through the
Electricity Sector Information Sharing and Analysis Center.
Passage of CISA will enhance these activities.
American Public Power Association (APPA); Canadian
Electric Association (CEA); Edison Electric Institute
(EEI); Electric Power Supply Association (EPSA);
GridWise Alliance; Large Public Power Council (LPPC);
National Rural Electric Cooperative Association
(NRECA); National Association of Regulatory Utility
Commissioners (NARUC); Transmission Access Policy Study
Group (TAPS).
____
American Bankers Association,
Washington, DC, August 3, 2015.
Hon. Mitch McConnell,
Majority Leader, U.S. Senate,
Washington, DC.
Hon. Richard Burr,
U.S. Senate, Washington, DC.
Hon. Harry Reid,
Minority Leader, U.S. Senate,
Washington, DC.
Hon. Dianne Feinstein,
U.S. Senate, Washington, DC.
Dear Senators: I am writing on behalf of the members of the
American Bankers Association (ABA) to urge you to support the
Cybersecurity Information Sharing Act (CISA, S. 754) when it
is brought to the Senate floor, and to defeat any amendments
that would undermine this critically needed legislation.
CISA is bipartisan legislation introduced by Chairman
Richard Burr and Vice Chairman Dianne Feinstein, and reported
by a strong bipartisan 14-1 vote in the Senate Intelligence
Committee. It will enhance ongoing efforts by the private
sector and the Federal government to better protect our
critical infrastructure and protect Americans from all walks
of life from cyber criminals. Importantly, CISA facilitates
increased cyber intelligence information sharing between the
private and public sectors, and strikes the appropriate
balance between protecting consumer privacy and allowing
information sharing on serious threats to our nation's
critical infrastructure.
[[Page S6259]]
Cybersecurity is a top priority for the financial services
industry. Banks invest hundreds of millions of dollars every
year to put in place multiple layers of security to protect
sensitive data. Protecting customers has always been and will
remain our top priority and CISA will help us work more
effectively with the Federal government and other sectors of
the economy to better protect them from cyber attacks.
We urge you to support this important legislation and pass
it as soon as possible to better protect America's
cybersecurity infrastructure against current and future
threats.
Sincerely,
James C. Ballentine.
____
Information Technology
Industry Council,
Washington, DC, July 23, 2015.
Hon. Mitch McConnell,
Majority Leader, U.S. Senate,
Washington, DC.
Hon. Harry Reid,
Democratic Leader, U.S. Senate,
Washington, DC.
Dear Majority Leader McConnell and Democratic Leader Reid:
On behalf of the members of the Information Technology
Industry Council (ITI), I write to express our support for S.
754, the Cybersecurity Information Sharing Act of 2015
(CISA), and urge you to bring it to the Senate floor for
debate and vote. Given the importance of cybersecurity threat
information sharing to the high-tech industry, we will
consider scoring votes in support of CISA in our 114th
Congressional Voting Guide.
ITI members contribute to making the U.S. information and
communication technology (ICT) industry the strongest in the
world in innovative cybersecurity practices and solutions. We
firmly believe that passing legislation to help increase
voluntary cybersecurity threat information sharing between
the private sector and the federal government, and within the
private sector, is an important step Congress can take to
enable all stakeholders to address threats, stem losses, and
shield their systems, partners and customers. It is important
that the Senate act now to pass CISA and continue to move the
legislative process forward, so that Congress can reconcile
CISA with the House cybersecurity legislation, H.R. 1560, the
Protecting Cyber Networks Act, and H.R. 1731, the National
Cybersecurity Protection Advancement Act of 2015, and send a
bill to the president.
ITI believes that legislation to promote greater
cybersecurity threat information sharing should:
Affirm that cybersecurity threat information sharing be
voluntary;
Promote multidirectional cybersecurity threat information
sharing, allowing private-to-private, private-to-government
and government-to-private sharing relationships;
Include targeted liability protections;
Utilize a civilian agency interface for private-to-
government information sharing to which new liability
protections attach;
Promote technology-neutral mechanisms that enable
cybersecurity threat information to be shared in as close to
real-time as possible;
Require all entities to take reasonable steps to remove
personally identifiable information from information shared
through data minimization; and
Ensure private sector use of information received through
private-to-private sharing is only for cybersecurity
purposes, and government use of information received from the
private sector is limited to cybersecurity purposes and used
by law enforcement only:
For the investigation and prosecution of cyber crimes;
For the protection of individuals from the danger of death
or serious bodily harm and the investigation and prosecution
of crimes involving such danger; and
For the protection of minors from child pornography.
We appreciate the progress made by the Senate Intelligence
Committee to include provisions that would protect personally
identifiable information while also allowing for a
cybersecurity threat information sharing framework that will
enhance our ability to protect and defend our networks.
We look forward to working closely with you, your committee
leadership, and the House of Representatives to further
address outstanding issues in conference to ensure it adheres
to our above cybersecurity threat information sharing
principles. ITI remains committed to refining the legislation
and supporting a final product that can best achieve our goal
of promoting greater cybersecurity.
Sincerely,
Dean C. Garfield,
President & CEO.
____
BSA/The Software Alliance,
Washington, DC, July 21, 2015.
Hon. Mitch McConnell,
Senate Majority Leader,
Washington, DC.
Hon. Harry Reid,
Senate Minority Leader,
Washington, DC.
Dear Majority Leader McConnell and Minority Leader Reid: On
behalf of BSA/The Software Alliance, I write in support of
bringing the Cybersecurity Information Sharing Act of 2015
(S. 754) to the Senate floor for a robust debate. Enactment
of bipartisan legislation that enhances voluntary cyber
threat information sharing while ensuring privacy protection
will be an important step in bolstering our nation's
cybersecurity capabilities.
Our members are on the front lines defending against cyber
attacks. Every day, bad actors are attacking networks to
extract valuable private and commercial information. We
believe it is now more important than ever to enact
legislation to break down the legal barriers that currently
discourage cyber threat information sharing between and among
the public and private sectors. Increased awareness will
enhance the ability of businesses, consumers, and critical
infrastructure to better defend themselves against attacks
and intrusions. We are confident that all of these goals can
be accomplished without comprising the privacy of an
individual's information.
I appreciate your leadership on moving this important
legislation forward to a successful outcome in the Senate. We
support this bipartisan effort and look forward to working
with you in the process to ultimately move a cyber threat
information sharing bill to the President's desk for
signature.
Sincerely,
Victoria A. Espinel,
President and CEO.
____
Protecting America's
Cyber Networks Coalition,
July 21, 2015.
To the Members of the United States Senate: The Protecting
America's Cyber Networks Coalition (the coalition) urges the
Senate to take up and pass S. 754, the Cybersecurity
Information Sharing Act (CISA) of 2015. Passing cybersecurity
information-sharing legislation is a top policy priority of
the coalition, which is a partnership of leading business
associations representing nearly every sector of the U.S.
economy.
In March, the Select Committee on Intelligence passed CISA
by a strong bipartisan vote (14-1). The Senate can build on
the momentum generated in the House to move CISA forward. In
April, the House passed two cybersecurity information-sharing
bills--H.R. 1560, the Protecting Cyber Networks Act (PCNA),
and H.R. 1731, the National Cybersecurity Protection
Advancement Act (NCPAA) of 2015--with robust majorities from
both parties and broad industry support.
Our organizations believe that Congress needs to send a
bill to the president that gives businesses legal certainty
that they have safe harbor against frivolous lawsuits when
voluntarily sharing and receiving threat indicators and
defensive measures in real time and taking actions to
mitigate cyberattacks.
The legislation also needs to offer protections related to
public disclosure, regulatory, and antitrust matters in order
to increase the timely exchange of information among public
and private entities. Coalition members also believe that
legislation needs to safeguard privacy and civil liberties
and establish appropriate roles for government agencies and
departments. CISA reflects sound compromises among many
stakeholders on these issues.
Recent cyber incidents underscore the need for legislation
to help businesses improve their awareness of cyber threats
and to enhance their protection and response capabilities in
collaboration with government entities. Cyberattacks aimed at
U.S. businesses and government bodies are increasingly being
launched from sophisticated hackers, organized crime, and
state-sponsored groups. These attacks are advancing in scope
and complexity.
The coalition is committed to working with lawmakers and
their staff members to get cybersecurity information-sharing
legislation quickly enacted to strengthen our national
security and the protection and resilience of U.S. industry.
Congressional action cannot come soon enough.
Sincerely,
Agricultural Retailers Association (ARA); Airlines for
America (A4A); Alliance of Automobile Manufacturers;
American Bankers Association (ABA); American Cable
Association (ACA); American Council of Life Insurers
(ACLI); American Fuel & Petrochemical Manufacturers
(AFPM); American Gaming Association; American Gas
Association (AGA); American Insurance Association
(AIA); American Petroleum Institute (API); American
Public Power Association (APPA); American Water Works
Association (AWWA); ASIS International; Association of
American Railroads (AAR); BITS--Financial Services
Roundtable; College of Healthcare Information
Management Executives (CHIME); CompTIA--The Computing
Technology Industry Association; CTIA--The Wireless
Association; Edison Electric Institute (EEI);
Federation of American Hospitals (FAH); Food Marketing
Institute (FMI).
GridWise Alliance; HIMSS--Healthcare Information and
Management Systems Society; HITRUST--Health Information
Trust Alliance; Large Public Power Council (LPPC);
National Association of Chemical Distributors (NACD);
National Association of Manufacturers (NAM); National
Association of Mutual Insurance Companies (NAMIC);
National Association of Water Companies (NAWC);
National Business Coalition on e-Commerce & Privacy;
National Cable & Telecommunications Association (NCTA);
National Rural Electric Cooperative Association
(NRECA).
NTCA--The Rural Broadband Association; Property Casualty
Insurers Association of America (PCI); The Real Estate
Roundtable; Securities Industry and Financial Markets
Association (SIFMA); Society of Chemical Manufacturers
& Affiliates (SOCMA); Telecommunications Industry
Association (TIA); Transmission Access Policy Study
Group (TAPS); United States Telecom Association
(USTelecom);
[[Page S6260]]
U.S. Chamber of Commerce; Utilities Telecom Council
(UTC).
____
Chamber of Commerce of
the United States of America,
February 14, 2015.
To the Members of the United States Senate: As the Senate
prepares to consider S. 754, the ``Cybersecurity Information
Sharing Act of 2015,'' the U.S. Chamber of Commerce, the
world's largest business federation representing the
interests of more than three million businesses of all sizes,
sectors, and regions, as well as state and local chambers and
industry associations, and dedicated to promoting,
protecting, and defending America's free enterprise system,
writes to express our strong opposition to the adoption of
amendments that would weaken or overly complicate this
important bipartisan bill, including issues related to data
security, breach notification, or commercial privacy, which
are best addressed in other contexts.
The Chamber believes that all provisions of S. 754 must
support the important goal of protecting critical
infrastructure. Unrelated issues, such as data security,
breach notification, and commercial privacy legislation, have
not yet received any consideration in the committees of
jurisdiction and are not ready for consideration by the full
Senate. These sensitive topics should proceed through the
legislative process following regular order to ensure
complete and deliberate consideration separate from the
pending floor debate on cybersecurity information sharing
legislation.
Cybersecurity information sharing legislation meets a dire
national security need, and though the Chamber would like to
see meaningful data security, breach notification, and
commercial privacy legislation become law, for the benefit of
businesses and consumers alike, we are equally steadfast in
our belief that cybersecurity information sharing legislation
is important for national security and should be Congress's
immediate priority.
There are 47 separate state laws which deal directly with
data security and breach notification. The business community
has been working with members of Congress in both chambers
and on both sides of the aisle to find the right path toward
passage of a national data security and breach notification
law. However, much work remains to be done, as disagreement
continues regarding certain provisions which would be
contained in federal legislation. This disagreement is
evident in virtually every one of the significantly different
data security bills which have been introduced in the Senate
during the last several Congresses.
The Chamber has appreciated the opportunity to comment on
and offer edits to the various bills and looks forward to
working with their authors and cosponsors as legislation
works its way through the committee process. However, data
security legislation deserves its own due consideration and
deliberate debate, separate from the complicated and pressing
national security issue of cybersecurity information sharing.
For example, the House Energy and Commerce committee has held
multiple hearings on proposed legislation in addition to a
subcommittee markup and planned mark up at the full committee
level. Though there are issues which need to be resolved in
that legislation, the Chamber appreciates the process and
consideration given and that the bill has worked its way
through the proper channels.
Given the work that still needs to be done on data security
proposals, the Chamber urges you to keep them separate and
apart from cybersecurity information sharing legislation and
not rush to make changes to the current landscape of state
data security, data breach, and commercial privacy laws.
Doing so would have a fundamentally negative impact on a
broad segment of the American business community.
Sincerely,
R. Bruce Josten.
Mrs. FEINSTEIN. At the same time, the bill includes numerous privacy
protections beyond those contained in last year's bill. Senator Burr
and I worked together to address the specific concerns raised by the
administration, some of our Senate colleagues, and other key
stakeholders. Because of these changes, the administration said
yesterday that ``cyber security is an important national security issue
and the Senate should take up this bill as soon as possible and pass
it.''
I believe this is a good bill and will allow companies and the
government to improve the security of their computer networks, but this
is just a first-step bill. It will not bring an end to successful cyber
attacks or thefts, but it will help to address the problem.
What does this bill do? It provides clear direction for the
government to share cyber threat information and defensive measures
with the private sector.
Two, it authorizes private companies to monitor their computer
networks and to share cyber threat information and defensive measures
with other companies and with the Federal, State, local, and tribal
government.
And three, it creates a process and rules to limit how the Federal
Government will and will not use the information it receives.
Companies are granted liability protection for the appropriate
monitoring for cyber threats and for sharing and receiving cyber threat
information. This liability protection exists for both company-to-
company sharing as well as company-to-government sharing consistent
with the bill's terms. Companies are also authorized to use defensive
measures on their own networks for cyber security purposes.
Since the bill is complicated, let me describe what the bill does in
more detail.
First, it recognizes that the Federal Government has information
about cyber threats that it can and should share with the private
sector and with State, local, and tribal governments. The bill requires
the Director of National Intelligence to put in place a process that
will increase the sharing of information on cyber threats already in
the government's hands with the private sector and help protect an
individual or a business.
Importantly, as the first order of business, there will be a
managers' amendment which makes changes to specifically limit the ways
the government can use the cyber security information it receives. This
amendment was distributed on Friday. I would urge everyone to look at
it because under the amendment, this bill can only be used for cyber
security purposes--no others. It is not a surveillance bill; it is
strictly related to cyber security. The bill previously allowed the
government to use the information to investigate and prosecute serious
violent felonies. That has drawn substantial opposition, and we have
removed it in the managers' package.
I would now like to take a minute to go over some of the privacy
protections in the bill.
No. 1, the bill is strictly voluntary. It does not require companies
to do anything they choose not to do. There is no requirement to share
information with another company or with the government. The government
cannot compel any sharing by the private sector. It is completely
voluntary.
No. 2, it narrowly defines the term ``cyber threat indicator'' to
limit the amount of information that may be shared under the bill.
Companies do not share information under this bill unless it is
specifically about a cyber threat or a cyber defense--nothing else.
No. 3, the authorizations are clear but limited. Companies are fully
authorized to do three things: monitor their networks or provide
monitoring services to their customers to identify cyber threats; use
limited defensive measures to protect against cyber threats on their
networks; and to share and receive information with each other and with
Federal, State, and local governments.
No. 4, there are mandatory steps companies must take, before sharing
any cyber threat information with other companies or the government, to
review the information for irrelevant privacy information. In other
words, the companies must do a privacy scrub. They are required to
remove any personal information that is found. Companies cannot, as it
has been alleged, simply hand over customer information.
No. 5, the bill requires that the Attorney General establish
mandatory guidelines to protect privacy for any information the
government receives. These guidelines will be public, and they will
include consultation with the private sector prior to them being put
together.
The bill requires them to limit how long the government can retain
any information and provide notification and a process to destroy
mistakenly shared information. It also requires the Attorney General to
create sanctions for any government official who does not follow these
mandatory privacy guidelines.
No. 6, the Department of Homeland Security, not the Department of
Defense or the intelligence community, is the primary recipient of
cyber information. In the managers' amendment, we strengthen the role
the Secretary of Homeland Security has in deciding how information
sharing will take place.
No. 7, once the managers' amendment is adopted, the bill will
restrict the government's use of voluntarily shared information, so the
government cannot use this information for law enforcement purposes
unrelated to cyber security and cyber crime.
[[Page S6261]]
No. 8, the bill limits liability protections to monitoring for cyber
threats and sharing information about them and only--and only--if a
company complies with the bill's privacy requirements. The bill
explicitly excludes protection for gross negligence or willful
misconduct.
No. 9, above and beyond these mandatory protections, there are a
number of oversight mechanisms in the bill, including reports by heads
of agencies, inspectors general, and the Privacy and Civil Liberties
Oversight Board.
In sum, this bill allows for strictly voluntary sharing of cyber
security information and many layers of privacy protection.
It is my understanding that the chairman of our committee is here, so
I would like to skip to the conclusion of my remarks and then be able
to turn this over to him.
The House of Representatives has already passed two bills this year
to improve cyber security information sharing. The Intelligence
Committee has crafted a carefully balanced bill that passed by a 14-to-
1 vote in March and it has improved significantly since then through
the managers' amendment.
We very much need to take this first step on cyber security to
address the almost daily reports of hacking and cyber threats. I very
much hope the Senate will take action now.
Now I will yield the floor. I want to thank the chairman. It has been
a pleasure, Mr. Chairman, to work with you. I think I speak for every
member of the committee. I am very pleased we have this bill on the
floor. God willing and the Members willing, we will be able to pass it
one day.
I yield the floor to the chair of the Intelligence Committee.
The PRESIDING OFFICER. The Senator from North Carolina.
Mr. BURR. Mr. President, I want to thank my good friend and vice
chair of the Intelligence Committee, Senator Feinstein. She has been in
the trenches working on cyber security legislation longer than I have.
Her passion is displayed in the product that has come out. There has
been no person more outspoken on privacy than Dianne Feinstein. There
is no person who has been more outspoken on the need for us to get this
right than Senator Feinstein.
Daily, she and I look at some of the most sensitive intelligence
information that exists in this country. We are charged as a
committee--15 individuals out of a body of 100--to provide the
oversight to an intelligence community to make sure they live within
the letters of the law or the boundaries set by Executive order. Every
day we try to fulfill that job.
We are sometimes tasked with producing legislation, and that is why
we are here today with the cyber security bill. It has been referred to
that we are here because OPM got hacked. No. We are here because the
American people's data will be in jeopardy if government does not help
to find a way to help minimize the loss.
So where is the threat? The threat is to business, it is to
government, and it is to individuals. There is no part of America that
is left out of this. The legislation we are proposing affects everybody
in this country--big and small business, State and Federal governments,
and individuals, no matter where they live or how much they are worth.
I think it is safe to say today that business and government have both
been attacked, they have been penetrated, and data has been lost. In
some cases that intent was criminal; in some cases the intent was
nation-states. It was towards credit cards on one side or Social
Security numbers, and on the other side it was plans for the next
military platform or intellectual property that was owned by a company.
But we are where we are, and now we have a proposal as to how we
minimize.
Let me emphasize this. You heard it from the vice chairman. This bill
does not prevent cyber attacks. I am not sure that we could craft
anything that would do that. What this bill does is for the first time
it allows us a pathway to minimizing the amount of data that is lost
and for the first time empowering government, once they get the
pertinent information, to push out to the rest of business and to
individuals and to governments: Here is the type of attack that is
happening. Here is the tool they are using. Here is the defensive
mechanism you can put on your system that will provide you comfort that
they cannot penetrate you and provide the company that has been
attacked comfort that it might be able to minimize in real time the
amount of data that is lost.
So, as the vice chairman said, these are key points on this piece of
legislation: It is voluntary. There is no entity in America that is
forced to report. It is a purely voluntary system. To have
participation in a voluntary system, you have to listen to the folks
who are the subjects of these attacks as to what they need to act in
real time and to provide pertinent data.
It is an information-sharing bill. It is not a surveillance bill. I
say to those who have characterized it that way that we have done
everything we can to clarify with the managers' amendment that there is
no surveillance. The only thing we are after is minimizing the loss of
data that exists.
Here is how it works. I want to break it into three categories.
This bill covers private to private. It says that if I am a private
company and my IT system gets hacked and I get penetrated, I can
automatically pick up the phone and call the IT people at my
competitor's business, and I am protected under antitrust, that we can
carry out a conversation so that I can figure out whether they got
hacked, and if they did but they did not get penetrated, what software
did they have on their system that secured their data. I can
immediately go and put that on my system, and I can minimize the loss
of any additional data. So we protect for that private-to-private
conversation only for the purposes of sharing cyber information.
We also have private to government. We allow any company, in real
time--at the same time they are talking to a competitor, they can
transmit electronically the pertinent data that it takes to do the
forensics of what happened. What tool did they use? They can transfer
that to government, and they are protected from a liability standpoint
for the transfer of that--the vice chairman got into all of this, so I
do not want to rehash it--with the correct protections of personal
data. The company is required not to send personal data. Any government
agency that is the recipient of this data, as they go through it, if
they see personal data that is not relevant to the determination of
what type of attack, what type of tool, what type of response, then
they have to minimize that data so it is not released.
In addition, we have government to private, which is the third leg.
It amazed me that the government did not have the authority to push out
a lot of information. What we do is we empower the government to
analyze the attack, to determine the tool that was used, to find the
most appropriate defensive software mechanism, and then to say to
business broadly: There is an attack that has happened in America. This
is the tool they used. This is the defensive mechanism that will
protect the data at your company.
If you ask me, I think this is what we are here for. This is what the
Congress of the United States is supposed to do--facilitate, through
minor tweaks, a voluntary participation to close the door and minimize
potential loss. That is all we are attempting to do.
I want to loop back to where the vice chairman was. We are now at the
point where we are asking our colleagues for unanimous consent to come
to the floor and actually take up this bill. Moving to the bill allows
our colleagues to come to the floor with relevant amendments to the
bill, where they can be debated and voted on.
I actually believe, Vice Chairman, if we could do that now, we could
process this entire bill and all of the amendments that are relevant by
this time tomorrow. That would mean we would have to work and we would
have to talk and we would have to vote, but we could do it because I
think when we look at the array of relevant amendments, they are pretty
well defined. Some of them are duplications of others that people have
planned to talk about.
But to suggest that this is a problem, which it is--we have seen it
with over 22 million government workers whose personal data and in some
cases, because of the forms they had to fill out for security
clearance, their most sensitive data has gotten out of the OPM system.
[[Page S6262]]
Just because OPM was the last one, don't think that somebody wasn't
serious. Don't think that Anthem Blue Cross wasn't serious. Don't think
that some of the attacks that only acquired credit card information
aren't serious.
What we are attempting to do is to minimize the degree of that loss.
All we need is the cooperation of every Member of the Senate to say: I
am willing to move to the bill. I am willing to bring up amendments--
relevant amendments--willing to debate them and willing to vote on
them.
Process is where we are. At the end of the day, we can determine
whether this is a bill that is worthy to move on. It is not the end of
the road because once we get through in the Senate we have to
conference the bill with the House of Representatives. As the vice
chairman pointed out, they have produced multiple pieces of
legislation. It is the Senate that is now holding us back.
I urge my colleagues: Let's agree to move to the bill. Let's agree to
relevant amendments, and let's process this cyber security bill so that
when we come back from August, we can actually sit down with our
colleagues in the House, conference a bill, and provide the American
people with a little bit of security, knowing that we are going to
minimize the amount of data that is lost, because of a voluntary
program between the private sector and the government.
I think the vice chairman shares my belief that we are not scared to
have a debate on relevant amendments on this bill. We understand there
are more views than just ours. But we have to get on the bill to be
able to offer amendments, to be able to share what we know that might
not necessarily support the amendment.
Right now, we are sort of frozen because we cannot offer amendments,
including the managers' amendment, which I would say to my colleagues--
and the vice chairman said this in a very specific way--if you will
read the managers' amendment, a lot of the concerns that people have
will vanish. Nobody will call it a surveillance bill because we have
addressed the issues that people were concerned with. Although we
didn't think they were problems before, we clarified it in a way that
it is limited only to cyber security. I could make a tremendous case
that through the cyber security forensic process, if we found another
criminal act, the American people probably would want that reported--
without a doubt.
Mr. McCAIN. Will the Senator yield for a question?
Mr. BURR. I am pleased to yield for a question.
Mr. McCAIN. In light of recent events that have dominated the news,
including the breach of millions of Americans' privileged information,
which could be used in ways to harm them, do you think it is a good
idea for the Senate to go out into a month-long recess without at least
having debates, votes, and amendments on this issue?
Does the Senator know of an issue right now that impacts the lives of
everyday Americans such as this threat of cyber security attacks on the
citizens of the United States?
Mr. BURR. I thank the Senator for the question, and I think he knows
the answer.
We should dispose of this. The easiest way, as I shared earlier, is
that if we get on this bill and we process amendments, if we really
wanted to, we could finish tomorrow. The reality is that it doesn't
take a long time to debate amendments, to vote on amendments, and to be
done.
At the end of the day, every Member would have to make a decision as
to whether they are supportive or against the bill. But not getting on
the bill, not offering amendments cheats the American people.
Mr. McCAIN. I will just ask one more question.
It is obvious that the Senator from California and the Senator from
North Carolina have worked very closely together on this issue. They
are the two leaders on intelligence now for a number of years.
Wouldn't it seem logical that with a bipartisan piece of legislation
that addresses an issue--I guess my question is this: How many
Americans have been affected most recently by cyber attacks, and what
would this legislation do to try to prohibit that from happening again?
Don't we have some obligation to try to address the vulnerabilities of
average American everyday citizens?
Mr. BURR. I think the answer is there have been millions of Americans
whose private data has been breached for numerous reasons. The Senator
from Arizona is correct. We have an obligation to do what we can to
minimize that loss.
Mr. McCAIN. And isn't this a bipartisan product?
Mr. BURR. Well, this is very much a bipartisan bill, and I think it
is a bicameral effort. It is not as if this is a limb we are walking
out on and the House isn't already out there. Emphatically, I implore
my colleagues: Let's get on the bill. Let's come and offer relevant
amendments, and let's process those amendments as quickly as we can. I
think we can accommodate both, the need to leave for August and to go
see the people we are married to and get away from the people we see
every day who influence us in numerous ways--I am speaking of the
Senator from Arizona right now, and I know he is anxious to go
somewhere other than here--and to process this bill, which is to do our
work. To not get on the bill, to not offer amendments is to ignore the
responsibilities that we have.
Mr. McCAIN. I wish to just finally say to the Senator from North
Carolina that I appreciate the hard work he and the Senator from
California have put in on this issue. It has been said by our military
leaders that right now one of the greatest vulnerabilities to national
security is the possibility or likelihood of cyber attacks. The
implications of that far exceed that of the invasion of someone's
privacy.
I thank him and the Senator from California for their hard work on
this. I think it at least deserves debate and amendments, and hopefully
we can pass it before we go out for the recess.
Mr. BURR. I thank the Senator from Arizona, who has worked closely
with us since the beginning to try to move this bill together.
Hopefully, at our lunches today, we will have an opportunity to talk to
our Members in the hopes that we can come back from lunch and maybe get
started on this bill.
With that, I yield the floor.
The PRESIDING OFFICER. The Senator from Virginia.
Mr. KAINE. Mr. President, I ask unanimous consent to speak for up to
10 minutes, recognizing that it is after 12:30 p.m.
The PRESIDING OFFICER. Is there objection?
Without objection, it is so ordered.
____________________
[Congressional Record Volume 161, Number 125 (Tuesday, August 4, 2015)]
[Senate]
[Pages S6263-S6270]
CYBERSECURITY INFORMATION SHARING ACT OF 2015--MOTION TO PROCEED--
Continued
The PRESIDING OFFICER. The Senator from Arizona.
Mr. McCAIN. Mr. President, I would like to thank my friend from
Florida, Senator Nelson, for allowing me to speak for 5 minutes. I ask
unanimous consent that he be recognized immediately following me--not
the Senator from New Mexico, the Senator from Florida.
The PRESIDING OFFICER. Without objection, it is so ordered.
Mr. McCAIN. Mr. President, I rise in strong support of S. 754, the
Cybersecurity Information Sharing Act. I want to thank my colleagues
Chairman Burr and Vice Chairman Feinstein for their leadership on this
critically important legislation. This bill, of which I am an original
cosponsor, was overwhelmingly approved by a 14-to-1 vote in the Senate
Select Committee on Intelligence in March.
Enacting legislation to confront the accumulating dangers of cyber
threats must be among the highest national security priorities of the
Congress. Cyber attacks on our Nation have become disturbingly common.
More recently, it was the Office of Personnel Management. A few weeks
before that, it was the Pentagon network, the White House, and the
State Department. Before that it was Anthem and Sony--just to name a
few. The status quo is unacceptable, and Congress needs to do its part
in passing this legislation. But the President, as our Nation's
Commander in Chief, must also do his part to deter the belligerence of
our adversaries in cyber space.
The threats from China, Russia, North Korea, and Iran--not to mention
the aspirations of terrorist organizations like ISIL and Al Qaeda--are
steadily growing in number and severity. And our national security
leadership has warned us repeatedly that we could face a cyber attack
against our Nation's critical infrastructure in the not too distant
future. I believe our response to such an attack, or lack thereof,
could define the future of warfare.
To date, the U.S. response to cyber attacks has been tepid at best,
and nonexistent at worst. Unless and until
[[Page S6264]]
the President uses the authorities he has to deter, defend, and respond
to the growing number and severity of cyber attacks, we will risk not
just more of the same but emboldened adversaries and terrorist
organizations that will continuously pursue more severe and destructive
cyber attacks.
As ADM Mike Rogers, the commander of U.S. Cyber Command, told
listeners at the Aspen Security Forum a couple weeks ago, ``to date
there is little price to pay for engaging in some pretty aggressive
behaviors.'' According to James Clapper, the Director of National
Intelligence, ``we will see a progression or expansion of that envelope
until such time as we create both a substance and psychology of
deterrence. And today we don't have that.''
According to the Chairman of the Joint Chiefs of Staff, General
Dempsey, our military enjoys ``a significant military advantage'' in
every domain except for one--cyber space. As General Dempsey said,
cyber ``is a level playing field. And that makes this chairman very
uncomfortable.'' Efforts are currently underway to begin addressing
some of our strategic shortfalls in cyber space, including the training
of a 6,200-person cyber force. However, these efforts will be
meaningless unless we make the tough policy decisions to establish
meaningful cyber deterrence. The President must take steps now to
demonstrate to our adversaries that the United States takes cyber
attacks seriously and is prepared to respond.
This legislation before us is one piece of that overall deterrent
strategy, and it is long past time that Congress move forward on
information sharing legislation. The voluntary information sharing
framework in this legislation is critical to addressing these threats
and ensuring that the mechanisms are in place to identify those
responsible for costly and crippling cyber attacks and, ultimately,
deter future attacks.
Many of us have spent countless hours crafting and debating cyber
legislation back to 2012. Mr. President, 2012 was the last time we
attempted to pass major cyber legislation. This body has come a long
way since that time. We understand that we cannot improve our cyber
posture by shackling the private sector, which operates the majority of
our country's critical infrastructure, with government mandates. As I
argued at that time, heavyhanded regulations and government bureaucracy
will do more harm than good in cyber space. The voluntary framework in
this legislation represents the progress we have made in defining the
role of the private sector and the role of the government in sharing
threat information, defending networks, and deterring cyber attacks.
This legislation also complements actions we have taken in the
National Defense Authorization Act, or NDAA, currently in conference
with the House. As chairman of the Armed Services Committee, cyber
security is one of my top priorities. That is why the NDAA includes a
number of critical cyber provisions designed to ensure the Department
of Defense has the capabilities it needs to deter aggression, defend
our national security interests, and, when called upon, defeat our
adversaries in cyber space.
The NDAA authorizes the Secretary of Defense to develop, prepare,
coordinate, and, when authorized by the President, conduct a military
cyber operation in response to malicious cyber activity carried out
against the United States or a United States person by a foreign power.
The NDAA also authorizes $200 million for the Secretary of Defense to
assess the cyber vulnerabilities of every major DOD weapons system.
Finally, Congress required the President to submit an integrated policy
to deter adversaries in cyber space in the fiscal year 2014 NDAA. We
are still waiting on that policy, and this year's NDAA includes funding
restrictions that will remain in place until it is delivered.
Every day that goes by, I fear our Nation grows more vulnerable, our
privacy and security are at greater risk, and our adversaries are
further emboldened. These are the stakes, and that is why it is
essential that we come together and pass the Cybersecurity Information
Sharing Act.
Mr. President, I thank again my friend from Florida, who is a valued
member of the Senate Armed Services Committee, for his indulgence to
allow me to speak. I thank my colleague.
I yield the floor.
[...]
The PRESIDING OFFICER. The majority leader.
Mr. McCONNELL. Mr. President, our government was recently struck by a
devastating cyber attack that has been described as one of the worst
breaches in U.S. history. It was a major blow to the privacy of
millions of Americans. We know the private sector is vulnerable to
attack as well. The House has already passed two White House-backed
cyber security bills to help address the issue. Similar legislation is
now before the Senate. It is strong, bipartisan, and transparent. It
has been vetted and overwhelmingly endorsed 14 to 1 by both parties in
committee.
It would help both the public and private sectors to defeat cyber
attacks. The top Senate Democrat on this issue reminds us it would
protect individual privacy and civil liberties too. Now is the time to
allow the Senate to debate and then pass this bipartisan bill.
In just a moment, I will offer a fair consent request to allow the
Senate to do just that. The Democratic leader previously said that both
he and the senior Senator from Oregon believe the Senate should be able
to finish the bill ``in a couple of days . . . at the most.'' And just
today he said the Democrats remain willing to proceed to this
bipartisan bill if allowed to offer some relevant amendments. The
senior Senator from New York has also said that Democrats want to get
to the bill and that they want to get a few amendments too.
Our friends across the aisle will be glad to know that the UC I am
about to offer would allow 10 relevant amendments per side to be
offered and made pending. That is a good and fair start that exceeds
the request from our friends across the aisle.
Now that we have a path forward that gives both sides what they said
they need, I would invite our colleagues to join us now in moving
forward on this bill. I invite our colleagues to allow the Senate to
cooperate in a spirit of good faith to pass a bill this week so we can
help protect the American people from more devastating cyber attacks.
I notified the Democratic leader that I would propound the following
consent request: I ask unanimous consent that the cloture motion on the
motion to proceed to calendar No. 28, S. 754, be withdrawn and that the
Senate immediately proceed to its consideration. I further ask that
Senator Burr then be recognized to offer the Burr-Feinstein substitute
amendment and that it be in order during today's session of the Senate
for the bill managers, or their designees, to offer up to 10 first-
degree amendments relevant to the substitute per side.
The PRESIDING OFFICER. Is there objection?
Mr. REID. Reserving the right to object.
The PRESIDING OFFICER. The minority leader.
Mr. REID. The Republican leader is my friend, and I don't mean in any
way to disparage him, other than to bring out a little bit of history.
I can't imagine how he can make this offer with a straight face. Have
amendments pending? That is like nothing. We tried that before, as
recently as the highway bill. Having amendments pending doesn't mean
anything.
We want to pass a good cyber security bill. We have a bill that has
been crafted in the intelligence committee. Other committees have been
interested in participating in what we have here on the floor, but they
are willing to say: OK. We have a bill from the intelligence committee.
There have been no public committee hearings, no public markups.
There has been nothing done other than a rule XIV which, of course, my
friend said he would not do if he got to be the leader and there would
be a robust amendment process. Having a robust amendment process has
nothing to do with having amendments pending.
We want to pass a good bill. But we want to have a reasonable number
of amendments, and there will be votes on those amendments. We are not
asking for longtime agreements. The Republican leader's proposal would
not lead to votes on the amendments. He would allow the amendments to
be pending, but if the Republican leader were to file cloture, as he
has done repeatedly the last few months--and an example is what he did
with the recent highway bill--all amendments that were not strictly
germane would fall.
Remember, we are not asking for germane amendments. We are asking for
relevant amendments. We are willing to enter into an agreement that
provides votes on a reasonable number of amendments that would be
germane in nature, and we should be working on that agreement.
In contrast, if we fail to get that agreement, we are going to have a
cloture vote an hour after we come in in the morning, and 30 hours
after that--sometime late Thursday afternoon or early Thursday
evening--he would have to file cloture on that. That puts us right into
the work period when we get back on September 8.
When we get back, we have the 8th to the 17th, including weekends and
a holiday that is celebrated every year that we always take off, which
includes 2 days. It is a Jewish holiday. I can't imagine why we would
want this to interfere with what we are trying to do in the month of
September.
We are willing to do this bill. We can start working on these
amendments right now if we can have votes on them, but we are not going
to agree to some arrangement like this. If the Republicans are going to
push this, we can come in here tomorrow, and we will vote. The 30 hours
of time will go by--and we know how to use 30 hours; we were taught how
to do that--30 hours of postcloture time. And Thursday afternoon, the
leader can make whatever decision is necessary.
We want a cyber bill. This bill is not the phoenix of all cyber
bills, but it certainly is better than nothing. We should--following
the recommendation and the suggestion and what the Republican leader
has said he would do--be allowed some amendments to vote on. We can
start that today. Today is Tuesday. We can finish these amendments--I
would hope on the Democratic side--in a fairly short order of time.
As for the Republicans, I don't know. All I heard following the
caucus is one Republican Senator wanted to offer an amendment on the
cyber bill dealing with auditing the Fed. I can't imagine why that has
anything to do with this bill.
We are serious about legislating. We want to do something that is
good, we believe, for the country, good for the order of the Senate.
Otherwise, we will look at each other around here until Thursday
afternoon, and the Republican leader can look forward to this being the
first thing we take up when we get back in September. We are willing to
be fair and reasonable to finish this, with our amendments, in a very
short period of time. So I object.
The PRESIDING OFFICER. Objection is heard.
Mr. McCONNELL. Mr. President, let me say, I think there may well be a
way forward here. What I thought I heard the Democratic leader say is
that they are interested in passing a bill. That is important. He said
when it was offered on the defense authorization bill that it was a 2-
day bill, and we could agree to a limited number of amendments.
I think we both agree this is an important subject. I can't imagine
that either the Democrats or the Republicans want to leave here for a
month and not pass the cyber security bill. I think there is enough
interest on both sides to try to continue to discuss the matter and see
if there is a way forward. That would be in the best interest of the
country if we could come together and do this. This bill came out of
the intelligence committee 14 to 1.
Chairman Burr and Vice Chair Feinstein have been asking for floor
time. They are anxious to move this bill
[[Page S6267]]
across the floor. I am hoping the Democratic leader and I can continue
to discuss the matter and that we can find a way forward.
The PRESIDING OFFICER. The Democratic leader.
Mr. REID. Mr. President, I look forward to that discussion. Keep in
mind, being reported out of committee--this is a committee that holds
everything in secret. They do nothing public. So having a 14 to 1 vote
in a meeting that takes place in secret doesn't give the other Senators
who are not on that committee a lot of solace.
I look forward to the Republican leader and me and our staffs working
together to try to come up with some way to move forward on this
legislation. We want to do that.
The PRESIDING OFFICER. The majority leader.
Mr. McCONNELL. Mr. President, as my good friend the Democratic leader
used to remind me, the majority leader always gets the last word.
This is not a new issue. It was around during the previous Congress.
Other committees acted--other committee chairmen like what Chairman
Burr and Vice Chair Feinstein have done. Hopefully, we can minimize
sort of manufacturing problems here that keep us from going forward
when it appears to me that both sides really would like to get an
outcome and believe it would be best for the country to get an outcome
before we go into the recess. We will continue to discuss the matter
and hope that we can find a way forward.
The PRESIDING OFFICER (Mr. Lankford). The Senator from Oregon.
Mr. WYDEN. Mr. President, I will be very brief. I understand there
has already been an objection.
I will speak later in the afternoon or early evening in some detail
about why I have significant reservations with respect to this
legislation.
To say--as we heard again and again throughout the day--that this is
about voluntary information sharing is essentially only half true. The
fact is, companies could volunteer to share their customers'
information with the government, but they wouldn't have to ask for
permission from their customers before handing it over. That is one
reason every major organization with expertise and interest on privacy
issues has had reservations about the bill. It may be voluntary for
companies, but it is mandatory for their customers and their consumers.
They are not given the opportunity to opt out.
The legislation has been public for months, and dozens of cyber
security experts have said it wouldn't do much to stop sophisticated,
large-scale attacks such as the horrendous attack at the Office of
Personnel Management.
On Friday, the Department of Homeland Security--an absolutely
essential agency as it relates to this bill--wrote a letter to our
colleague, the distinguished Senator from Minnesota, Mr. Franken, and
said if this bill's approach is adopted, ``the complexity and
inefficiency of any information sharing program will markedly
increase.'' The Department of Homeland Security added that the bill
``could sweep away important privacy protections.'' That is a pretty
strong indictment from the agency that would be in charge of
implementing the legislation.
As I have indicated a couple of times in the last day or so, I think
the managers, Senator Feinstein and Senator Burr, have made several
positive changes, but the bottom line is it doesn't address the very
substantial privacy concerns that relate to this bill. The fact is,
cyber security is a very serious problem in America.
Oregonians know a lot about it because one of our large employers was
hacked by the Chinese. SolarWorld was hacked by the Chinese because
they insisted on enforcing their rights under trade law. In fact, our
government indicted the Chinese for the hack of my constituents and
others.
So cyber security is a serious problem. Information sharing can play
a constructive role, but information sharing without robust privacy
safeguards is really not a cyber security bill. It is going to be seen
by millions of Americans as a surveillance bill, and that is why it is
so important that there be strong privacy guidelines.
The fact is, in the managers' legislation, the section allowing
companies to hand over large volumes of information with only a cursory
review would be essentially unmodified. The Department of Homeland
Security asked for some specific changes to the language, which the
managers' amendment does not include. So my hope is, we are going to
have a chance to have a real debate on this issue. Personally, I would
rather go down a different route with respect to cyber security
legislation. In particular, I recommend the very fine data breach bill
of our colleague from Vermont Senator Leahy, but if Senators have their
hearts set on doing the bill before us, it is going to need some very
substantial amendments, both to ensure that we show the American people
that security and privacy are not mutually exclusive, that we can do
both, and to address the very serious operational reservations the
Department of Homeland Security has raised. Neither set of concerns is
thoroughly addressed by the managers' amendment.
So my hope is that we are going to have a chance to make some very
significant reforms in this legislation. After seeing what has happened
over the last few weeks, where the government isn't exactly doing an
ideal job of securing the data it has, and now we are going to propose
legislation that has private companies, without the permission of their
customers, for example, to dump large quantities of their customers'
data over to the government with only a cursory review--this
legislation is not going to be real attractive to the millions of
Americans who sent us to represent them.
In fact, in just the last few days, I read in the media that some of
the opponents of this legislation have sent something like 6 million
faxes to the Senate--and people wonder if there are still fax machines.
I guess the point is to demonstrate it is important that we understand,
as we look at digital communications, what the challenge is.
I will have more to say about this later in the afternoon and in the
evening, but I wanted to take this opportunity, since we have just
gotten out of the party caucuses, to make some corrections with respect
to what we were told this morning and particularly on this question
about how this is a voluntary bill. Ask millions of Americans whether
it is voluntary when companies can hand over their private information
to the government without their permission.
I yield the floor.
The PRESIDING OFFICER. The Senator from Kansas.
Mr. MORAN. Mr. President, I ask unanimous consent to be recognized as
in morning business.
The PRESIDING OFFICER. Without objection, it is so ordered.
Nuclear Agreement With Iran
Mr. MORAN. Mr. President, cyber security is an important issue, but I
come to the floor to talk for a bit about one of the most consequential
decisions that I, as a Member of the U.S. Senate, and my colleagues
will make, and that concerns the negotiated agreement between the P5+1
and Iran--the proposed Joint Comprehensive Plan of Action with Iran. In
my view, it provides too much relief in return for too few concessions.
The deal implicitly concedes that Iran will become a nuclear power and
will gain the ability and legitimacy to produce a weapon in a matter of
years while gaining wealth and power in the meantime.
I serve on the Senate Banking Committee. The sanctions that were
created by Congress originate from that committee. Those sanctions were
put in place to prevent Iran from becoming a nuclear power--a country
capable of delivering a nuclear weapon across their border. Those
sanctions were not put in place to give Iran a path or a guideline to
become a nuclear-weapon-capable country. The key is to keep nuclear
weapons out of the hands of Iran's Government. The key to that is to
permanently disable Iran from nuclear capability and remove the
technology used to produce nuclear materials. This deal fails to
achieve this goal by allowing Iran to retain nuclear facilities. Though
some of it will be limited in use in the near term, the centrifuges
used to enrich nuclear matter will not be destroyed or removed from the
country. This deal allows Iran's nuclear infrastructure to remain on
standby for nuclear development when the restrictions expire.
Also troubling is the agreement's lack of restrictions on nuclear
research and development. Iran seeks to replace its current enrichment
technology
[[Page S6268]]
with a more advanced centrifuge that more efficiently enriches nuclear
material. By failing to restrict research and development now, we are
priming Iran's nuclear program to hit the ground running toward a bomb
once the restrictions are lifted in a matter of years.
Also, the inspection regime agreed to in this negotiation is
dangerously accommodating. The agreement provides Iran a great deal of
flexibility regarding the inspection of military sites just like those
where Iran's past covert nuclear development work took place. The deal
allows Iran to hold concerned international inspectors at bay for
weeks, if not months, before granting access to a location suspected of
being a site for nuclear development.
The value of any access to suspected Iranian nuclear sites that
international inspectors ultimately do receive will depend upon their
understanding of Iran's past nuclear weapons research. A comprehensive
disclosure of possible military dimensions to Iran's nuclear research
is necessary for inspectors to fully understand Iran's current
infrastructure and is critical to their ability to rule out any future
efforts to produce nuclear weapons.
The International Atomic Energy Agency, IAEA, has not made public its
site agreement with Iran about their previous nuclear developments.
This is an aside, but I would say none of us should agree to this
negotiated agreement without seeing, reading, and knowing the content
of that agreement. Under the proposed deal, that vital full disclosure
of Iran's nuclear past may not occur, diminishing the value of
inspections and increasing the risk that another covert weaponization
of Iran will take place.
Painfully absent from the agreement's requirements is Iran's release
of American hostages: Saeed Abedini, Jason Rezaian, Robert Levinson,
and Amir Hekmati. The freedom of Americans unjustly held in Iran should
have been a strict precondition for sanctions relief instead of an
afterthought.
In return for very limited concessions, this deal gives Iran way too
much. If implemented, the agreement would give Iran near complete
sanctions relief up front. This isn't a Republican or Democratic issue.
Common sense tells us that you don't give away a leverage until you get
the result that you are looking for, and this agreement provides
sanctions relief upfront, delivering billions in frozen assets to the
Iranian Government and boosting the Iranian economy. Included in this
relief are sanctions related to Iran's Revolutionary Guard Corps, which
were to be lifted only when Iran ceased providing support for
international terrorism.
The sanctions relief in this proposal not only fails to require
preconditions and cooperation regarding nuclear disarmament but will
remove sanctions from the Iranian Guard, despite their status as a top
supporter of terrorist groups around the Middle East and globe.
This type of gratuitous flexibility for Iran is found elsewhere in
the agreement. The P5+1 acceptance of Iranian demands for a relaxed
U.N. arms embargo is both perplexing and scary. This deal would relax
trade restrictions on missiles after 8 years, while immediately erasing
limits on missile research and development. It would also lift
restrictions on Iranian centrifuge use and development after just 8 to
10 years. The deal grants Iran the ability to more efficiently produce
nuclear material just as it gains the ability to access the delivery
weapons system.
Earlier this month, the Chairman of the Joint Chiefs of Staff, GEN
Martin Dempsey, said: ``Under no circumstances should we relieve
pressure on Iran relative to ballistic missile capabilities and arms
trafficking.'' Lifting the U.N. arms embargo was ``out of the
question.'' Yet, just 1 week later, negotiators announced the lifting
of the embargo in 5 to 8 years or less. I wonder what has changed.
Unless the menace of an increased flow of weapons in and out of Iran
somehow substantially decreased during the intervening week, the
consequence of this sudden capitulation should have us all greatly
concerned.
This fear of increased money flow to terror organizations linked to
the Iranian Government is not based upon merely an outside possibility;
it is a likelihood. Last week Iran's Deputy Foreign Minister stated:
``Whenever it's needed to send arms to our allies in the region, we
will do so.'' More money and more weapons in the hands of terrorist
organizations are the fuel for increased violence and further
destabilization in the conflict-torn Middle East.
We have little reason to believe Iran's behavior will change as a
result of this agreement. In fact, their chants of ``Death to America''
become more real.
Since the announcement of the agreement, the leader of Iran has been
openly antagonistic to the United States. Ayatollah Ali Khamenei has
promised to continue to incite unrest and said Iran's ``policy towards
the arrogant U.S. will not change.'' These anti-American statements
come from an Iranian leader whose commitment the Obama administration
is relying on for the nuclear accord to work. It should trouble every
American that the Obama administration is asking us to support a deal
that relies on the total cooperation of those who, as I say, strongly
state their commitment to bringing about ``death to America.''
Given the Obama administration's troubling efforts to push through
this deal to the United Nations and restrict the influence of the
American people through this Congress in the decision, it is all the
more important that we follow through with a serious assessment of this
nuclear agreement. We are faced with a circumstance that, by the
administration's own previous standards, concedes too much and secures
too little.
I strongly oppose this nuclear deal. It is intolerably risky, and the
result will be a new Iran--a legitimized nuclear power with a growing
economy and enhanced means to finance terror, to antagonize, and to
ultimately pursue a nuclear weapons program. I will support the
congressional resolution to express Congress's explicit disapproval.
President Obama has used fear in his agenda in seeking our support
for this agreement. The warning has been that a vote against his policy
is a vote for war with Iran. The President's political scare tactics
are not only untrue but also illogical.
Incidentally, we were not at war with Iran when the agreements were
in place before the negotiation. The absence of agreeing to the
negotiated agreement would not mean we will be at war thereafter.
The President's claims undermine numerous statements his own
administration has made about the negotiation process, the nature of
the Iranian nuclear program, and the proposed agreement's prospects for
success. If true, the President's words concede that his foreign policy
has led America into a dangerous position.
We would expect a President to provide the American people as many
alternatives to war as possible, not just a single narrow and risky one
such as this. According to the President, the only alternative to war
is this agreement--a deal that results in better financed terrorists, a
weakened arms embargo, and the need for boosting U.S. weapons sales to
Iran's regional rivals. If this prospect of war is his concern, the
President would benefit by reevaluating the geopolitical consequences
of the deal and seeking out much better options.
I had hoped these negotiations would result in a strong but fair deal
to dismantle Iran's nuclear infrastructure. Again, the purpose of
placing sanctions on Iran was to get rid of their nuclear capability as
far as delivery of nuclear material across their borders. Yet this
agreement leaves that infrastructure in place and puts them on a
promising path toward that nuclear capability.
Regrettably, that kind of deal was not reached. Now my hope is a
simple one: that we are able to reverse some of the damage that is
already done and that this agreement is rejected.
I would say that there are those who argue that we would be isolated
by rejection of this agreement, that other countries would approve and
the United Nations may approve. This is an issue of such importance
that we need to do everything possible to see that Iran does not become
a nuclear power, and we need to have the moral character and fiber to
say no to this agreement.
Mr. President, I yield the floor.
The PRESIDING OFFICER. The Senator from Washington.
[[Page S6269]]
Mrs. MURRAY. Mr. President, I ask unanimous consent to speak as in
morning business.
The PRESIDING OFFICER. Without objection, it is so ordered.
Economic Security for Our Country's Workers
Mrs. MURRAY. Mr. President, across our country today, so many of our
workers clock in 40 hours a week. They work very hard, and yet they are
unable to provide for their families.
Just last fall, NBC News interviewed a woman named Latoya who worked
in a fast food restaurant. She was protesting as part of a fast food
workers strike. Latoya is raising four children alone on $7.25 an hour.
That is less than $300 a week and is well below the poverty line for
her and her family. For part of last year, she was living in a homeless
shelter. She told the reporter: ``Nobody should work 40 hours a week
and find themselves homeless.'' On top of rock-bottom wages, Latoya
said she and her colleagues experienced unpaid wages, unpredictable
scheduling, and having to make do with broken equipment on the job.
In today's economy, too many of our workers across the country face
the same challenges as Latoya. They are underpaid, they are overworked,
and they are treated unfairly on the job. In short, they lack
fundamental economic security.
Several places around the country and in my home State of Washington
are working to address this at the local level. This Senator believes
we need to bring the Washington State way here to Washington, DC. In
Congress, I believe we need to act to give workers some much needed
relief. We need to grow our economy from the middle out, not the top
down, and we should make sure our country works for all Americans, not
just the wealthiest few.
There is no reason we can't get to work today on legislation to do
just that. That is why I have joined with my colleagues over the past
few months in introducing several bills that will help restore some
much needed economic security and stability to millions of workers.
That is why I am hoping we can move some of these bills forward before
we all go back home to our States.
For too long we have heard from some Republicans the theory--a deeply
flawed theory--that if we would only grant more tax cuts to the
wealthiest Americans and if we would just keep rolling back regulations
on the biggest corporations, those benefits would eventually trickle
down and reach working families in our country. Not only does that
theory not work, as we have seen over the past few decades, that
trickle-down system has done real damage to our Nation's middle class
and our working families. While worker productivity has actually
reached new heights, workers have lost basic protections they once had.
While trickle-down economics allows corporations to post big profits,
too many of our workers are paying the price. Let me give some
examples. Today the Federal minimum wage can leave a family in poverty
even after working full time and even without taking a single day off.
Not only that, today some businesses are using unfair scheduling
practices to keep workers guessing about when they are going to be
called in to work, with no guarantee of how much money they will earn
in a given week. Those types of scheduling abuses take a real toll on
workers' lives and prevent them from getting ahead. Attending college
classes is not an option when someone's work schedule is always in
flux. Taking on a second job to earn more money is nearly impossible
when you can't plan around your first job. And that is not all. Today,
43 million workers in this country don't have paid sick leave. When
they get sick, they have to choose between toughing it out at work and
passing that illness on to others or staying at home and potentially
losing their job. When their child is sick, they have to choose between
losing money on their paycheck or missing out on caring for their son
or daughter. If that is not enough, in our country women are paid just
78 cents for every dollar a man makes. That is not just unfair to
women, by the way; it is bad for families and it hurts our economy.
Many businesses are doing the right thing and are supporting their
workers, but other corporations that don't, put those businesses that
are doing the right thing at a competitive disadvantage by running a
race to the bottom and pulling their workers down with them.
This worker insecurity isn't just devastating for the millions of
workers and their families who are impacted by it, it is also hurting
our economy. Truly robust and strong economic growth comes from the
middle out, not the top down. When our workers lack security, when they
are not treated fairly, they can't invest in themselves and their
children or spend money in their communities or move their families
into a middle-class life.
I believe we have to address this challenge on multiple fronts. We
can start by making sure our workers are treated fairly so they can
earn their way toward rising wages and increased economic security.
There are important things we can do here in Congress to expand
economic security and stability for millions of our working families
today. For starters, we should pass the Paycheck Fairness Act that the
senior Senator from Maryland has championed for so many years to
finally close the pay gap between men and women. The Paycheck Fairness
Act would tackle pay discrimination head-on. This Senator hopes we can
all agree that in the 21st century, workers should be paid fairly for
the work they do, regardless of their gender.
We should also raise the minimum wage to make sure hard work does pay
off. My Raise the Wage Act increases the minimum wage to $12 by 2020
and is enough to lift a family of three out of poverty. It will put
more money in workers' pockets so they can spend it in their local
communities. It will help to build a strong floor--a Federal minimum--
that workers and cities can build off of and go even higher where it
makes sense, like in Seattle in my home State in Washington. It is a
level that Republicans should be able to agree with and start moving
toward right now.
I have also worked on a bill, along with Senators Warren and Murphy,
to crack down on the scheduling abuses I just talked about, so
businesses would no longer keep their workers guessing on when they
would be called in or how many hours they might get in a given week.
In February I introduced the Healthy Families Act to allow workers to
earn up to 7 paid sick days. I want to move forward on that legislation
to give our workers some much needed economic security because no one
should have to sacrifice a day of pay or their job altogether just to
take care of themselves or their sick child.
We as a nation should not turn our backs on empowering our workers
through collective bargaining, especially since strong unions ensure
workers have a strong voice at the table. It is the very thing that
helped so many workers climb into the middle class in this country.
Enacting these critical policies won't solve every problem facing our
workers and their families today. It is not the only way that I and
Senate Democrats will be fighting to protect workers and making sure
the economy is growing from the middle out, not the top down. But these
policies would be very strong steps in the right direction to bring
back that American dream of economic security and a stable middle-class
life for millions of workers who have seen it slip away.
When workers succeed, businesses succeed and thus the economy
succeeds. We know this works. I have seen it in my home State of
Washington where State and local governments have taken the lead on
proposals such as raising the minimum wage and paid sick days. I think
it is time to bring some of that Washington State way right here to
Washington, DC.
I recently heard from a small business owner by the name of Laura.
She owns a small auto repair shop in Renton, WA. She shared something
that I hear all the time from business owners: Doing the right thing by
workers starts a virtuous cycle. Laura said, ``When workers have more
money, businesses have more customers. With more customers, businesses
can hire more workers, which in turn generates more customers.''
Working families in our country have been waiting long enough for
some relief from the trickle-down system that hurts the middle class.
That is why I
[[Page S6270]]
am going to be asking for unanimous consent to work on the policies
that would restore economic security and stability to more workers.
Let's finally restore some stability and security for workers across
our country. Let's make sure hard work pays off. Let's help more
families make ends meet, expand economic opportunity, and grow our
economy from the middle out.
Thank you, Mr. President.
I yield the floor.
The PRESIDING OFFICER. The Senator from Arizona.
Mr. McCAIN. Mr. President, I ask unanimous consent that I be allowed
to speak for 3 minutes and that I be followed immediately by the
Senator from Idaho.
The PRESIDING OFFICER. Is there objection?
Without objection, it is so ordered.
Mr. McCAIN. Mr. President, is the parliamentary procedure that there
was an objection to the Senate moving forward with the consideration of
the cyber bill? Is that correct?
The PRESIDING OFFICER. There was an objection that was heard to the
request of the majority leader.
Mrs. MURRAY addressed the Chair.
Mr. McCAIN. Mr. President, do I have the floor?
The PRESIDING OFFICER. The Senator from Arizona has the floor.
Mr. McCAIN. I have the floor, I tell the Senator from Washington.
This is unbelievable. It is unbelievable that this body would not
move forward with a cyber bill with the situation of dire consequences
and dire threats to the United States of America. Admiral Rogers, the
commander of U.S. Cyber Command, told listeners at the Aspen Security
Forum that ``to date there is little price to pay for engaging in some
pretty aggressive behaviors.''
According to James Clapper, the Director of National Intelligence,
``we will see a progression or expansion of that envelope until such
time as we create both the substance and psychology of deterrence. And
today we don't have that.''
The Chairman of the Joint Chiefs of Staff, General Dempsey, our
military enjoys ``significant military advantage'' in every domain
except for one--cyber space. General Dempsey said cyber ``is a level
playing field. And that makes this chairman very uncomfortable.'' The
Chairman of the Joint Chiefs of Staff is uncomfortable about the cyber
threats to this Nation.
What just took place is millions of Americans had their privacy
hacked into. God only knows what the consequences of that are. The
other side has decided to object to proceeding with a bill that passed
through the Intelligence Committee by a vote of 14 to 1. This is
disgraceful--this is disgraceful. I tell my colleagues on the other
side of the aisle, by blocking this legislation, you are putting this
Nation in danger. By blocking this legislation, you are putting this
Nation in danger by not allowing the Senate of the United States to act
against a very real threat to our very existence.
I say this is a shameful day in the Senate. I urge the Democratic
leader to come to the floor and allow us to consider amendments, move
forward with this legislation because the security of the United States
of America is in danger.
I thank my colleagues.
I yield the floor.
The PRESIDING OFFICER. The Senator from Idaho.
____________________
[Congressional Record Volume 161, Number 125 (Tuesday, August 4, 2015)]
[Senate]
[Pages S6271-S6286]
From the Congressional Record Online through the Government Publishing Office [www.gpo.gov]
CYBERSECURITY INFORMATION SHARING ACT OF 2015--MOTION TO PROCEED--
Continued
Mr. HELLER. Mr. President, I would like to talk about personal
privacy rights for American citizens. It was just 2 months ago that the
Senate took action to restore privacy rights of American citizens
through the USA FREEDOM Act--part of action that was taken, as I
mentioned, just 2 months ago. Both Chambers of Congress and the
President agreed it was time to end the bulk collection of American's
call records pouring into the Federal Government.
I was a proud supporter of the USA FREEDOM Act and believed it was
the right thing to do on behalf of U.S. citizens. My constituents all
across Nevada--from Elko, to Reno, Ely, and Las Vegas--all understand
how important these rights are and will not accept any attempts to
diminish them. Today, I am here to continue protecting these privacy
rights and uphold our civil liberties.
Protecting privacy will always be important to Nevadans. It is
nonnegotiable to me, very important. Similar to many of my colleagues
in the Senate, I believe addressing cyber security is also important.
When I was ranking member of the commerce committee's consumer
protection subcommittee, I worked on these issues in detail. I
understand very well the impact of data breaches, cyber threats. In
fact, back in my State of Nevada, one of the top concerns is identity
theft. Not only can these identity thieves wreak financial havoc on a
consumer's life, but these threats also pose a serious national
security concern.
We saw with OPM's breach that personal information for 21.5 million
Federal employees, even those who received security clearances, was
compromised. In my office, in fact, a member of my staff was breached
three times in just the last 4 years. These thieves cross international
borders. They break and enter into private homes. They hack their way
to intrusion with a keyboard and a simple click of the mouse.
So I share the desire to find a path forward on information sharing
between the Federal Government and the private sector as another tool
in the cyber security toolbox, but I have always stood firm with these
types of efforts that they must also maintain American's privacy
rights.
The bill I see today, including the substitute amendment, does not do
enough to ensure personally identifiable information is stripped out
before sharing. That is why I filed a fix. Let's strengthen the
standard for stripping out this information. Right now, this bill says
the private sector and the Federal Government only have to strip out
personal information if they know--if they know--it is not directly
related to a cyber threat.
I would like to offer some context to that. Let's say you are pulled
over for speeding, not knowing the speed limit does not absolve you of
guilt. If your company fails to follow a Federal law or regulation, not
knowing about the law does not exempt you from the consequences of
violating it. Ignorance is no excuse under the law, so why should this
particular piece of legislation be any different?
My amendments ensure that when personal information is being stripped
out, it is because the entity reasonably believes--not knows but
reasonably believes--it is not related to a cyber threat. One of my
amendments addresses the Federal Government's responsibility to do
this, and the other addresses the private sector's responsibility to do
this.
This term ``reasonably believes''--let me repeat that--``reasonably
believes'' is an important distinction that this bill needs. It creates
a wider protection for personal information by ensuring these entities
are making an effort to take out personal information that is not
necessary for cyber security. Our friends over in the House of
Representatives already agree the private sector should be held to this
standard, which is why they included this language in the cyber
security bill which they passed. I hope to see this important
protection retained in any conference agreement should this bill move
forward.
Furthermore, in a letter to a Senator last week, DHS directly
acknowledged the importance of removing personally identifiable
information and even went so far as to say this removal will allow the
information-sharing regime to function much better. Even DHS agrees
that with this amendment it would function much better. So what it
comes down to is our Nation's commitment to balancing the needs for
sharing cyber security information with the need to protect America's
personal information.
I believe my amendment, No. 2548, to hold the Federal Government
accountable strikes that balance, and I will continue strongly pushing
forward to get this vote. I encourage my colleagues to support this
commonsense effort to strengthen this bill and keep our commitment to
upholding the rights of all U.S. citizens.
As we discuss this issue, I hope we will continue having the
opportunity to truly debate and make improvements to this bill. I
believe that if given the opportunity, we can strengthen this
legislation even more to protect against cyber security threats while
also protecting American citizens' private information.
No bill is perfect, as the Presiding Officer knows, but that is why
we are here and that is why there is an amendment process. That is why
I wish to see
[[Page S6272]]
the Senate openly debate and amend this bill, including my amendment.
The privacy rights of Americans are too important an issue and a very
important issue to all of us.
I acknowledge that some of my colleagues want the opportunity to
debate issues related to the bill and those issues that are unrelated
to the bill. I recognize there are many important issues Members would
like to see addressed before August--or at least the August recess--
such as my friend from Kentucky, who filed an amendment regarding
firearms on bases. Like my colleague, I recognize the importance of
this issue, which is why I introduced this legislation days ago. My
legislation would simply require the Secretary of Defense to establish
a process for base commanders in the United States to authorize a
servicemember to carry a concealed personal firearm while on base. Men
and women who serve our country deserve to feel safe and should be able
to defend themselves while stationed in the United States. That is why
I feel strongly that Congress should give our Nation's base commanders
the authority they need to create a safer environment for our heroes
serving across America.
At this time I recognize it is unclear if there will be an
opportunity to debate this issue on this particular piece of
legislation, but it is an important issue. Once again, I hope that as
we continue to debate this bill that we will find a path forward on all
amendments.
I appreciate the willingness of both Senator Burr and Senator
Feinstein to work with me on my amendments, and I look forward to
continuing this debate.
I yield the floor.
The PRESIDING OFFICER. The Senator from New York.
Mr. SCHUMER. Mr. President, I ask unanimous consent that the next 30
minutes be equally divided between Senators Schumer, Boxer, Whitehouse,
Markey, and Schatz.
The PRESIDING OFFICER. Is there objection?
Mr. WHITEHOUSE. Mr. President, may I ask for a modification that I be
able to speak for 1 minute on the cyber issue before we go into that 30
minutes?
With that modification, I have no objection.
The PRESIDING OFFICER. Is there objection to the request?
Without objection, it is so ordered.
Mr. WHITEHOUSE. Thank you.
Mr. President, in my 1 minute, I just wish to respond to what my
friend, the Senator from Arizona, said. We are very keen to get a good,
strong cyber security bill passed.
My concern about the amendment process is that amendments that will
strengthen the bill and make it a better cyber bill ought to have a
chance to get a vote. I have one that I worked out with Senator Graham,
who I think has good national security credentials and whom Senator
McCain respects, and another one with Senator Blunt, who also has good
national security credentials and whom I think Senator McCain also
respects. I believe both of the bills have now been cleared by the U.S.
Chamber of Commerce, so they don't have a business community objection.
But I also fear that if we followed the majority leader's proposal, he
would file cloture and they wouldn't survive a germaneness test.
So I think our leader's offer, basically, of a specific list of
amendments--none of which are ``gotcha'' amendments, all of which
relate to this bill--would be a very good way to proceed, get on the
bill, and get something passed.
The PRESIDING OFFICER. The Senator from New York.
Mr. SCHUMER. First, I thank my friend from Rhode Island. I think
there is a broad agreement--I certainly do--that we want to move to
this bill and, if given an agreement on a limited number of amendments,
all relevant to cyber security, with no intention to be dilatory, and
with time limits, we can get this done. But it is only fair on a major
bill to offer some amendments and not just to fill the tree and have no
amendments at all.
[...]