[Congressional Record Volume 161, Number 154 (Wednesday, October 21, 2015)]
[Senate]
[Page S7368]
CYBERSECURITY INFORMATION SHARING BILL
Mr. REID. Mr. President, today the Senate turns its attention to the
cybersecurity bill. It is way overdue. The bill, which is OK, is better
than nothing--let's put it that way.
The ranking member of the Intelligence Committee, Senator Feinstein,
and the chairman of that committee, Senator Burr, have worked hard on
this legislation, which addresses a serious national security issue. In
fact, it is so serious that we should have addressed this topic long
ago. We tried to. As Senate Democrats, we tried so very hard. We had a
comprehensive cybersecurity bill on the floor 3 years ago which was
much deeper and better than this one--3 years ago--but our Republican
colleagues blocked us from even debating the bill. We couldn't even
debate the bill. Why? They, the Republicans, were told the chamber of
commerce didn't like it. At about the same time, the chamber of
commerce's whole operation was hacked by the Chinese. The people who
worked down there expected things to come out in English, but they came
out in Chinese. But they didn't like the bill anyway, so they told the
Republicans to oppose it, and they marched over here and opposed it.
Democrats, however, realize cybersecurity is a serious issue. We know
how important cybersecurity is for the national security of our country
and the financial security of our economy.
Even though this bill is not our perfect bill, we are going to
cooperate with our Republican colleagues. Several months ago we reached
an agreement with Republicans to begin debating this legislation, and
now we can process it in an efficient and bipartisan manner.
Would the Chair announce the business of the day.
____________________
[Congressional Record Volume 161, Number 154 (Wednesday, October 21, 2015)]
[Senate]
[Pages S7368-S7369]
CYBERSECURITY INFORMATION SHARING BILL
Mr. McCONNELL. Mr. President, earlier this year, millions of people
were affected when the Obama administration was hit by a devastating
cyber attack. It is an attack that has been described as ``one of the
worst breaches in U.S. history,'' but it is hardly the last one we will
face.
The challenges posed by cyber attacks are real, and they are broad.
They threaten governments, businesses, and individuals. Americans see
these threats in the public sector. For instance, as reports have
indicated, the sensitive personal information of millions who purchase
insurance through ObamaCare is especially vulnerable. Americans see
these threats in the private sector as well. For instance, despite the
cyber deal recently agreed upon between China and the administration,
press reports indicate that Chinese hacking attempts on American
companies and businesses appear to be continuing unabated. Americans
also know that a cyber attack is essentially a personal attack on their
own privacy. It is violating to think of strangers digging through our
medical records and emails. It is worrying to think of criminals
accessing credit card numbers and Social Security information.
That is why the Senate will again consider bipartisan legislation to
help Americans' most private and personal information. It would do so
by defeating cyber attacks through the sharing of information. It
contains modern tools that cybersecurity experts tell us could help
prevent future attacks against both public and private sectors. It
contains important measures to protect individual privacy and civil
liberties. It has been carefully scrutinized by Senators of both
parties. In short, this legislation is strong, transparent, and
bipartisan. Republicans and Democrats joined together to pass this
legislation through committee, the administration supports it, and the
House has already passed similar legislation. With a little
cooperation, we can pass it here shortly as well.
The chair of the Intelligence Committee, Senator Burr, is working to
set votes on pending amendments and has accommodated other Senators in
the form of a substitute amendment. I wish to thank him for his hard
work on this legislation. I wish to also thank
[[Page S7369]]
the vice chair, Senator Feinstein, as well. Every Senator should want
to protect Americans' most private and personal information, which
means every Senator should want to see this bill pass. With a little
cooperation, we will.
____________________
[Congressional Record Volume 161, Number 154 (Wednesday, October 21, 2015)]
[Senate]
[Pages S7374-S7406]
From the Congressional Record Online through the Government Publishing Office [www.gpo.gov]
CYBERSECURITY INFORMATION SHARING ACT OF 2015
The PRESIDING OFFICER. Under the previous order, the Senate will
resume consideration of S. 754, which the clerk will report.
The legislative clerk read as follows:
A bill (S. 754) to improve cybersecurity in the United
States through enhanced sharing of information about
cybersecurity threats, and for other purposes.
Pending:
Burr/Feinstein amendment No. 2716, in the nature of a
substitute.
Burr (for Cotton) modified amendment No. 2581 (to amendment
No. 2716), to exempt from the capability and process within
the Department of Homeland Security communication between a
private entity and the Federal Bureau of Investigation or the
United States Secret Service regarding cybersecurity threats.
Feinstein (for Coons) modified amendment No. 2552 (to
amendment No. 2716), to modify section 5 to require DHS to
review all cyber threat indicators and countermeasures in
order to remove certain personal information.
Burr (for Flake/Franken) amendment No. 2582 (to amendment
No. 2716), to terminate the provisions of the Act after six
years.
Feinstein (for Franken) modified amendment No. 2612 (to
amendment No. 2716), to improve the definitions of
cybersecurity threat and cyber threat indicator.
Burr (for Heller) modified amendment No. 2548 (to amendment
No. 2716), to protect information that is reasonably believed
to be personal information or information that identifies a
specific person.
Feinstein (for Leahy) modified amendment No. 2587 (to
amendment No. 2716), to strike the FOIA exemption.
Burr (for Paul) modified amendment No. 2564 (to amendment
No. 2716), to prohibit liability immunity to applying to
private entities that break user or privacy agreements with
customers.
Feinstein (for Mikulski/Cardin) amendment No. 2557 (to
amendment No. 2716), to provide amounts necessary for
accelerated cybersecurity in response to data breaches.
Feinstein (for Whitehouse/Graham) modified amendment No.
2626 (to amendment No. 2716), to amend title 18, United
States Code, to protect Americans from cybercrime.
Feinstein (for Wyden) modified amendment No. 2621 (to
amendment No. 2716), to improve the requirements relating to
removal of personal information from cyber threat indicators
before sharing.
[...]
The PRESIDING OFFICER. The clerk will call the roll.
The legislative clerk proceeded to call the roll.
Mr. NELSON. Mr. President, I ask unanimous consent that the order for
the quorum call be rescinded.
[[Page S7376]]
The PRESIDING OFFICER. Without objection, it is so ordered.
Mr. NELSON. Mr. President, I will vote for the cyber security bill.
Obviously, this is a whole new era of attack on our country. On
September 11, 2001, we certainly realized that the two big oceans on
either side of our country that had protected us for centuries--the
Atlantic and the Pacific--no longer provided that protection because we
could see, in the case of 2001, an attack from within. Thus, that
revised so much of our defense strategy.
Now we see the other kind of attack from within that is stealthy,
insidious, and it is constant because the cyber attacks are coming to
the U.S. Government as well as the U.S. industry, the business
community, and U.S. citizens. The threat of cyber attack is vast and it
is varied, from cyber criminals who steal personal information such as
credit card and Social Security numbers, to foreign governments or
state-sponsored groups that steal sensitive national security
information, that steal our intellectual property, and that put at risk
our economy and critical infrastructure.
I want to give one example of obtaining Social Security numbers
through cyber attacks or through other means. What we found in Tampa,
FL, is that street crime actually subsided because the criminals had
figured that either by cyber attacks or by other means of getting
Social Security numbers, they could file false income tax returns and
request refunds. So with a laptop, they could do what they had done
previously by breaking into and entering someone's home to steal money,
and it was so much easier. And that is just one small example, but just
the theft of security numbers, which they use on false income tax
returns--we think that is an attack which is costing the U.S.
Government, in income tax, at least $5 billion a year.
We have heard all about these attacks. Some of us in the Senate have
been affected by these attacks. How many times have we heard that
hackers have stolen our names, our addresses, our credit card numbers?
Look what the hackers did to 40 million Target customers and 56 million
Home Depot customers. They accessed checking and savings account
information of 76 million J.P. Morgan Bank customers. They stole the
personal information of 80 million customers of the health insurance
company Anthem. Those are a few examples. Target, Home Depot, J.P.
Morgan, Anthem--that is just a handful of examples. Also, remember that
North Korea hacked Sony. Iran hacked the Sands Casino. China hacked the
U.S. Government Office of Personnel Management. They have your
information and they have my information because our information is
with the Office of Personnel Management.
The attacks keep coming. We are hearing from homeland security,
defense, intelligence, and private sector leaders that we have to take
this threat seriously and do something about it.
I must say that it was one of the most frustrating things for this
Senator, as a former member of the Senate Intelligence Committee, when
we were trying to pass this very same bill 3 and 4 years ago and the
business community, as represented by the U.S. Chamber of Commerce,
wanted nothing to do with it because they thought it was an invasion of
their privacy. Times have changed, and the hacking continues.
We see that finally we are able to get through and put together a
bill on which I think we can get broad support from many different
groups that are concerned about privacy and about sharing of
information in the business community. This bill provides the means for
the government and the private sector to share cyber threat information
while taking care to protect the personal information and privacy of
our people. We all face the same threat, and our adversaries use
similar malware and techniques. Sharing information is critical to our
overall cyber security.
What this does is it directs the Director of National Intelligence,
working with other agencies and building on the information sharing
that is already taking place, to put cyber threat information in the
hands of the private sector to help protect businesses and individuals.
It authorizes private companies to monitor and defend their networks
and share with each other and the government at all levels the cyber
threats and attacks--all levels of government: State, local, tribal,
and Federal. This is a point of contention because these activities are
strictly voluntary. That is part of the problem we had 3 and 4 years
ago in trying to enact this legislation. It is strictly voluntary,
limited to cyber security purposes, and subject to reasonable
restrictions and privacy protections.
The bill also creates the legal certainty and incentives needed to
promote further sharing of information.
So what the legislation does is it sets up a hub or a portal inside
the Department of Homeland Security where cyber threat information
comes in, it is scrubbed of irrelevant personal information, and then
it is shared inside and outside the government quickly and efficiently
because, after all, if you have a cyber attack somewhere in America
that suddenly has the opportunity to explode in its application, you
have to have a central point at which you can coordinate that cyber
attack. That is what this portal, this hub in the Department of
Homeland Security is set up to do.
This Senator feels that this bill balances the urgent need to address
the threat of continued cyber attacks with privacy concerns. As the
vice chair of the Intelligence Committee said yesterday, this bill is
just the first step.
I am delighted that Senator Feinstein just walked onto the floor of
the Senate. I am quoting what the Senator said yesterday: We can and we
ought to do more to improve our Nation's cyber security.
I say through the Chair to the distinguished senior Senator from
California that I have shared with the Senate my frustration over the
last 4 years, as a former member of the Senate Intelligence Committee,
that it was so hard to get people to come together. But now, finally,
even though it is voluntary, we at least have a point at which, when a
cyber attack comes somewhere in America, we can centralize that, it can
be scrubbed of private information, and then it can be shared in our
multiplicity of levels of government and the private sector to help
defend against the cyber attacks.
These cyber attacks are coming every day. They are relentless. If we
don't watch out, what is going to happen has already happened to
someone and it is going to be happening to innumerable American
businesses. I strongly urge the Senate to pass this legislation.
Since the senior Senator from California is on the floor, I wish to
take this opportunity to thank her for her perspicacity, her patience,
and her stick-to-itiveness. Finally, 4 years later, it is here, and we
are going to pass it this week. I thank the Senator from California.
Mr. President, I yield the floor.
The PRESIDING OFFICER. The Senator from California.
Mrs. FEINSTEIN. Mr. President, I would like to respond to what the
distinguished Senator from Florida said.
Senator, you know what a pleasure it was to have you on the
intelligence committee. I think you understand the time that we have
spent to get this bill done, which is now about 6 years, and to take
this first step, not because it is a perfect step but because it is a
first step that is voluntary, with new authorities that people and
companies can use if they want to, and if they don't want to, they
don't have to. If they want to, it can be effective in enabling
companies to share cyber security information and therefore protect
themselves. I know you understand this. I am so grateful for that
understanding and for your help.
Mr. NELSON. Mr. President, will the Senator yield for a question?
Mrs. FEINSTEIN. I will.
Mr. NELSON. Will the Senator share her thoughts with the Senate about
how the Nation's national security defense depends on us being able--we
have the guns, the tanks, the airplanes, the missiles, and all of that,
but there is a new type of threat against the very security of this
Nation, and this legislation is a first step.
Mrs. FEINSTEIN. I can try to. I remember that in 2008 there were two
significant cyber bank robberies: the Royal Bank of Scotland, I think
for $8 million, and Citibank for $10 million. This was not public right
away because nobody wanted it known. Then you see the more recent
attacks of Aramco
[[Page S7377]]
being taken down, Sony, and it goes on and on. The information is not
often shared publicly by companies who should be asking: This happened
to our company; can you share anything that might help us handle this?
That kind of thing doesn't happen because everybody is afraid of
liability, and so it is very concerning.
I remember when Joe Lieberman was chairman of the homeland security
committee, which had a bill. As the Senator will remember, we had the
information sharing part of that bill, and we sat down with the U.S.
Chamber of Commerce, I believe on three occasions, to try to work out
differences, and we couldn't. The U.S. Chamber of Commerce is massive
and all over the United States. It includes small businesses, medium-
sized businesses, and some big businesses, and there was deep concern
among its members. That took years to work out.
Finally, the Senate may be ready to take a first step, and this first
step is to permit the voluntary sharing of cyber information, which, if
it is stripped of private data, will be protected with liability
immunity and protected because it goes through a single DHS portal and
doesn't go directly to the intelligence community, which was a big
concern to the private community. All of this has been worked out in
order to try to come up with a basis for taking this first step.
I am sorry the Senator is no longer on our committee because my
friend was really a great asset, and Florida is lucky to have my friend
and colleague as their Senator.
This is just the beginning. All of the iterations on this cyber
legislation have been bipartisan, so that has to say something to
people. We have learned as we have done the drafting on this, and we
have very good staff who are technically proficient. So they know what
can work and what can't work.
I hope I have answered that question from the Senator from Florida.
If I can, I will go on and make some remarks on the managers'
amendment.
Yesterday Senator Burr and I spoke on this floor to describe the
Cybersecurity Information Sharing Act of 2015, which is now the pending
business. Senator Burr filed a managers' package on behalf of both of
us, and I will quickly run through that package.
This amendment is the product of bipartisan negotiations over the
past several weeks within the Intelligence Committee and with sponsors
of other amendments to the bill. The managers' amendment makes several
key changes to the bill to clarify authorization language, improve
privacy protections, and make technical changes. It also--and I think
this is of note--includes the text of 14 separate amendments. Those
amendments were offered by our colleagues and I am pleased that we are
able to add them to this legislation.
In sum, this amendment has two main components. It makes important
changes to the bill that we announced in August to address privacy
concerns about the legislation. Second, it includes several amendments
authored by our colleagues that had agreement on both sides of the
aisle. I will run through these amendments that will be part of the
managers' package, and I do so hopefully to reassure Members that these
are positive amendments.
First, it eliminates a provision on government use of cyber
information on noncyber crime. The managers' amendment eliminates a
provision in the committee-passed bill that would have allowed the
government to use cyber information to investigate and prosecute
``serious violent felonies.'' Eliminating this provision is a very
significant privacy change. We made this change because it has been a
top bipartisan concern and the provision had been used by privacy
groups to claim that this is a surveillance bill. As the chairman made
clear on the floor yesterday, it is not. One of the reasons it is not
is because it prohibits the government from using information for
crimes unrelated to cyber security.
Let me be clear. The chairman said it, and I will say it today. This
is not a surveillance bill. We have eliminated this provision and
helped, I believe, to eliminate these concerns. So, please, let us not
speak of this bill as something that it isn't.
Second, it limits the authorization to share cyber threat information
to cyber security purposes. The managers' amendment limits the
authorization for sharing cyber threat information provided in the bill
to sharing for cyber security purposes only. This is another
significant privacy change, and it has been another top bipartisan and
privacy group concern.
Third, it eliminates a new FOIA exemption. The managers' amendment
eliminated the creation of a new exemption in the Freedom of
Information Act specific to cyber information that was in the
committee-passed bill. Cyber threat indicators and defensive measures
shared in accordance with the bill's procedures would still be eligible
for existing FOIA exemptions, but it doesn't add new ones.
Four, it ensures that defensive measures are properly limited. The
bill allows a company to take measures to defend itself, as one might
expect, and the managers' amendment clarifies that the authorization to
employ defensive measures does not allow an entity to gain unauthorized
access to a computer network.
Five, it includes the Secretary of Homeland Security as coauthor of
the government-sharing guidelines. The managers' amendment directs both
the Attorney General and the Secretary of Homeland Security, rather
than solely just the Attorney General, to develop policies and
procedures to govern how the government quickly and appropriately
shares information about cyber threats. That should be a no-brainer.
Six, it clarifies exceptions to the Department of Homeland Security's
so-called portal. The managers' amendment clarifies the types of cyber
information sharing that are permitted to occur outside the DHS portal
created by the bill. Specifically, the bill narrows communications
outside of the Department of Homeland Security portal regarding
previously shared cyber threat information.
Seven, it requires procedures for notifying U.S. persons whose
personal information has been shared by a Federal entity in violation
of the bill. The managers' amendment adds a modified version of Wyden
amendment No. 2622, which requires the government to write procedures
for notifying U.S. persons whose personal information is known or
determined to have been shared by the Federal Government in a manner
inconsistent with this act.
Eight, it clarifies the real-time automated process for sharing
through the DHS portal. Here the managers' amendment adds a modified
version of the Carper amendment No. 2615, which clarifies that there
may be situations under which the automated real-time process of the
DHS portal may result in very limited instances of delay, modification
or other action due to the controls established for the process. The
clarification requires that all appropriate Federal entities agree in
advance to the filters, fields or other aspects of the automated
sharing system before such delays, modifications or other actions are
permitted.
Senator Carper has played a very positive role on this issue. He is
the ranking member on the homeland security committee. He sat down with
both Senator Burr and me earlier this year. He has proposed some very
good changes, and this is one of them, which is in the managers'
package.
Also, the clarification ensures that such agreed-upon delays will
apply across the board uniformly to all appropriate Federal entities,
including the Department of Homeland Security.
This was an important change for both Senator Carper and Senator
Coons and for the Department of Homeland Security. I am pleased we were
able to reach agreement on it. Essentially, it will allow a fast real-
time filter--and I understand this can be done--that will do an
additional scrub of information going through that portal before the
cyber information goes to other departments to take out anything that
might be related to personal information, such as a driver's license
number, an account, a Social Security number or whatever it may be. DHS
believes they can put together the technology to be able to do that
scrub in as close to real time as possible.
This should be very meaningful to the privacy community, and I really
hope it is meaningful because I want to believe that their actions are
not just to try to defeat this bill, but that their actions really are
to make the bill better. If I am right, this is a very important
addition.
[[Page S7378]]
Again, I thank Senator Carper and Senator Coons, and I also thank the
chairman for agreeing to put this in.
Nine, it clarifies that private entities are not required to share
information with the Federal Government or another private entity. This
is clear now. This amendment adds the Flake amendment No. 2580, which
reinforces this bill's core voluntary nature by clarifying that private
entities are not required to share information with the Federal
Government or another private entity.
In other words, if you don't like the bill, you don't have to do it.
So it is hard for me to understand why companies are saying they can't
support the bill at this time. There is no reason not to support it
because they don't have to do anything. There are companies by the
hundreds, if not thousands, that want to participate in this, and this
we know.
Ten, it adds a Federal cyber security enhancement title. The
managers' amendment adds a modified version of another Carper
amendment, which is No. 2627, the Federal Cybersecurity Enhancement Act
of 2015, as a new title II of the cyber bill. The amendment seeks to
improve Federal network security and authorize and enhance an existing
intrusion detection and prevention system for civilian Federal
networks.
Eleventh, we add a study on mobile device security. The managers'
amendment adds a modified version of the Coats amendment No. 2604,
which requires the Secretary of Homeland Security to carry out a study
and report to Congress on the cyber security threats to mobile devices
of the Federal Government.
I wish to thank Senator Coats, who is a distinguished member of the
Intelligence Committee and understands this bill well, for this
amendment.
Twelfth, it adds a requirement for the Secretary of State to produce
an international cyber space policy strategy. The managers' amendment
adds Gardner/Cardin amendment No. 2631, which requires the Secretary of
State to produce a comprehensive strategy focused on United States
international policy with regard to cyber space.
It is about time we do something like this. I am personally grateful
to both Senators Gardner and Cardin for this amendment.
Thirteenth, the managers' amendment adds a reporting provision
concerning the apprehension and prosecution of international cyber
criminals. The managers' amendment adds a modified version of Kirk-
Gillibrand amendment No. 2603, which requires the Secretary of State to
engage in consultations with the appropriate government officials of
any country in which one or more cyber criminals are physically present
and to submit an annual report to appropriate congressional committees
on such cyber criminals.
It is about time that we get to the point where we can begin to make
public more about cyber attacks from abroad because it is venal, it is
startling, it is continuing, and in its continuation, it is growing
into a real monster. Let there be no doubt about that.
Fourteenth, it improves the contents of the biennial report on
implementation of the bill. The managers' amendment adds a modified
version of the Tester amendment No. 2632, which requires detailed
reporting on, No. 1, the number of cyber threat indicators received
under the DHS portal process--good, let's know--and, No. 2, the number
of times information shared under this bill is used to prosecute
certain cyber criminals. If we can catch them, we should. We should
know when prosecutions are made. Then, No. 3 is the number of notices
that were issued, if any, for a failure to remove personal information
in accordance with the requirements of this bill.
Mr. President, I am spending a great deal of time on these details
because there are rumors beginning to circulate that the bill does this
or does that, which are not correct. This managers' package is a major
effort to encapsulate what Members on both sides had concerns about.
And I think the numbers of Republican and Democratic amendments that
are incorporated are about equal.
Fifteenth, this managers' amendment improves the periodic sharing of
cyber security best practices with a focus on small businesses. The
managers' amendment adds the Shaheen amendment No. 2597, which promotes
the periodic sharing of cyber security best practices that are
developed in order to assist small businesses as they improve their
cyber security.
I think this is an excellent amendment and Senator Shaheen should be
commended.
Sixteenth, the managers' amendment adds a Federal cyber security
workforce assessment title. The managers' amendment adds Bennet-Portman
amendment No. 2558, the Federal Cybersecurity Workforce Assessment Act,
as a new title III to this bill. The title addresses the need to
recruit a highly qualified cyber workforce across the Federal
Government.
There are just a few more, but, again, I do this to show--and the
chairman is here--that we have listened to the concerns from our
colleagues and we have tried to address them, so nobody should feel we
are ramming through a bill and that we haven't considered the views
from others. The managers' amendment is, in fact, a major change to the
bill that reflects this collegial--sometimes a little more exercised,
but collegial--discussion. Does the chairman agree?
Mr. BURR. Mr. President, I appreciate the opportunity to say that I
totally agree. The vice chairman and I have worked aggressively for the
entirety of the year where we had differences, and we found ways to
bridge those differences, where we heard from Members, where we heard
from associations, where we heard from businesses. We worked with them
to try to accommodate their wishes, as long as it stayed within the
spirit of what we were trying to accomplish, which is information
sharing in a voluntary capacity.
The vice chair and I came to the floor yesterday and said if an
amendment--if an initiative falls outside of that, then we will stand
up and oppose it because we understand the role this legislation should
play in the process.
The vice chairman said this is the first step. I don't want to scare
Members, but there are some other steps. We are not sure what they are
today or we would be on the floor suggesting those, but if we can't
take the first step, then it is hard to figure out what the next and
the next and the next are. So I am committed to continuing to work with
the vice chairman and, more importantly, with all Members to
incorporate their great suggestions as long as we all stay headed in
the same direction, and I know the vice chairman and I are doing that.
Mrs. FEINSTEIN. Mr. President, I thank the chairman very much. If I
may, through the Chair, I want the chairman to know how much I
appreciate this tack he has taken to be flexible and willing throughout
this process, which extends into this managers' package. So I believe--
I truly believe--what we have come up with in this managers' package
and what Members have contributed to it makes it a better cyber bill. I
know the chairman feels the same way. We can just march on shoulder to
shoulder and hopefully get this done.
I will finish up the few other items I have to discuss because I want
people who have concerns to listen to what is being said because these
changes have a major impact on the bill.
Next, No. 17 establishes a process by which data on cyber security
risks or incidents involving emergency response information systems can
be reported. The managers' amendment adds Heitkamp amendment No. 2555,
which requires the Secretary of Homeland Security to establish a
process by which a statewide interoperability coordinator may report
data on any cyber security risk or incident involving emergency
response information systems or networks. This is a process for
reporting, and certainly we need to know more.
Next, No. 18 requires a report on the preparedness of the health care
industry to respond to cyber security threats, and the Secretary of
Health and Human Services to establish a health care industry cyber
security task force. The managers' amendment adds Alexander-Murray
amendment No. 2719. This is a reporting requirement to improve the
cyber security posture of the health care industry.
I don't think anyone wants to have their health care data hacked
into. This is deeply personal material and it should be inviolate.
[[Page S7379]]
The provision requires the Secretary of Health and Human Services to
submit a report to Congress on the preparedness of the health care
industry to respond to cyber security threats. If we really want to
help protect health care information, we have to know what is going on,
and that is what this amendment enables. It also requires the Secretary
to establish a health care industry cyber security task force.
Next is No. 19, which requires new reports by inspectors general. The
managers' amendment adds a modified version of the Hatch amendment No.
2712, which requires relevant agency inspectors general to file reports
with appropriate committees on the logical access standards and
controls within their agencies.
Let's know what standards and what controls they have. I think it is
a very prudent request of the Senator from Utah, and I am glad we were
able to include it.
Next is No. 20, which adds a requirement for the DHS Secretary to
develop a strategy to protect critical infrastructure at the greatest
risk of a cybersecurity attack. The managers' amendment adds the
Collins amendment No. 2623, which requires DHS to identify critical
infrastructure entities at the greatest risk of a catastrophic cyber
security incident.
This is where we have had a number of concerns recently. The
chairman's staff and my staff are working on this. Remember, this is a
voluntary bill, and we do not want any language that might be
interpreted to imply that this is not a voluntary bill. I know Senator
Collins has a lot of knowledge of this area, and I believe we are going
to be able to work this out.
This amendment does not convey any new authorities to the Secretary
of Homeland Security to require that critical infrastructure owners and
operators take action, nor does it mandate reporting to the Federal
Government. Its intent, which I applaud, is for the government to have
a better understanding of those critical infrastructure companies that,
if hacked, could cause extremely significant damage to our Nation.
In conclusion, I would like to thank my colleagues for their
thoughtful and helpful amendments. I am pleased that we have such a
fulsome managers' package. I believe this managers' package strengthens
our bill. It adds important clarifications, including meaningful
privacy protections, it does not do operational harm, and it further
improves the strong bill that the Intelligence Committee passed by a
strong vote of 14 to 1 earlier this year.
I wanted to do this so that all Members know what is in the managers'
package, and both the chairman and I believe that these additions are
in the best interests of making a good bill even better.
I thank the Presiding Officer, and I yield the floor.
The PRESIDING OFFICER (Mr. Sasse). The Senator from Alaska.
Mr. SULLIVAN. Mr. President, I wish to acknowledge the remarks of the
distinguished Senator from California and the Senator from North
Carolina, and I thank them for their important work on the cyber bill.
I know we are going to be discussing a lot of that, and why it is
important to our national security.
[...]
Amendment No. 2612, as Modified
Mrs. FEINSTEIN. Mr. President, I call for the regular order with
respect to the Franken amendment No. 2612.
The PRESIDING OFFICER. The amendment is now pending.
Amendment No. 2612, as Further Modified
Mrs. FEINSTEIN. Mr. President, I ask that the amendment be further
modified to correct the instruction line in the amendment.
The PRESIDING OFFICER. The amendment is so further modified.
The amendment, as further modified, is as follows:
Beginning on page 4, strike line 9 and all that follows
through page 5, line 21, and insert the following:
system that is reasonably likely to result in an unauthorized
effort to adversely impact the security, availability,
confidentiality, or integrity of an information system or
information that is stored on, processed by, or transiting an
information system.
(B) Exclusion.--The term ``cybersecurity threat'' does not
include any action that solely involves a violation of a
consumer term of service or a consumer licensing agreement.
(6) Cyber threat indicator.--The term ``cyber threat
indicator'' means information that is necessary to describe
or identify--
(A) malicious reconnaissance, including anomalous patterns
of communications that appear to be transmitted for the
purpose of gathering technical information related to a
cybersecurity threat or security vulnerability;
(B) a method of defeating a security control or
exploitation of a security vulnerability;
(C) a security vulnerability, including anomalous activity
that appears to indicate the existence of a security
vulnerability;
(D) a method of causing a user with legitimate access to an
information system or information that is stored on,
processed by, or transiting an information system to
unwittingly enable the defeat of a security control or
exploitation of a security vulnerability;
(E) malicious cyber command and control;
(F) the harm caused by an incident, including a description
of the information exfiltrated as a result of a particular
cybersecurity threat;
(G) any other attribute of a cybersecurity threat, if
disclosure of such information is not otherwise prohibited by
law; or
Mrs. FEINSTEIN. Thank you.
The PRESIDING OFFICER. The Senator from North Carolina.
Amendment No. 2581, as Modified
Mr. BURR. Mr. President, I call for the regular order with respect to
the Cotton amendment No. 2581.
The PRESIDING OFFICER. The amendment is now pending.
The Senator from Louisiana.
[...]
Mr. GRASSLEY. Mr. President, I rise to express my strong support for
the
[[Page S7384]]
bill before the Senate, S. 754, the Cybersecurity Information Sharing
Act, and I want to thank the bill's managers for their leadership in
drafting this bill and putting a lot of hard work into the bill.
Cyber security challenges that threaten us are very real challenges.
We receive almost daily reminders of the importance of effective cyber
security to protect our private data and the safety and security of the
entire Nation from cyber attacks. These attacks have compromised the
personal information of so many Americans as well as sensitive national
security information. That national security issue might even be the
biggest of the ones we hope to deal with.
The legislation before us will encourage the government and the
private sector to work together to address these cyber security
challenges. This bill helps create a strong legal framework for
information sharing that will help us respond to these threats. The
bill authorizes private companies to voluntarily share cyber threat
information with each other and with the government. In turn, the bill
permits the government to share this type of information with private
entities.
The bill reduces the uncertainty and, most importantly, the legal
barriers that either limit or prohibit the sharing of cyber threat
information today. At the same time, the bill includes very significant
privacy protections to strike a balance between maintaining security
and protecting our civil liberties. For example, it restricts the
government from acquiring or using cyber threat information except for
limited cyber security purposes.
So, as I did at the beginning, I want to salute the leadership of the
chair and vice chair of the Select Committee on Intelligence, Senator
Burr and Senator Feinstein, for their efforts on this bill. I know from
the last couple of Congresses that this type of legislation isn't easy
to put together. In the 112th Congress, I cosponsored cyber security
legislation along with several of my colleagues. This involved working
across several committees of jurisdiction. Last Congress, as then-
ranking member of the Judiciary Committee, I continued to work with the
Select Committee on Intelligence and others on an earlier version of
this bill. Unfortunately, Democratic leadership never gave the Senate
an opportunity to debate and to vote on that bill in the last Congress.
Senators Burr and Feinstein were undaunted, however, and this
Congress they diligently worked and continued to seek input from
relevant committees of jurisdiction, including the Judiciary Committee
that I chair. They incorporated the views of a broad range of Senators
and worked to address the concerns of stakeholders outside of the
Congress. This has produced their managers' amendment.
This is a bill that enjoys broad bipartisan support. As with most
pieces of legislation that come before the Senate, it is not a perfect
piece of legislation from any individual Senator's point of view, but
in finding common ground, it has turned out to be a good bill that
addresses a very real problem.
It is time for us to do our job and to vote. This is how the Senate
is supposed to work. Now is the time for action because the question
isn't whether there will be another cyber attack, the question is when
that attack will happen.
I yield the floor.
I suggest the absence of a quorum.
The PRESIDING OFFICER. The clerk will call the roll.
The legislative clerk proceeded to call the roll.
Mr. BURR. Mr. President, I ask unanimous consent that the order for
the quorum call be rescinded.
The PRESIDING OFFICER. Without objection, it is so ordered.
Mr. BURR. Mr. President, I am here to briefly talk on S. 754, the
cyber security bill. Yesterday Vice Chairman Dianne Feinstein and I
came to the floor and encouraged our Members who had amendments or who
had an interest in debating the bill to come to the floor. It was my
hope that we could finish in a couple of days with the cooperation of
Members. We have not gotten that level of cooperation. Therefore, this
will take several more days to finish. But it doesn't lessen the
importance for those Members who have amendments in the queue--meaning
they are pending--to come to the floor and talk about their amendments
if they would like to. At some point, we will culminate this process,
and those amendments that have yet to be disposed of will have votes
with a very limited amount of debate time included.
It is my hope that we will have a wholesome debate and that people
will have an opportunity to know what is in this bill if they don't
today. But more importantly, through that debate we are able to share
with the American people why a cyber security bill is so important and,
more importantly, why we have done it in a way that we think it will be
embraced and endorsed by not just corporate America but by individuals
throughout the country.
Let me announce today that this bill will be done either Monday
evening or Tuesday morning based upon what the leadership on both sides
can agree to as it relates to the debate. The Vice Chair and I also
came to the floor and we made this statement: We have worked
aggressively in a bipartisan way to incorporate in the managers'
package, which is currently pending, 14 amendments, and 8 of those
amendments were included in the unanimous consent agreement made
earlier this year when we delayed consideration of the bill until the
day when we moved forward. There were several amendments on which we
weren't able to reach an agreement or that we believed changed the
policy significantly enough that this was not just an information
sharing bill that was voluntary for corporations throughout this
country. In the absence of being able to keep this bill intact in a way
that we thought we needed to, the Vice Chairman and I have agreed to
lock arms and to be opposed to those additional amendments.
Having said that, the debate to date has focused on the fact that
there are technology companies across this country that are opposed to
this bill. Yesterday the Vice Chairman and I repeatedly reminded our
colleagues and the American people that this is a voluntary bill. There
is nothing mandatory in it. The reality is that if you don't like what
is in this, if for some reason you don't want to participate in what I
would refer to as a community watch program--it is real simple; it is
voluntary--do not participate. Choose not to inform the Federal
Government when hackers have penetrated your system and stolen personal
data out of it. Just choose not to tell us. But do not ruin it for
everybody else. In a minute I am going to go through again why I think
the cyber security bill should become law, why I think this is the
first step of how we protect the personal data of the American people,
and why hundreds, if not thousands, of businesses support this
information sharing bill. But I can't stress that enough for those who
oppose this. Most of them are, in fact, companies that hold the most
private data in the world. Let me say that again. Those who are
expressing opposition to this bill hold the largest banks of personal
data in the world.
The decision as to whether they are for the bill or against the bill
is their decision. The decision whether they utilize this voluntary
program to further protect the personal data that is in their system is
between them and their customers. But I have to say that it defies
reason as to why a company that holds that much personal data wouldn't
at least like to have the option of being able to partner with the
Federal Government in an effort to minimize data loss, whether it is at
their company or whether it is in their industry sector or whether it
is in the global economy as a whole.
The last time I checked, the health of U.S. businesses was reliant on
the health of the U.S. economy, and the health of the U.S. economy is
affected by the health of the global economy. I know the Presiding
Officer understands that because he was in business like I was for 17
years.
It really does concern me that one could be opposed to something that
insulates the U.S. economy from having an adverse impact by the cyber
security act and believes that they are OK even though it might tank
the U.S. economy.
At the end of the day, I want to try to put this in 101 terms, the
simplest terms of what the information sharing bill does. I am going to
break it into three baskets. It is about business to
[[Page S7385]]
business. This bill allows a company that has been hacked--where
somebody has penetrated their computer system and has access to their
data--to immediately pick up the phone and call their competitor and
ask their competitor whether they have had a similar penetration of
their system.
It is only reasonable to expect that the first person you would go to
is a company that has a business that looks exactly like yours. In that
particular case, this legislation provides that company with protection
under the anti-trust laws. Anti-trust forbids companies from
collaborating together. What we say is that if it has do with
minimizing the loss of data, we want to allow the collaboration of
competitors for the specific reason of discussing a cyber attack.
The Senate recognizes I have designed something in this that doesn't
require a corporate lawyer to sit in the room when the decision is
made. I have no personal dislike for lawyers other than the fact that
they slow things down. To minimize the loss of data means you have to
have a process that goes in real time from the bottom of the chain all
the way to the decisionmaking and the communication back down, not only
to that business, but to the entire economy. Having a lawyer that has
to think whether we can legally do this defeats the purpose of trying
to minimize data loss. So we give them a blanket exemption under the
anti-trust laws so they know up front that they can pick up the phone
and call their competitor, and there is no Justice Department that will
come down on them as long as they confine it to the discussion of cyber
attack.
At the same time we initiate what I call business to government,
which means that when the IT department is talking to their competitor,
the IT department can put out a notification through the Federal portal
that they have been attacked, and that initiates the exchange of a
limited amount of information that has been predetermined by everybody
in the Federal Government who needs to do the forensics of who
attacked, what tool they used, and what defensive mechanism could be
put up in the way of software that would eliminate the breach.
In the statute we have said, one, you can't transmit personal data
unless it is absolutely crucial to understanding the forensics of the
attack. We have also said in statutory language to the government
agencies: If for some reason personal data makes it through your
filters, you cannot transmit that personal data anywhere else within
the Federal Government or to the public.
We have gone to great lengths to make sure that personal data is not
disclosed through the notification process of a hack. I understand that
the personal data has already been accessed by the individual who
committed the act, but we want to make sure that the government doesn't
contribute to the distribution of that data.
In order to create an incentive in a voluntary program for a business
to initiate that notification to the Federal Government, we provide
liability protection. Anytime a company allows personal data or data on
their business to get out, there could potentially be a shareholder's
suit. What we do is provide a blanket liability protection to make sure
that a company can't be sued for the government notification of a
security breach where data has been removed and it is in the best
interest of the government to know it, to react to it, and for the
general population of businesses in America to understand it.
So we have business-to-business collaboration with your competitor,
anti-trust protection, business-to-government liability protection, no
personal data transmitted, and the last piece is government to
business.
It is hard for me to believe that the government didn't have the
statutory authority to convey to businesses across America when a cyber
attack is in progress. The Federal Government has to be asked to come
in and typically will be asked by the company that has been attacked,
but how about their competitors? How about the industry sector? How
about the whole U.S. economy? There is no authority to do that. This
bill creates the authority in the Federal Government to receive that
information from a company that has been penetrated, to process it, to
understand who did it, to understand the attack tool they used, to
determine the defensive mechanism of software that it can be put on,
and then to notify American businesses that there is an attack
happening now, and here is the attack tool and software you can buy off
the shelf and put on your computer system to protect you. That is it.
That is the entire information sharing bill, and it is voluntary.
I will touch on eight items very briefly. Why is there a need for
cyber legislation? I don't want to state the obvious, but we have
already seen that individuals and nation states penetrate the private
sector and steal personal data, and the Federal Government can steal
personal data. I thought it would hit home with my colleagues when the
Office of Personnel Management was breached, and now we are up to 22 to
24 million individuals who were compromised. More importantly, the
personal data at OPM extended to every individual who had ever applied
for a security clearance, who had ever been granted security clearance,
and who had security clearances and are now retired, but for some
reason that application remained in the database. That application,
which consists of 18 pages, has the most personal information one can
find. It lists your parents and their Social Security numbers, your
brothers, your sisters, where you lived since you graduated from
college. It even has a page that asks you to share the most obvious way
that someone might blackmail you. It has probably some of the most
damaging personal information that one can have breached.
Cyber attacks have harmed multiple U.S. companies. If this weren't
serious, would the President of China and the President of the United
States, when they met several weeks ago, have come to an agreement
about how they would intercede if one country or the other commits a
cyber attack against each other? Probably not.
Our bill is completely voluntary, and I think it is safe to say that
those who want to share data can, in fact, share data on this.
I mentioned the words ``real time.'' What we want to do is create a
real-time system because we want a partnership. We want a partnership
with other private companies and we want a partnership with the private
and public sector, and you can't get a partnership by mandating it. All
you can get is an adversarial relationship. We maintain that voluntary
status in the hope that the sharing of that information is, in fact,
real time. We can control--once you transmit to the Federal
Government--how to define ``real time.'' I have no control over a
private company's decision once they know they have been breached to
the point that they actually make a notification to the Federal
Government, but with the liability protection and anti-trust coverage,
we are convinced that we are structured from the beginning to create an
incentive for real time to take place.
We protect personal privacy. Many have come to the floor and have
suggested that this is a surveillance bill. Let me say to my colleagues
and to the American people: There is no capability for this to become a
surveillance bill. The managers' amendment took those items that people
were concerned with and eliminated it. We can be accused of a lot of
things, but to accuse this of being a surveillance bill is either a
sign of ignorance or a sign that one is being disingenuous. It is not a
surveillance bill. Be critical of what we are attempting to do, be
critical of what we do, but don't use the latitude to suggest that this
is something that it is not.
We require private companies and the government to eliminate any
irrelevant personal, identifiable information before sharing the cyber
threat indicators or putting up defensive mechanisms.
This bill does not allow the government to monitor private networks
or computers. It does not let government shut down Web sites or require
companies to turn over personal information.
This bill does not permit the government to retain or use cyber
threat information for anything other than cyber security purposes,
identifying a cyber security threat, protecting individuals from death
or serious bodily or economic harm, protecting minors, or investigating
limited cyber crime offenses.
This bill provides rigorous oversight and requires a periodic
interagency inspector general's report to assess
[[Page S7386]]
whether the government has violated any of the requirements in this
bill. The report also will assess any impact this bill may have on
privacy and civil liberties. In the report, we require the IG to report
to us whether anybody does anything outside what the statute allows
them to do, but we also ask the IG to make a gut call on whether we
have protected privacy and civil liberties.
Finally, our managers' amendment has incorporated an additional
provision to enhance privacy protections first. Our managers' amendment
omitted the government's ability to use cyber information to
investigate and prosecute serious and violent felonies. Let me raise my
hand and say I am guilty. I felt very strongly that that should have
been in the bill. If we find during an investigation that an individual
has committed a felony that is not related to a cyber attack, I thought
we should turn that information over to law enforcement but, no, we
dropped it. I don't want there to be any question as to whether this is
an effective cyber information sharing bill.
Our managers' amendment limited cyber threat information sharing
authorities to those items that are shared for cyber security purposes.
Both of these changes ensure that nothing in our bill reaches beyond
the focus of cyber security threats that are intended to prevent and
deter an attack, and nothing in this bill creates any potential for
surveillance authorities.
Now, as I said, despite rumors to the contrary, this bill is
voluntary. It is a voluntary threat indicator to share with authorities
and does not provide in any way for the government to spy on or use
library and book records, gun sales, tax records, educational records,
or medical records. There is something in that for every member of
every State.
I can honestly look at my librarians and say we haven't breached the
public libraries' protection of personal data. I will say librarians
are not fans of this legislation. I don't think they have read the
managers' amendment that spells out the concerns we heard and then
said: This can't go there. I am not sure we can statutorily state it
any clearer than what we have done.
Given that cyber attackers have hacked into, stolen, and publicly
disclosed so much private, personal information, it is astounding to me
that privacy groups would oppose this bill. It has nothing to do with
surveillance, and it seeks to protect private information from being
stolen.
There are no offensive measures. This bill ensures that the
government cannot install, employ or otherwise use cyber security
systems on private sector networks. In other words, no one can hack
back into another computer, even if the purpose is to protect against
or squash a cyber attack. It can't be done. It is illegal.
The government cannot retain or use cyber threat information for
anything other than cyber security purposes, including preventing,
investigating, disrupting, and prosecuting limited cyber crimes,
protecting minors, and protecting individuals from death or serious
bodily harm, or economic harm.
The government cannot use cyber threat information in regulatory
proceedings. Let me state that again. The government cannot use cyber
threat information in regulatory proceedings. If somebody believes this
is not voluntary and that there is some attempt to try to get a
mandatory hook in here where regulators can turn around and bypass the
legislative responsibility of the Congress of the United States, let me
just say, we are explicit. It cannot be done. But we are also explicit
that the government cannot retain this information for anything other
than the list of items I discussed. This provides focused liability
protection to private companies that monitor their own systems and
share cyber threat indicators and defensive mechanisms in accordance
with the act, but the liability protection is not open-ended. This
doesn't provide liability protection for a company that engages in
gross negligence or willful misconduct. I am not a lawyer, but I have
been told that ties it up pretty tightly; that it makes a very small,
narrow lane that companies can achieve liability protection, and that
lane means they are transferring that information to the Federal
Government.
Last, independent oversight. This bill provides rigorous oversight.
It requires a periodic interagency inspector general's report to assess
whether the government has violated any of the requirements of this
act. The report also will assess any impact that this bill may have on
privacy and civil liberties as well as an assessment of what the
government has done to reduce any impact.
This bill further requires an independent privacy and civil liberties
oversight board to assess any impact this bill may have on privacy and
civil liberties and is, in fact, reviewed internally by an inspector
general. The inspector general checks to make sure they live by the
letter of the law. The inspector general makes an assessment on the
privacy and civil liberties, and we set up an independent board to look
at whether, in fact, privacy and civil liberties have been protected.
I say to my colleagues, if there is more that they need in here, tell
us what it is. The amendment process is open.
Here is where we are. Privacy folks don't want a bill, period. Some
Members don't want a bill, period. I get it. I am willing to adapt to
that. I only need 60 votes for this to pass, and then I have to
conference it with the House that has two different versions. Then I
have to go to the other end of Pennsylvania Avenue, and I have to
convince the President and his whole administration to support this
bill. Let me quote the Secretary of the Department of Homeland
Security. They support this bill. The National Security Council
tomorrow is going to come out in support of this bill. Why? Because
most people recognize the fact that we need this, that this is the
responsible thing to do. This is why Congress was created.
If, in fact, there are those who object, don't participate. I say to
those businesses around the country, I am not going to get into your
decisionmaking, although I think it is flawed. You hold most of the
personal data of any companies out there. Yet you don't want to see any
coordinated effort to minimize data loss in the U.S. economy. I think
that is extremely shortsighted. I think your customers would disagree
with you, but the legislation was written in a way that allows you to
opt out and to say: I don't want to play in this sandbox.
I say to my colleagues and to the American people: Is that a reason
for us not to allow the thousands of companies that want to do it,
representing hundreds of thousands and millions of customers who want
to protect their credit card number, their health records, all the
personal data that is out there on them--if they want to see that
protected, should they not have that done because some companies say
they don't want to play? No. We make it voluntary, and we allow them to
opt out. They can explain to their customers why. If I am with another
tech company and they are participating in this, they must be more
interested in protecting my data. I think it is a tough sell myself as
a guy in business for 17 years.
I know what is up here. Some are looking at this as a marketing tool.
They are going to go out and say: We don't participate in transferring
data to the Federal Government. Oh, really. Wait until the day you get
penetrated. Wait until the day they download all of that personal
information on all of your customers. You are going to be begging for a
partnership with the Federal Government. Then we are going to extend it
to you, whether you liked it or not, whether you voted for the bill or
supported the bill or spoke in favor of the bill or ever participated
in it. If we pass this bill, which I think we will, they will have an
opportunity to partner with the Federal Government and to do it in an
effective way. In the meantime, I think there will be just as many
businesses using a marketing tool that says: We like the cyber
information sharing bill, and if we ever need to use it, we are looking
forward to partnering with the Department of Homeland Security, the
FBI, and the National Security Agency because we want to minimize the
exposure of the loss of data our customers could have.
Mark my words. There is a real battle getting ready to brew here.
Again, putting on my business hat, I like the idea of being able to go
out and sell the fact that I am going to partner if something happens
much better than selling
[[Page S7387]]
the pitch that I am going to do this alone. Think about it. A high
school student last week hacked the personal email account of the
Secretary of the Department of Homeland Security and the Director of
the CIA. This is almost ``Star Trek.'' ``Beam me up, Scotty.''
There are people who believe that this is just going to go away. It
is not going away. Every day there is an attempt to try to penetrate a
U.S. company, an agency of the Federal Government for one reason: to
access personal data. The intent is there from individuals and from
nation states. For companies that think this is going to go away or
think they are smart enough that it is not going to happen to them, I
have seen some of the best and they are one click away from somebody
downloading and entering their system and that click may not be
protected by technology. It may be the lack of ability of an employee
to make the right decision on whether they open an email, and, boom,
they have just exposed everybody in their system.
So I will wrap up because I see my good friend and colleague Senator
Wyden is here. We will have several days, based upon the process we
have in front of us, to talk about the good, and some will talk about
the bad, which I don't think exists, but let me assure my colleagues
that the ugly part of this--the ugly part of this--is that cyber theft
is real. It doesn't discriminate. It goes to where the richest pool of
data is. In the case of the few companies that are not supportive of
this bill, they are the richest depositories of personal data in the
world. I hope they wake up and smell the roses.
I yield the floor.
The PRESIDING OFFICER (Mr. Scott). The Senator from Oregon.
Mr. WYDEN. Mr. President, I would like to inform my colleague, the
distinguished chairman of our Intelligence Committee, I am always
thinking about the history of the committee. I believe Chairman Burr,
the ranking minority member Senator Feinstein, and I have been on the
Intelligence Committee almost as long as anybody in history.
I always like to work with my colleague. This is an area where we
have a difference of opinion. I am going to try to outline what that is
and still try to describe how we might be able to work it out.
Mr. BURR. May I thank my colleague?
Mr. WYDEN. Of course.
Mr. BURR. Mr. President, I thank my colleague. I think he
diplomatically referred to me as old, but I know that wasn't the case.
He is exactly right. We have served together for a long time. We agree
on most issues. This is one that we disagree on, but we do it in a
genuine and diplomatic way. Contrary to maybe the image that some
portray to the American people, we fight during the day and we can have
a drink or go to dinner at night, and we are just as likely to work on
a piece of legislation together next week. So that is what this
institution is and it is why it is so great.
Mr. WYDEN. Well said. There is nothing better than having Carolina
barbecue unless it is Oregon salmon. Yes, we old jocks, former football
players and basketball players, we have tough debates and then we go
out and enjoy a meal.
Here is how I would like to start this afternoon. The distinguished
chairman of the committee is absolutely correct in saying that cyber
security is a very substantial problem. My constituents know a lot
about that because one of our prominent employers, SolarWorld, a major
manufacturer in renewable energy, was hacked by the Chinese simply
because this employer was trying to protect its rights under trade law.
In fact, our government indicted the People's Liberation Army for their
hacking into this major Oregon employer. So no question that cyber
security is a major problem.
Second, there is no question in my mind that information sharing can
be very valuable in a number of instances. If we know, for example,
someone is associated with hackers, malware, this sort of thing, of
course it is important to promote that kind of sharing. The difference
of opinion is that I believe this bill is badly flawed because it
doesn't pass the test of showing that when we share information, we
have to have robust privacy standards or else millions of Americans are
going to look up and they are going to say that is really not cyber
security. They are going to say it is a surveillance bill. So that is
what the difference of opinion is.
Amendment No. 2621, as Modified
Let me turn to how I have been trying to improve the legislation. I
am going to speak for a few minutes on my amendment No. 2621 to the
bill that we have been discussing and that is now pending in the
Senate. Obviously, anybody who has been watching the debate on this
cyber security bill has seen what we would have to call a spirited
exchange of views. Senators are debating the substance of the
legislation and, as I just indicated to Chairman Burr and I have
indicated to ranking minority member Senator Feinstein, there is
agreement on a wide variety of points and issues.
Both supporters and opponents of the bill agree that sharing
information about cyber security threats, samples of malware,
information about malicious hackers, and all of this makes sense and
one ought to try to promote more of it. Both supporters and opponents
now agree that giving corporations immunity from customer lawsuits
isn't going to stop sophisticated attacks such as the OPM personnel
records breach.
I am very glad that there has been agreement on that point recently,
because proponents of the bill sometimes said that their legislation
would stop hacks such as the one that took place at OPM. When
technologists reviewed it, that was clearly not the case, and the claim
has been withdrawn that somehow this bill would prevent hacks like we
saw at OPM.
The differences of opinion between supporters and opponents of the
bill--who do agree on a variety of these issues--surround the likely
privacy impact of the bill. Supporters have essentially argued that the
benefits of this bill, perhaps, are limited--particularly now that they
have withdrawn the claim that this would help against an OPM attack--
but that every little bit helps. But there is no downside to them to
just pass the bill. It makes sense. Pass the bill. There is no
downside.
Opponents of the bill, who grow in number virtually every day, have
been arguing that the bill is likely to have a significant negative
impact on the personal privacy of a large number of Americans and that
this greatly outweighs the limited security benefits. If an information
sharing bill doesn't include adequate privacy protections, I am telling
you, colleagues, I think those proponents are going to have people wake
up and say: I really don't see this as a cyber security bill, but it
really looks to me like a surveillance bill by another name.
(Mr. TOOMEY assumed the Chair.)
Colleagues who are following this and looking at the bill may be
trying to sort through this discussion between proponents and
opponents. To help clarify the debate, I would like to get into the
text of the bill for just a minute.
If colleagues look at page 17 of the Burr-Feinstein substitute
amendment, which is the latest version with respect to this bill,
Senators are going to see a key section of the bill. This is the
section that discusses the removal of personal information when data is
shared with the government. The section says very clearly that in order
to get immunity from a lawsuit a private company has to review the data
they would provide and remove any information the company knows is
personal information unrelated to a cyber security threat. This
language, in my view, clearly creates an incentive for companies to
dump large quantities of data over to the government with only a
cursory review. As long as that company isn't certain that they are
providing unrelated personal information, that company gets immunity
from lawsuits. Some companies may choose to be more careful than that,
but this legislation and the latest version--the Burr-Feinstein
substitute amendment--would not require it. This bill says with respect
to personal data: When in doubt, you can hand it over.
My amendment No. 2621 is an alternative. It is very simple. It is
less than a page long. It would amend this section that I have just
described to say that when companies review the data they provide, they
ought to ``remove, to the extent feasible, any personal information of
or identifying a specific
[[Page S7388]]
individual that is not necessary to describe or identify a
cybersecurity threat.'' The alternative that I am offering gives
companies a real responsibility to filter out unrelated personal
information before that company hands over large volumes of personal
data about customers or people to the government.
The sponsors of the bill have said that they believe that companies
should only give the government information that is necessary for cyber
security and should remove unrelated personal information. I agree with
them, but for reasons that I have just described, I would say
respectfully that the current version of this legislation does not
accomplish that goal, and that is why I believe the amendment I have
offered is so important.
For an example of how this might work in practice, imagine that a
health insurance company finds out that millions of its customers'
records have been stolen. If that company has any evidence about who
the hackers were or how they stole this information, of course it makes
sense to share that information with the government. But that company
shouldn't simply say here you go, and hand millions of its customers'
medical records over for distribution to a broad array of government
agencies.
The records of the victims of a hack should not be treated the same
way that information about the hacker is treated. Companies should be
required to make a reasonable effort to remove personal information
that is not needed for cyber security before they hand information over
to the government. That is what my amendment seeks to achieve. That is
not what is in the substitute amendment.
Furthermore, if colleagues hear the sponsors of the substitute saying
this bill's privacy protections are strong and you have heard me making
the case that they really don't have any meaningful teeth and they are
too weak, don't just take my word for it. Listen to all of the leading
technology companies that have come out against the current version of
this legislation.
These companies know about the importance of protecting both cyber
security and individual privacy. The reason they know--and this is the
case in Pennsylvania, Oregon, and everywhere else--is that these
companies have to manage the challenge every single day. Companies in
Pennsylvania and Oregon have to ensure they are protecting both cyber
security and individual privacy. Those companies know that customer
confidence is their lifeblood and that the only way to ensure customer
confidence is to convince customers that if their product is going to
be used, their information will be protected, both from malicious
hackers and from unnecessary collections by their government.
I would note that there is another reason why it is important to get
the privacy protections I am offering in my amendment at this time. The
companies that I just described are competing on a global playing
field. These companies have to deal with the impression that U.S. laws
do not adequately protect their customers' information. Right now these
companies--companies that are located in Pennsylvania and Oregon--are
dealing with the fallout of a decision by a European court to strike
down the safe harbor data agreement between the United States and the
European Union. The court's ruling was based on the argument that U.S.
laws in their present form do not adequately protect customer data.
Now, I strongly disagree with this ruling. At the same time, I would
say to my colleagues and to the Presiding Officer--he and I have worked
closely on international trade as members of the Finance Committee--and
I would say to colleagues who are following this international trade
question and the question of the European Union striking down the safe
harbor for our privacy laws, in my view this bill is likely to make
things even more difficult for American companies that are trying to
get access to those customers in Europe.
To give just a sampling of the leading companies that have come out
against the CISA legislation, let me briefly call the roll. There is
the Apple company. They have millions of customers. They know a great
deal about what we have to do to deal with malicious hackers and to
protect privacy. There is also Dropbox, Twitter, Salesforce, Yelp,
Reddit, and the Wikimedia Foundation. I point to the strong statement
by the Computer & Communications Industry Association. Their members
include Google, Amazon, Facebook, Microsoft, Yahoo, Netflix, eBay, and
PayPal. Those individual companies I have mentioned have millions of
customers. The organization that speaks for them says: ``CISA's
prescribed mechanism for sharing of Cyber threat information does not
sufficiently protect users' privacy.''
On top of this, there has been widespread opposition from a larger
spectrum of privacy advocacy organizations. Here the groups range from
the Open Technology Institute to the American Library Association.
I was particularly struck by the American Library Association's
comments in opposition to this bill. I think the leadership said--
paraphrasing--something to the effect of when the American Library
Association opposes legislation that authors say will promote
information sharing, they indicate there was a little something more to
it than what the sponsors are claiming.
Wrapping up, I want to make clear, as I said yesterday, that I
appreciate that the bipartisan leadership of our committee has tried to
respond to these concerns. They know that these large companies with
expertise in collecting data and promoting cyber security have all come
out against the bill. I heard talk about privacy protections. I don't
know of a single organization that is looked to by either side of the
aisle, Democrats and Republicans, for expertise and privacy that has
come out in favor of the bill.
So the sponsors of this legislation and the authors of the substitute
amendment, which I have tried to describe at length here this
afternoon, are correct in saying that they have made some changes, but
those changes do not go to the core of the bill.
For example, the amendment I have described would really, in my view,
fix this bill by ensuring that there was a significant effort to filter
out unrelated personal and private information that was sent to the
government under the bill.
So I hope Senators will listen to what groups and the companies that
have expertise in this field have said. I hope Senators on both sides
of the aisle will support the amendments I and others have offered. The
Senate needs to do better than to produce a bill with minimal effects
on the security of Americans and significant downside for their privacy
and their liberty.
I yield the floor.
The PRESIDING OFFICER. The Senator from Rhode Island.
Amendment No. 2626, as Modified
Mr. WHITEHOUSE. Mr. President, I would like to speak for 5 or 6
minutes on the cyber bill.
Unfortunately, I am here to express my distaste for the manner in
which this bill has proceeded. I have an amendment that is not going to
be voted on. Let me describe some of the characteristics of that
amendment.
First of all, it is bipartisan. It is Senator Graham's and my
amendment.
Second, it has had a hearing. We have had a hearing on it in the
Judiciary Committee. Considerable work has gone into it.
Third, it has the support of the Department of Justice. It repairs
holes in our criminal law for protecting cyber security that we worked
on very carefully with the Department of Justice and which we have had
testimony in support of from our Department of Justice prosecutors.
Last, it was in the queue. It was in the list of amendments that were
agreed to when we agreed to go to the floor with this bill.
So I don't know how I am going to vote on this bill now. But if you
have a bipartisan amendment that has had a hearing, that was in the
queue, and that has the support of the Department of Justice and you
cannot even get a vote on it, then something has gone wrong in the
process.
I remember Senator Sessions coming to the floor and wondering how it
is that certain Senators appoint themselves masters of the universe and
go off in a quiet room someplace and decide that certain amendments
will and will not be heard. I am very sympathetic to Senator Sessions'
concerns right now.
[[Page S7389]]
Let me tell you what the substance of our amendment would do.
First, there are people out there around the world in this cyber
universe of fraud and crime who are trafficking in Americans' financial
information for purposes of fraud and theft. If they don't travel to
America or if they don't have a technical connection to America, we
cannot go after them. There is an American victim, but we cannot go
after them. That is a loophole that harms Americans that this bill
would close.
I cannot believe there is one Member of this institution who would
oppose closing a loophole that allows foreign criminals access to
Americans' financial information for fraudulent purposes but puts them
beyond the reach of our criminal law. That is one part of what our bill
does.
Second, it raises penalties for people who intrude on critical
infrastructure. You can go all around this country, you can go to
military installations that have way less security concerns than our
critical infrastructure, like our electric grid, and you will see
chain-link fences that say department of whatever, U.S. Government,
stay out. You cannot go in there to picnic, you cannot go in there
because you are curious, you cannot go in there for a hike, and the
reason is because there is a national security component to what is
going on in there.
Well, there is a huge national security component to our critical
infrastructure, like our electric grid. All this would do is raise the
penalties. You could still go in, but if you get caught doing something
illegal there, then it is a little different if you are attacking
America's critical infrastructure than if you are just prowling around
in some other portion of the Web that does not have that.
Again, I think if that came to a vote, we would probably get 90
percent of this body in favor. Who is in support of allowing people to
mess around in our critical infrastructure?
The third is botnet brokers. Botnets are out there all over the
Internet. They are a plague on the Internet. There is no such thing as
a good botnet. Everyone would be better off if they were removed. They
are like weeds on the Internet. There are people who are brokers who
allow access to botnets, and because our laws are so out of date, if
you are just brokering access to a botnet for criminal purposes, there
is no offense. Why would we not want to empower our Department of
Justice to be able to go after people who are criminal brokers allowing
access for criminals to botnets to use for criminal purposes against
Americans? I don't understand that.
Lastly, botnet takedowns. A botnet is a weed. We wait until somebody
actually encounters that weed and is harmed by it before we allow our
Department of Justice to act. We should be out there taking down
botnets on a hygiene basis all the time. We are limited because of this
artificiality. That is the fourth piece of the bill. It empowers botnet
takedowns like the Bugat takedown we just did. We should be doing a lot
more of that. Again, unless somebody here is in the botnet caucus and
is in favor of more botnets out there, this is something which would
probably pass unanimously. Yet I cannot get a vote.
It is bipartisan, has had a hearing, is in the queue, is supported by
the Department of Justice, and those are the four sub-elements of it.
For some reason, the masters of the universe have gone off and had a
meeting in which they decided this is not going to be in the queue. I
object to that procedure.
I am sorry we are at this stage at this point because I think that on
the merits this would win. This is a bipartisan, good, Department of
Justice-supported, law enforcement exercise to protect people against
cyber criminals. I don't know what the sense is that there is some
hidden pro-botnet, pro-foreign cyber criminal caucus here that won't
let an amendment like mine get a vote.
I will yield the floor. I see Senator Carper here, and he has done
great work to try to be more productive than my amendment reflects. I
hope we can sort this out to a point where an amendment like mine,
which was in the queue in the original deal that got us to this bill,
can now get back in some kind of a queue so that we can get this done.
I yield the floor.
The PRESIDING OFFICER. The Senator from Delaware.
Mr. CARPER. I appreciate the yielding by Senator Whitehouse. Let me
just say that if your provision, Senator Whitehouse, does not end up in
this bill and we actually do pass it, I am sure we will conference with
the House. There will be an opportunity to revisit this issue. So I
hope you will stay in touch with those of us who might be fortunate
enough to be a conferee.
Mr. WHITEHOUSE. I appreciate that very much, more than the Senator
can know.
Mr. CARPER. Mr. President, I rise today in support of the cyber
security information bill introduced by my colleagues, Senators Burr
and Feinstein. I want to commend my colleagues and their staff for
their leadership and for their tireless efforts on this extremely
important piece of legislation.
As ranking member and former chairman of the Homeland Security and
Governmental Affairs Committee, I have been following cyber security
and this information sharing proposal in particular literally for
years. In fact, when Senator Feinstein first introduced an information
sharing bill in 2012--that was like two or three Congress's ago--it was
referred to Homeland Security and Governmental Affairs, on which I
served. That bill was ultimately folded into a comprehensive cyber
security bill that I had the honor of cosponsoring with Senators Joe
Lieberman, Susan Collins, Jay Rockefeller, and Senator Feinstein. We
were not able to pass that bill, but I think it has paved the way for
other cyber legislation, including the bill that is before us today and
a number of the amendments that are going to be offered to that bill in
the managers' amendment, especially.
Last Congress, I worked with our ranking member on homeland security,
Dr. Tom Coburn, and our House counterparts to get not one, not two, not
three, but four cyber security bills enacted into law, signed by the
President. I believe these four bills laid a very strong foundation for
some significant improvements on how the Department of Homeland
Security carries out its cyber security mission and really for this
bill before us too.
What the legislation Dr. Coburn and I worked on during the last
Congress did, in essence, was to better equip the Department of
Homeland Security to operate at the center of the kind of robust
information sharing program that the Burr-Feinstein bill would set up.
How do they do that? One, make sure the Department of Homeland Security
would have the ability to attract and retain top-flight talent, much
like the National Security Agency already has.
The legislation actually takes something called the cyber ops center,
NCCIC, within the Department of Homeland Security and makes it real and
functional and an entity that people would use and listen to.
Finally, we took an old law called FISMA, the Federal Information
Sharing Management Act--we took something that was just a paperwork
operation, this FISMA legislation--like a once-in-a-year check to see
how good a cyber security agency might be--and turned it into not a
paperwork operation, not a once-every-365-days operation, but a 24/7
surveillance operation on the lookout for intrusions within and across
the Federal Government broadly.
That legislation, affectionally known as FISMA, was also designed to
make clear what the division of labor was between the Office of
Management and Budget, OMB, and the Department of Homeland Security on
protecting the dot.gov domain. We made it clear that the job of OMB is
to, if you will, steer the ship. The job of the Department of Homeland
Security is to row the ship, to row the boat. That is a good division
of labor given that OMB only has six employees who work on this stuff
and the Department of Homeland Security has hundreds. So I think we
figured out the sharing of labor, the division of labor, and also made
sure the Department of Homeland Security has the resources--the horses,
the resources--and the technology they need.
Sharing more cyber security threat information among and between the
private sector and the Federal Government players who are on the
frontline in cyber security is critical for national security. Over the
last couple of
[[Page S7390]]
years, we have witnessed many troubling cyber attacks against our
banks, but not just our banks, against retailers, health providers,
government agencies, and God knows how many others.
Some of those launching these attacks were just criminals. Some of
them were just criminals. They want to steal information. They want to
make money off of our personal information, off our intellectual
property, like our intellectual seed corn, if you will, for companies
large and small and for universities as well. Others just want to be
disruptive or they want to make political points. Some actors, however,
are capable or would like to develop the capability to use a cyber
attack to harm people and cause physical damage.
It is long past time for this body to take action to more effectively
combat these threats we now face in cyber space. That is why earlier
this year I introduced a similar information sharing bill. This bill
largely mirrored the administration's original proposal.
The administration asked me to introduce their information sharing
bill. Before I did that, we actually had a hearing in the committee on
homeland security. Part of the centerpiece of the hearing was the
administration's proposal. We got some good ideas on how to make it
better. We made it better and introduced that bill to use, if you will,
as a point-counter point in a constructive, positive way with the
legislation that worked its way through the Intelligence Committee. But
we did not stop there. We took information from a lot of experts and
stakeholders.
The measure we are discussing today shares the same goals as my
original bill--largely the administration's original bill--to increase
the sharing of cyber threat information between the Federal Government
and the private sector and between different entities within the
private sector. I am pleased that we are finally discussing these
critical issues on the Senate floor.
The substitute amendment we are debating today makes a number of
improvements to the bill that was first made public after the
Intelligence Committee reported it out. It also includes several
changes that I, as well as several of my colleagues, have been calling
for--including the chairman of our committee.
I would like to thank Senators Burr and Feinstein. I thank their
staff for working closely with our staff and others to produce what I
believe is a significantly smarter and stronger bill. Is it perfect?
No, not yet. But I can say there is always room for improvement. That
is why we still have a debate on a number of amendments and those like
the one mentioned by Senator Whitehouse that may be germane in a
different kind of way in conference.
While there may not be agreement on everything in this bill, I
believe most of our colleagues would come to the conclusion that it
really will help to improve our Nation's cyber security and, by
extension, our national security and, by extension, our economic
security.
First, the bill would ensure that the government--our government--is
providing actionable intelligence to private sector entities that are
seeking to better protect themselves in cyber space. Businesses around
our country are hungry for information they can use to fend off attacks
and better protect their systems and their customers. This bill would
make the Federal Government a much stronger partner for them.
Many companies that I have talked to of late also want to share more
information with the Federal Government about what they are seeing
online every day, but they are unsure of the rules of the road. In
other words, companies want more predictability and they want more
certainty when it comes to working with our government. This bill would
give them that by clarifying that they won't be putting themselves in
legal jeopardy if they choose to share cyber threat information with
our Federal Government.
If companies do want to avail themselves of the legal protections the
bill offers, they would have to, with two narrow exceptions, use the
information sharing portal at the Department of Homeland Security. This
puts the Department of Homeland Security, a civilian entity, at the
center of the information sharing process. I think this is smart and
the right thing to do. In fact, many experts and companies that I have
talked to across the country as recently as last week out in Silicone
Valley and out on the west coast--they agree with what I have just
said.
I know many Americans are uneasy with companies they do business with
directly handing over data to an intelligence or law enforcement
agency. The Department of Homeland Security will carry out its
responsibilities under this bill through the cyber ops center I
mentioned earlier called the National Cyber Security and Communications
Integration Center--that is a mouthful. We affectionately call it N-
Kick. It is the cyber ops center. It includes folks from DHS and other
Federal agencies. It includes a number of representatives of financial
services, the utility industry, our retail industry, and so forth, all
together under one roof, talking together and working together to help
us support one another and make it strong and more secure.
One of the bills I worked on with Dr. Coburn last Congress formally,
as I said earlier, authorized this center. We are pleased to see that
this bill would make the most out of the resources we have already
invested in this cyber ops center, NCCIC.
Earlier this month, Secretary Jeh Johnson of the Department of
Homeland Security told our Homeland Security and Governmental Affairs
Committee that beginning in November, the cyber ops center, NCCIC, will
have the capability to automate the distribution and receipt of cyber
threat indicators. I will say that again--to automate the distribution
and the receipt of cyber threat indicators that they receive from
others, including those in the private sector. In other words, the
Department of Homeland Security will have the ability to share
information with other agencies in real time--not next month, not next
week, not tomorrow, not in an hour, but in real time, which is really
what this little bill before us today requires.
I know that the real-time sharing is incredibly important to the
bill's sponsors, and it is important to me and probably to many of our
colleagues and stakeholders. Equally important, however, is the ability
of the Department of Homeland Security to apply what I call a privacy
scrub to the information it receives from industry, the threat
indicators that come from industry--see something, say something--stuff
that they send to the Department of Homeland Security.
In the bill that I authored with others in my committee, including
our chairman, we allow the Department of Homeland Security to, if you
will, receive information through its portal from various entities that
witness threat indicators, to see it and to put it through the portal,
to bring it through the portal to do a privacy scrub. That is one of
the things the Department of Homeland Security has expertise in doing.
I used an example at lunch earlier today. I talked about baseball. I
know the Presiding Officer has some interest in baseball. There are
teams called the Phillies in Philadelphia and the Pirates in
Pittsburgh. I would just say to him, thinking about baseball for a
minute, let's say you are in the playoffs. Let's say you have a team in
the playoffs. You are in the ninth inning, and you need to get somebody
out of the bullpen to close. You have a one-run lead. You look to the
bullpen. He is now retired, but Mariano Rivera was the best closer in
baseball history. You have Mariano Rivera in the bullpen to come in and
close the game, and you have three other guys you just called up from
the Minor League, so maybe from AAA.
You say: Well, whom do I put in to close the game? Do I put in the
best closer we have ever had in baseball history or do I bring in three
rookies, three Minor League guys?
Well, you bring in Mariano Rivera.
When it comes to being able to do privacy scrubs, the Department of
Homeland Security--that is what they do. That is what they do. Now they
have the horses, the ability, and the technology to do it even better.
I know some of my colleagues are concerned that a privacy scrub will
slow down the information sharing process. I share those concerns, but
I have been assured by the Department--the bright, smart people at the
Department of Homeland Security--that less
[[Page S7391]]
than 1 percent of the information it receives would actually ever need
to be reviewed by a human, by a person. The rest--roughly 95 percent to
99 percent--would be shared with other agencies at machine speed.
Bingo.
I am very pleased that DHS has come to an agreement on this process
with its agency partners. We will be up and running with a portal in
the way I have described in the next couple weeks.
One of the amendments I filed speaks to this privacy scrub process.
It would make clear that the Department of Homeland Security could
carry out an automated privacy scrub in real time and without delay. In
fact, my amendment would add just one word to the bill so that DHS
could continue to automatically remove irrelevant or erroneous data
from cyber threat information.
I am very pleased that Senators Burr and Feinstein have taken this
amendment into consideration and have now modified their substitute
amendment to make sure the Department of Homeland Security can do what
it does best, and that is to apply a privacy scrub--pulling out
personally identifiable information that actually shouldn't be passed
on to other Federal agencies. The substitute amendment now calls on DHS
to work with its agency partners to agree on a process to share
information while protecting privacy. This is a process DHS is already
undertaking.
I thank Senators Burr and Feinstein, as well as our friends at the
Department of Homeland Security and other agencies, for working so hard
to find agreement on this language and for working with my staff and me
on this important matter.
Another amendment I put forward with our committee chairman, Senator
Johnson, aims to improve what we call cyber hygiene across the Federal
Government and to prevent attacks against Federal agencies. This
language is based on a bill that Senator Johnson and I introduced and
had reported out of our homeland security committee by a unanimous
vote. The amendment does three main things.
First, it would require all Federal agencies to implement specific
best practices and state-of-the-art technologies to defend against
cyber attacks. For example, we had experts testify about the importance
of strong authentication and data encryption. This amendment would make
sure that agencies are taking these commonsense steps to bolster their
cyber security defenses.
Second, the amendment would accelerate the deployment and adoption of
the Department of Homeland Security's cyber intrusion and detection
program, known as EINSTEIN, as in Albert Einstein, but you don't have
the ``Albert'' in the name of this technology; it is called EINSTEIN.
For my colleagues who may not be familiar with EINSTEIN, with respect
to homeland security and cyber security, let me take a couple of
minutes to describe its main features.
We had EINSTEIN 1 present at the beginning, EINSTEIN 2 was follow-on
technology, and then there is EINSTEIN 3. EINSTEIN basically analyzes
Internet traffic entering and leaving Federal civilian agencies to
identify cyber threats and to try to stop attacks.
This system has been rolled out in phases over the last several
years. EINSTEIN 1 is the first step. It sees and actually records
Internet traffic, much like a guard at a checkpoint watches cars go by
and maybe writes down and records the license plates. EINSTEIN 2
detects anything out of the ordinary and sets off alarms if a piece of
malware is trying to enter a Federal network. For example, a car comes
through and it is not supposed to come through. That would set off an
alarm and enable EINSTEIN 2 to actually detect a cyber intrusion. It
doesn't do anything about blocking. It doesn't block the car, in this
example. It doesn't block anything. EINSTEIN 3A, the latest version,
uses unclassified and classified information to actually block the
cyber attack.
So initially EINSTEIN 1 records basically what is being detected,
EINSTEIN 2 actually detects bad stuff coming through in terms of an
intrusion, and EINSTEIN 3A blocks it. The problem is that less than
half of our Federal civilian agencies actually have EINSTEIN 3A in
place. They have the ability to record an intrusion, the ability to
detect an intrusion, but not the ability to block an intrusion. They
need the ability to block. What our legislation would do would be to
make sure that agencies have EINSTEIN in place, including the ability
to block intrusions, within 1 year.
Finally, our amendment incorporates the language originally drafted
by Senator Susan Collins, the former chair of the homeland security
committee and a great colleague of ours for many years, Senator Mark
Warner, Senator Kelly Ayotte, Senator Claire McCaskill, Senator Dan
Coats, and Senator Barbara Mikulski. They are all cosponsors of the
amendment Senator Collins offered. These provisions would strengthen
the ability of the Department of Homeland Security to shore up cyber
defenses at civilian agencies and to address cyber emergencies across
the Federal Government.
Again, I am incredibly grateful that Senator Feinstein and Senator
Burr agreed to include our language in the substitute amendment
language that worked its way through our committee. We had hearings and
had the opportunity to mark up the legislation. It worked the way it is
supposed to work. And I think that without exception it had bipartisan
support coming through our committee. It is the perfect complement to
the information sharing bill we are discussing this week. I think it
makes a good bill that much better.
I thank the Senators for working with me and Senator Johnson on it.
Just one more thing before I close. I know the Presiding Officer
thinks a lot about root causes, and rather than just address the
symptoms of a problem, let's think about what is the root cause of the
problem. The Senator who is waiting to follow me on the floor, the
former Governor of Maine, thinks similarly. I do too. It is not enough
to just address the symptoms of these problems. A part of what we need
to be thinking about is, How do we get to the root cause?
Until fairly recently, a lot of our financial services institutions
in this country were under constant attack by somebody who was trying
to overload their Web sites and essentially trying to shut them down.
It is sort of like when we were first standing up the Affordable Care
Act, they had so much traffic on their Web site that it would kind of
break down.
There are so many cyber threats from around the world. We think Iran
is behind it. They are trying to do that, to bring down our financial
services business--and sometimes with some success.
About a year ago, when we got very serious about negotiating with the
Iranians and our partners--the French, the Brits, the Germans, the
Russians, and the Chinese--some kind of an agreement where the Iranians
would give up any hope they had of having a nuclear weapon and the
terms for our lifting our economic sanctions--when it became clear that
those were serious negotiations, that something might actually happen
from those negotiations, guess what happened to those attacks. We call
them DDoS. What do you suppose happened? Well, guess what, they started
letting up little by little until the time we actually voted here to
let that agreement be enacted and hopefully be administered and
implemented. That was a root cause being addressed.
Another root cause we had over in China--for years the Chinese have
sought to use cyber attacks to get into our most successful businesses,
some of our research and development operations in those businesses,
and work being done within Federal agencies on research and
development--actually, the intellectual seed corn for creating jobs and
opportunity in this country. The cyber attacks were--we believe it was
China trying to steal information from our universities. They were
doing a lot of research that could lead to economic activity and job
creation. We didn't like it. We don't do that. We don't do that to
them, and we don't want them to do that to us. We complained about it
and complained about it and called out some of the folks whom we
thought were behind this in China.
President Xi visited us in this city about 3 week ago. He and our
President had some tough, direct, and probably not entirely comfortable
conversations. One of them dealt with this
[[Page S7392]]
issue, what we believe is the intrusion by Chinese actors in order to
steal our intellectual seed corn, in order to maybe have a short step,
a shortcut to economic development, economic activity. They would not
have to spend the money, the time, and the energy to do all the
research that would lead to this innovation and job-creation activity.
The agreement that came out of that was the Chinese and our country
have agreed that neither side will knowingly steal this kind of
information from the other. ``Knowingly'' is a very broad term, and so
we have to make sure that ``knowingly'' actually means something.
Secretary Jeh Johnson, the head of the Homeland Security Department,
and Attorney General Loretta Lynch have been assigned to build on this
initial agreement and see what we can make of it.
I will close with this. A lot of people in our country don't
understand what all this cyber security stuff is--intrusion, EINSTEIN,
and all the items we are talking about that are in the legislation
which is before us this week. They do know this: It is not good when
people can steal the kind of information that needs to be protected.
Whether it is part of the government domain, military or intelligence
secrets; whether it is economic secrets or developments that lead to
economic gain; whether it is personally identifiable information that
can be used for blackmail purposes or to monetize and to somehow make
money off of that information, we know it is not good. There is no one
silver bullet to actually stop this kind of activity, but there are a
lot of silver BBs, and some of them are pretty big.
The legislation that is before us today, bolstered by similar
legislation that has come out of the Committee on Homeland Security and
Governmental Affairs, is a pretty good-sized BB. They are not going to
enable us to win this war by themselves, but they will enable us to
make real progress. It will make us feel a good bit more secure than we
have, knowing that this is an enemy across the globe and that a number
of enemies wish us harm. They are not going to give up. There is a lot
of money involved. They will be back at us, and we have to bring our
``A'' game to work every day in the Department of Homeland Security and
other Federal agencies working in tandem with the private sector.
Hopefully, with this information, the folks in the private sector--if
they want to get the liability protection and share information with
the Federal Government, we want them to use the portal through the
Department of Homeland Security. The Department of Homeland Security,
to the extent that privacy scrub is needed--it does not happen often.
It happens less than 1 percent of the time with the information that
comes through the portal. The legislation before us, with the
amendments that are offered, will enable us to have that kind of
security about our private information and at the same time to do a
very good job--a much better job--in protecting what is valuable to us.
Mr. President, I think that is about it for me. I appreciate very
much the opportunity to speak. I appreciate the patience of Senator
King, and I will yield the floor to him.
I will just say in closing--no, Senator Blunt, I will yield to you
next. It is good to be with both of you. I look forward to working with
you on these and, with respect to the Senator gentleman from Missouri,
very closely on related matters.
Thank you so very much.
The PRESIDING OFFICER. The Senator from Missouri.
Mr. BLUNT. Mr. President, I thank the Senator from Delaware. He and I
have worked on legislation together to protect data security, to have
one standard for notifying people whose information has been accessed
by people who shouldn't have it, and we are going to continue to work
on that and look for opportunities, whether it is this bill or some
other bill, to add that important element to what we are doing here.
I come to the floor today, as I am sure many others have, to express
support for this bill--for the Cybersecurity Information Sharing Act--a
bill that gives us tools we don't currently have, and to break down
barriers that we do currently have. This is a bill that would allow
individuals who see the information they are responsible for being
attacked to call others in their same business and say: Here is what is
happening to us right now. If you are not seeing it already, you should
be looking for it. When they do that, it doesn't violate any
competitive sharing of information. What it does is bring everybody
into the loop of defense as quickly as possible and allow them to look
for help from the government as well.
So I express support for this bill. We know that day after day
Americans who read, watch, or listen to the news learn of another cyber
attack. Some involve attacks of government systems, while others
involve the private sector.
In 2012 and 2013, hacker groups linked to Iran targeted American bank
Web sites and sustained an attack on those Web sites in a way that was
designed to disrupt people trying to do business--trying to pay their
own personal bills, trying to do things people should expect to be able
to easily do.
Early in 2014, we learned that cyber criminals had stolen 40 million
credit card numbers from a major retailer and had probably compromised
an additional 70 million accounts. We also have learned that a lot of
times when we hear about these, they seem bad enough at first, but they
seem a whole lot worse later when we find out what really happened,
when we see how deep these criminals were able to go, how deep these
terrorists were able to go, how deep these government-sponsored
entities were able to go to get at information they shouldn't have.
In September of that same year, September 2014, we learned another
major retailer had suffered a data breach. In that case there were 56
million credit card holders.
In February of this year, we learned a health insurance provider's
system had been hacked, and 80 million customers were affected. This
was a data breach that particularly impacted my State--particularly
impacted Missourians--and we saw a huge change in the IRS fraud that
occurred this year because, we believe at least, because criminals
suddenly had all this sensitive personally identifiable information
they had stolen. Suddenly somebody besides you was filing your tax
return. Only later did the people who really had the income tax return
to file find out that somebody had filed it for them.
In June of this year--maybe the most surprising to all of us who have
heard over and over again that the private sector is struggling, we
suddenly found out the U.S. Office of Personnel Management increased a
previous estimate of how many people were affected by its own data
breach. The files of Federal employees and people related to those
files was revised upward to 21.5 million people. Then we found out that
also included roughly 5.5 million sets of fingerprints.
I am not exactly sure what you could do with somebody's fingerprints
on the Internet today. I can only imagine what you might be able to
figure out to do with those fingerprints. Remember, your fingerprints
don't change, and probably the government entity responsible for that
hacking that has those fingerprints is always going to have those
fingerprints as they think of new and malicious ways to use them. So we
are talking about well over 100 million Americans who already have
their personal information in the hands of people it shouldn't be in.
The challenge before us is as clear as it is urgent. Virtually every
aspect of our society and our economy rely on information technology.
It has enabled tremendous economic growth, it has enabled tremendous
efficiencies in every sector, but it has put all kinds of information
out there in ways that, looking back, we are going to wonder why we
made that information so available in so many places and left so
unprotected.
Federal, State, and local governments rely on that information
technology as well. As the technology advances, its widespread adoption
has also opened us to new dangers. Modern cyber security threats are
sophisticated, they are massive, and they are persistent. This doesn't
just happen every day, it happens all the time every day.
The culprits of these attacks and intrusions range in terms of their
motives and their abilities. We just heard of a teenager who figured
out how to
[[Page S7393]]
get into the personal account of the CIA director--at least that is the
public media report--and the homeland security director. This is not a
particularly sophisticated individual, but obviously a pretty capable
person who gets to two individuals that one would think would be the
most cautious.
Some of these people are bent on sheer vandalism--just the thrill of
cyber vandalism--while others are determined to steal intellectual
properties from American companies. The motive there is clear. It is
easier to steal intellectual property than it is to go through the hard
work of creating it. Suddenly that information is out there, and the
people who created it have been robbed.
I hear this all the time when I visit companies in my State. We have
seen cyber intrusions used for espionage. We have seen one major
company attacked for no reason other than to embarrass the company
because a foreign government didn't like something the company had
done. It is quite a way to have a movie review, that we are just going
to destroy as much of your technology as we can by a cyber invasion.
A great many more of these people are motivated by greed--pilfering
other people's identities, getting access to other people's account
information, and selling that information on the black-market. This
becomes a real opportunity for them. The more you remove it from the
person who initially got it, the harder it is to find out who initially
got it and what they did with it.
Underneath all this is the implication of more serious attacks that
can cause physical harm and can cause mass disruption of critical
infrastructure of the country that is very dependent on cyber security.
This really begs the question: What are we doing to protect our country
and our citizens from these cyber adversaries? I have been in Senate
for 5 years. I have had the great opportunity to represent the people
of Missouri here for 5 years. And during every one of those 5 years, we
have been talking about how important it is that we do something about
cyber security. This is the only approach I have seen in those 5 years
that has bipartisan support. It has a bicameral consensus. This is
something that can happen.
This is a problem that it is time to stop talking about. Do we want
some other government to have everybody's fingerprints before we do
something about it? This is the time to do something about it. As a
member of the Senate Select Committee on Intelligence, I am certainly
here to support the chairman of that committee and the vice chairman of
that committee to finally pass this bill, a bill to enhance the public-
private partnerships that can provide the kind of cyber defense we
need.
We need to do that and we need to encourage lots of sharing. We need
to encourage sharing of attacks. We need to encourage early on, as I
said, the ability to call somebody else in your same business and to
contact them and say: This is happening right now. That is the best
time to say it. The other option is to say: This happened to us late
last night or happened yesterday, but this is happening to us. Is it
happening to you?
There is lots of misunderstanding about this concept. Without getting
too technical, cyber threats are the malicious codes and algorithms
used to infect computer systems and attack networks. They are
techniques that use bits and bytes. They are the ones and zeros of the
digital age that allow hackers to intrude upon private systems, steal
information, perpetrate fraud, or disrupt activities over the Internet.
In very dangerous circumstances, these techniques can be used to
remotely control critical infrastructure management systems, such as
supervisory control and data acquisition systems. I saw something on
the news the other day where some hackers, for no intent other than
maybe just to see if they could do it, had figured out how to take over
one of the cars that was driving itself. Suddenly the car wasn't
driving itself; the hacker was driving the car.
When a particular company finds itself subjected to some novel new
approach, the quicker they can share that, the better. When the
government discovers a new method being used to infiltrate information
technology systems abroad or here, they need to be able to share that
with American companies quickly so they can protect themselves. There
are things the private sector sees that the government does not, and
there are things the government sees that the private sector does not.
This legislation gives the obligation and opportunity to both of them
to join together in this important fight. Modern communications
networks move at an incredibly rapid pace. We need to be fighting back
at that same kind of rapid pace.
This bill establishes a strictly voluntary program. Unlike some of
the other programs we have talked about to secure ourselves in a post-
9/11 world, this is a strictly voluntary program that leverages
American ingenuity to unleash the arsenal of democracy against cyber
adversaries.
When it comes to the cyber threat, we have to act for a common
purpose. Throughout this debate there has been a great deal of
discussion about the need to protect liberty in the information age. I
truly think liberty and security are not at odds with one another in
this legislation. When it comes to this bill, it comes the closest to
having the balance we all would like to see. It takes into
consideration the importance of liberty, but it also takes into
consideration what happens as we protect our security.
I would close by saying of all the attacks we have had, and as bad as
they have been, none of them have been the sort of catastrophic
infrastructure attack that we may see that would impact the grid, that
impacts our ability to communicate, impacts our ability to make the
water system work, or impacts our ability to make the electrical system
work. If that happens, the Congress will not only act, the Congress
will overreact.
This is the right time to have this debate. Let's put this
legislation on the books right now. Let's give the people a law that
makes sense at a time when we have the time to debate it, instead of
waiting to see the direction we will turn to when we should have
debated this and moved in this direction right now. I encourage my
colleagues to vote for this bipartisan bill that I think will wind up
on the President's desk and become law.
Mr. President, I yield to my patient friend from Maine, who has been
waiting. He and I serve on the Select Committee on Intelligence
together, and I look forward to his comments.
The PRESIDING OFFICER (Mr. Scott). The Senator from Maine.
Mr. KING. Mr. President, the United States is under attack. We are
under attack--not a week ago, a month ago, September 11 or yesterday,
but right at this moment. We are under attack from state actors, from
terrorist nonstate actors, and from garden-variety criminals. This
cyber issue is one of the most serious that we face.
When I first got here, I was appointed to the Armed Services and
Intelligence Committees. On those two committees over the past 3 years,
at least half of our hearings have touched upon this issue and the
threat that it presents to this country. The leaders of our
intelligence community and our military community, in open session and
in closed session, have sounded the alarm over and over and over. The
most dramatic--I don't remember what the hearing was--was when one of
our witnesses said: ``The next Pearl Harbor will be cyber.''
As the Senator from Missouri just pointed out, we are fortunate that
we have had a number of warning shots but none have been devastating.
But we have had warning shots--at Sony, at Target, at Anthem, at the
Office of Personnel Management of the U.S. Government, and at the home
email of the Director of the CIA. We have had large and small
intrusions and cyber attacks that have been more than annoying, but, so
far, they haven't been catastrophic. That is just a matter of time.
That is why we have to move this bill.
This bill isn't a comprehensive answer to this question, but it is at
least a piece of it. It is a beginning. We are going to have to talk
about other aspects of our cyber strategy, but at least we can pass
this bill, which came out of the committee 14 to 1. It is bipartisan,
and it has support in the House. Let's do something.
I do not want to go home to Maine and try to explain to my
constituents,
[[Page S7394]]
when the natural gas system or the electric system is brought down,
that we couldn't quite get around to it because of the difference of
committee jurisdictions or because we had other priorities or because
we were tied up on the budget. This is a priority. It is something we
should be doing immediately, and I am delighted that we have moved to
it.
Now, as I have sat in the Intelligence Committee every Tuesday and
Thursday afternoon for the past 3 years, it occurred to me several
months into those debates and the discussions of this and other issues
that really we in the Intelligence Committee and also we in this body
really are working with and weighing and balancing two constitutional
provisions.
The first is the preamble of the Constitution. The most basic
responsibility of any government, anywhere, anytime, is to provide for
the common defense. That is why governments are formed, to provide the
security, and also to insure domestic tranquility. Those two together
are the basic functions of why we are here--to protect our people from
harm. And that is clearly what this bill is talking about.
But the other constitutional provision in the picture that we also
have to weigh is the Fourth Amendment: ``The right of the people to be
secure in their persons, houses, papers, and effects, against
unreasonable searches and seizures, shall not be violated. . . . ''
That is a fundamental premise of who we are as a people.
These two provisions of the Constitution are intentioned--neither one
dominates, neither one controls the other--and it is our job in this
body to continuously weigh and calibrate these two provisions and their
balance in light of threats and evolving technologies.
When the Fourth Amendment was written, nobody had ever heard of
telephones. They certainly had never heard of the Internet. They never
thought about any of these things. But they said: The rights ``shall
not be violated.'' It is interesting--``unreasonable searches and
seizures.'' They didn't know the threats we would be facing when they
said it was a fundamental premise of the U.S. Constitution that we
should protect against both foreign and domestic enemies. That is what
we have to do, and that is what this bill does.
This bill is very carefully worked up, with a lot of discussion and
negotiation, to be effective in protecting the public, while, at the
same time, to be effective in protecting the public's privacy rights in
respecting these two principles. We have had warning after warning
after warning, and now it is time for us to act.
The good news about the United States is that we are the most wired
nation in the world. Technology has been a huge boon to our economy and
to our people, and we are way ahead of a lot of the rest of the world
in our interrelationship with technology and how we have used it to
enhance our lives. That is the good news. The bad news is that we are
the most wired country in the world, because that means we are the most
vulnerable--asymmetric vulnerability. We are more vulnerable because we
are more connected. That means we have to take great care in this
country to be sure that we don't allow that vulnerability to result in
a catastrophic loss for our people.
Not only are we talking about national security issues, but we are
talking about individual people's lives. If the electric grid went
down, people's lives would and could be lost--in hospitals, at traffic
intersections, across the country. If the natural gas system--the vast
pipeline system that links our country in terms of energy--somehow went
awry because of a cyber intrusion into the operating system, that would
have devastating consequences for human lives and also, of course, for
the economy of our country. Somebody could get into the routing system
of a railroad, and a train carrying hazardous material would be caused
to derail. These are the kinds of things that can happen and will
likely happen unless we take steps to protect ourselves.
Some of these attacks and intrusions are sponsored by nation-states.
We know that. Some of them are sponsored by just garden-variety
criminals who are trying to steal our money. Or some of them are large
international criminal organizations that are trying to steal our
commercial intelligence and how we build our products and how we
compete. Some of them are terrorist organizations that see this as a
cheap way to attack America. Why go to all the trouble to build a bomb
and smuggle it into the country and all the risk that entails, when you
can disrupt the country in just as great a way with a few strokes on a
laptop?
It is economic security, national security, economics. It has been
estimated worldwide that cyber crime costs our country $445 billion a
year. That is to the global economy--a half trillion dollars a year.
Some 200,000 jobs in the United States could be and are being affected,
and 800 million personnel records were stolen, and 40 million were
Americans.
The cost of cyber crime is estimated to be between 15 and 20 percent
of the value created by the Internet. We always talk that we don't want
any taxes on the Internet. This is a tax. This is a tax we are all
paying. The users of the Internet are paying to ward off this epidemic
of cyber crime.
It is not only the government. Of course, it is companies, such as
Sony, Target, Anthem, the industrial base, JP Morgan, Home Depot. The
list goes on and on. Most importantly, it is not just the big guys.
Sometimes we feel that OK, this is the large banks, the large insurance
companies that have to worry about this. In the State of Maine, we have
to worry about it.
My staff and I in Maine have reached out to businesses large and
small across the State. Every single one, with one exception, listed
cyber intrusion as one of their greatest issues.
The Maine Credit Union League, with $2.5 million a year, and local
credit unions are having to deal with cyber intrusion.
One of our Maine health care providers has experienced thousands of
attempts to steal confidential data every year. Keeping the data safe
is costing them more than $1 million. This is costing us real money.
At one of our Maine financial institutions, 60 to 70 percent of the
emails they get in the bank are phishing emails trying to compromise
their secured data.
One of our utilities spent over $1 million a year just on
preventative costs to defend against cyber crime. This is in a State of
1.3 million people. This is real. This is real in our State.
I had a forum over the August break with businesses throughout
Maine--mostly small businesses and homeland security. We had 100
businesses come just to visit and sit for a day to talk about this
issue. These were small businesses, and all of them were seeing these
kinds of problems.
One was a small business with 35 employees that did a deal overseas,
and a cyber criminal in effect stole their payment. They sent a fake
invoice to the customer overseas, the customer paid it, and the money
went to the crook, not to my company in Maine. That is the kind of
thing that is happening, and that is one of the reasons we have to take
action today.
No business is immune. No individual is immune. And, of course, this
country is not immune.
The price of inaction is just too high. This is something we must
attend to. As I mentioned, this bill is not the whole answer, but it is
a part of the answer.
Some people say: Well, it is not broad enough. My answer is this: OK,
I understand that, but let's do what we can do and then take it one
step at a time.
Some people say it compromises privacy. I don't believe that it does.
Extraordinary measures were imported into this bill in order to protect
the privacy of individuals. This is not about individual data. This is
about a company voluntarily telling the government and perhaps some
other companies: Here is what I am seeing as an attack. How can we
collectively defend ourselves against it?
That is what this bill is really all about. We have to take action,
and now is the time.
I thank the chair and the vice chair of the Intelligence Committee,
the members of the Homeland Security and Governmental Affairs
Committee, the members of the Judiciary Committee, and all of those who
have contributed to the finalization of this important piece of
legislation.
There is an attitude out there that we can't get anything done around
[[Page S7395]]
here. I think this gives us an opportunity to prove that idea wrong. We
can get things done. We should get things done. This is a chance for us
to protect our people, to provide for the common defense--which is our
most solemn constitutional responsibility--in a way that also protects
the interests of the Fourth Amendment and individual privacy rights.
I hope we can move swiftly, complete the consideration of this bill
this week, work out our differences with the House, and get this matter
to the President. We have no place to hide if we don't get this done.
This is what we are here for.
Again, I thank my colleagues who worked so hard to bring us to this
point.
I yield the floor.
The PRESIDING OFFICER. The Senator from Arizona.
Mr. McCAIN. Mr. President, before the Senator leaves the floor, I
wish to thank him on a well-planned, well-thought-out, and very
convincing presentation, and an argument that, frankly, I can add very
little to. So I will make my remarks very brief.
I thank the Senator from Maine for highlighting the absolute
importance of the passage of this legislation. And, I might add, he is
one of the most serious and hard-working members of the Senate Armed
Services Committee as well. I won't go any further.
Mr. President, I rise in strong support of S. 754. I thank my
colleagues, Chairman Burr and Vice Chairman Feinstein, for their
ongoing leadership.
In the short 2 months since this bill was last on the Senate floor,
the need for action on information sharing has only increased. It is
not for a lack of trying. We have continuously failed to make progress
on this bill. As the Senator from Maine just made clear, that must
change. Enacting legislation to confront the accumulating dangers of
cyber threats must be among the highest national security priorities of
the Congress.
The need for congressional action, in my view, is also enhanced by
the administration's inability to develop the policies and framework
necessary to deter our adversaries in cyberspace.
Earlier this week we learned just how ineffective the administration
has been in addressing our cyber challenges. Within days of reaching an
agreement to curb the stealing of information for economic gain,
China--China--repeatedly, reportedly, continues its well-coordinated
efforts to steal designs of our critical weapons systems and to wage
economic espionage against U.S. companies. It is not a surprise, but it
serves as yet another sad chapter in this administration's inability to
address the cyber threats.
I guess in the last couple of days it has been made known that some
hacker hacked into the information of both the Director of the CIA and
the chairman of the homeland security committee. That is interesting.
As the President's failed China agreement clearly demonstrates, our
response to cyber attacks has been tepid at best and nonexistent at
worst. Unless and until the President uses the authority he has to
defer, deter, defend, and respond to the growing number in severity of
cyber threats, we will risk not just more of the same but embolden
adversaries in terrorist organizations that will continuously pursue
more severe and destructive attacks.
Addressing our cyber vulnerabilities must be a national security
priority. Just this week, Admiral Rogers, the head of Cyber Command,
reiterated, ``It's only a matter of time before someone uses cyber as a
tool to do damage to critical infrastructure.''
My colleagues don't have to agree with the Senator from Maine or me
or anybody else, but shouldn't we listen to Admiral Rogers, the head of
Cyber Command, probably the most knowledgeable person or one of the
most knowledgeable who said, ``It is only a matter of time before
someone uses cyber as a tool to do damage to critical infrastructure.''
According to the recently retired Chairman of the Joint Chiefs of
Staff, General Martin Dempsey, our military enjoys ``a significant
military advantage'' in every domain except for one--cyber space. As
General Dempsey said, cyber ``is a level playing field. And that makes
this chairman very uncomfortable.''
I will tell you, it makes this chairman very uncomfortable as well.
Efforts are under way to begin addressing some of our strategic
shortfalls in cyber space, including the training of a 6,200-person
cyber force. However, these efforts will be meaningless unless we make
the tough policy decisions to establish meaningful cyber deterrence.
The President must take steps now to demonstrate to our adversaries
that the United States takes cyber attacks seriously and is prepared to
respond.
This legislation is one piece of that overall deterrence strategy,
and it is long past time that Congress move forward on information
sharing legislation. We have been debating similar cyber legislation
since at least 2012. I am glad this body has come a long way since that
time in recognizing that government mandates on the private sector,
which operates the majority of our country's critical infrastructure,
will do more harm than good in cyber space. The voluntary framework in
this legislation properly defines the role of the private sector and
the role of the government in sharing threat information, defending
networks, and deterring cyber attacks.
At the same time, it is unfortunate that it has taken over 3 years to
advance this commonsense legislation. The threats we face in cyber
space are real and imminent, as well as quickly evolving. All aspects
of the Federal Government, including this body, must commit to more
quickly identifying, enacting, and executing solutions to counter cyber
threats. If we do not, we will lose in cyber space.
As chairman of the Armed Services Committee, I consider cyber
security one of the committee's top priorities. That is why the
National Defense Authorization Act provides a number of critical
authorities to ensure that the Department of Defense can develop the
capabilities it needs to deter aggression, defend our national security
interests, and when called upon, defeat our adversaries in cyber space.
I find it unacceptable that the President has signaled his intent to
veto this legislation that, among other key Department of Defense
priorities, authorizes military cyber operations and dramatically
reforms the broken acquisition system that has inhibited the
development and delivery of key cyber capabilities.
More specifically, the National Defense Authorization Act extends
liability protections to Department of Defense contractors who report
on cyber incidents or penetrations, and it authorizes the Secretary of
Defense to develop, prepare, coordinate and, when authorized by the
President, conduct a military cyber operation in response to malicious
cyber activity carried out against the United States or a U.S. person
by a foreign power. The NDAA authorizes $200 million for the Secretary
of Defense to assess the cyber vulnerabilities of every major DOD
weapons system. Finally, Congress required the President to submit an
integrated policy to deter adversaries in cyber space in the fiscal
year 2014 National Defense Authorization Act. I tell my colleagues that
we are still waiting on that policy. This year's NDAA includes funding
restrictions that will remain in place until it is delivered.
As we dither, our Nation grows more vulnerable, our privacy and
security are at greater risk, and our adversaries are further
emboldened. The stakes are high, and it is essential that we pass the
Cybersecurity Information Sharing Act without further delay.
Let me also mention in closing that probably the most disturbing
comment I have heard in a long time on this issue in this challenge is
when Admiral Rogers said that our biggest challenge is we don't know
what we don't know. We don't know what the penetrations have been, what
the attacks have been, whether they have succeeded or not, where they
are in this whole realm of cyber and information at all levels. When
the person we placed in charge of cyber security says we don't know
what we don't know, my friends, that is a very serious situation.
I want to congratulate again both the managers of the bill in their
coordination and their cooperation in this bipartisan effort.
I yield the floor.
Mr. KING. Will the Senator yield for a question?
Mr. McCAIN. I will be pleased to yield.
[[Page S7396]]
Mr. KING. I ask the Senator, would you agree that this bill
represents an important part of our cyber defense but that in order to
deter attacks in the long term, we must have a cyber policy that goes
beyond simple defensive measures?
Mr. McCAIN. I would certainly agree, I would say to my friend from
Maine, because if the adversaries that want to commit cyber attacks
against the United States of America and our allies believe that there
is no price to pay for those attacks, then where is the demotivating
factor in all of this which would, if they failed, then keep them from
doing what they are doing? It seems to me that this is an act of war,
and I don't use that term lightly but I am trying to use it carefully.
If you damage intentionally another nation's military or its economy or
its ability to function as a government--I would ask my friend from
Maine--wouldn't that fit into at least a narrow interpretation of an
act of war? If so, then should we only have defenses? Have we ever been
in a conflict where we only have defenses and not the capability to go
out and deter further aggression?
Mr. KING. I would suggest to the Senator that if you are in a fight
and all you can do is defend and never punch, you are going to
eventually lose that fight. I think this is an important area. The
theory of deterrence, as distasteful as it might have been, the
mutually assured destruction during the nuclear era did in fact prevent
the use of nuclear arms for some 70 years. I think we need to be
thinking about a deterrence that goes beyond simply defensive measures.
I commend the chairman for raising this issue and appreciate your
thoughtful consideration.
Mr. President, I yield the floor.
Mr. LEAHY. Mr. President, it seems as though every week, the American
people learn of yet another data breach in which Americans' sensitive,
private information has been stolen by cyber criminals or foreign
governments. This is a critical national security problem that deserves
action by Congress. But our actions must be thoughtful and responsible,
and we must recognize that strengthening our Nation's cyber security is
a complex endeavor with no single solution.
According to security researchers and technologists, the most
effective action Congress can take to improve our cyber security is to
require better and more comprehensive data security practices. That is
why earlier this year, I introduced the Consumer Privacy Protection
Act. That bill requires companies to utilize strong data security
measures to protect our personal information and to help prevent
breaches in the first place. Companies that benefit financially from
gathering and analyzing our personal information should be obligated to
take meaningful steps to keep it safe.
But rather than taking a comprehensive approach that addresses the
multiple facets of cyber security, the Republican majority appears to
be focused entirely on passing the Senate Intelligence Committee's
cyber security information sharing bill. While legislation to promote
the sharing of cyber threat information could, if done right, be useful
in improving our cyber security, it is a serious mistake to believe
that information sharing alone is the solution. Information sharing
alone would not, for example, have prevented the breach at the Office
of Personnel Management, nor would it have prevented other major
breaches, such as those at Target, Home Depot, Anthem, or Sony.
Instead of ensuring that companies better safeguard Americans' data,
this bill goes in the opposite direction, giving large corporations
more liability protection and even more leeway on how to use and share
our personal information with the government--without adequate privacy
protections.
Also troubling is the fact that the Republican majority has been
intent on jamming this bill through the Senate without any regard for
regular process or opportunity for meaningful public debate. Only last
year, the Republican leader declared his commitment to ``a more robust
committee process'' and plainly stated that ``bills should go through
committee.'' But the bill was drafted behind closed doors by the Senate
Intelligence Committee, and it has not been the subject of any open
hearings or any meaningful public debate. The text of the bill was only
made public after it was reported to the Senate floor, and no other
committee of jurisdiction--including the Judiciary Committee--was
allowed to consider and improve the bill.
The Judiciary Committee was prevented from considering this bill even
though it contains numerous provisions that affect matters squarely
within our jurisdiction. First and foremost, the bill creates a
framework of information sharing that could severely undermine
Americans' privacy. The bill also overrides all existing law to provide
broad liability protections for any company that shares information
with the government. It also overrides important privacy laws such as
the Electronic Communications Privacy Act, ECPA, and the Foreign
Intelligence Surveillance Act, FISA, over which the Judiciary Committee
has long exercised jurisdiction. CISA even amends the Freedom of
Information Act, FOIA, and creates new exemptions from disclosure.
This is just the latest attempt by the majority leader to bypass the
Judiciary Committee and jam a bill through the Senate that contains
provisions within the jurisdiction of the committee. The bill reported
by the Senate Intelligence Committee includes a broad and unnecessary
FOIA exemption. FOIA falls under the exclusive jurisdiction of the
Senate Judiciary Committee and changes affecting this law should not be
enacted without full and careful consideration by the Judiciary
Committee. This important transparency law certainly should not be
amended in closed session by the Senate Intelligence Committee.
Shortly after the text of the bill was released, I shared with
Chairman Grassley my concern that the Judiciary Committee should also
consider this bill. He assured me that there would be a ``robust and
open amendment process'' if this bill were considered on the Senate
floor. But only a few weeks later, the Republican leadership--with
Chairman Grassley's support--attempted to jam the Intelligence
Committee's bill through the Senate as an amendment to the National
Defense Authorization Act, NDAA, without any opportunity for meaningful
debate. Republicans and Democrats joined together to reject the
majority leader's effort to force the cyber security bill onto the
NDAA. Despite this rebuke from both sides of the aisle, just a few
weeks later, the majority leader again attempted to jam the bill
through the Senate in the final days before August recess, without any
serious opportunity to debate and offer amendments.
The majority leader's actions have been part of a consistent
disregard for regular order. He has talked about providing an
opportunity for fair debate, but at the same time, he has used all
procedural mechanisms to stifle process on this bill. Yesterday
afternoon, the Senate moved to consideration of this bill--but then not
even 2 hours later, the majority leader moved to end debate. That
speaks volumes about whether the majority leader is really interested
in a full and open debate, and it is not how the U.S. Senate should
operate--particularly when it comes to a bill with such sweeping
ramifications for Americans' privacy.
Senator Feinstein, the ranking member of the Intelligence Committee,
has consistently said that the Senate ``should have an opportunity to
fully consider the bill and to receive the input of other committees
with jurisdiction in this area.'' She has worked hard to improve the
underlying bill with a managers' amendment that addresses a number of
my concerns, particularly in regard to FOIA, limiting the sharing of
information for cyber security purposes only, and ensuring that the
bill would not allow the government to use information to investigate
crimes completely unrelated to cyber security. I appreciate these
improvements, and Senator Feinstein's efforts to include them in the
bill. But again, this bill still has some serious problems and requires
a full, public debate. The bill still includes, for example, a FOIA
exemption that I believe is overly broad and unnecessary.
In July, the Department of Homeland Security wrote a letter to
Senator Franken stating that in their view the bill raises significant
operational concerns and certain provisions threaten to severely
undermine Americans' privacy. Last week, the Computer & Communications
Industry Association--an
[[Page S7397]]
organization that includes Google, Facebook, and Yahoo!--voiced serious
concerns that the bill fails to protect users' privacy and could
``cause collateral harm'' to ``innocent third parties.'' And this week,
major tech companies such as Apple, Dropbox, Twitter, and Yelp have
vocally opposed the bill citing concerns for their users' privacy.
The latest version of the bill contains a number of improvements that
I and other Senators have been fighting for, and I am glad to see that
we are making progress. But we still have work to do on this bill, and
the Senate must have an open and honest debate about the Senate
Intelligence Committee's bill and its implications for Americans'
privacy. I agree that we must do more to protect our cyber security,
but we must be responsible in our actions. Legislation of this
importance should not be hastily pushed through the Senate, without a
full and fair opportunity for Senators to consider the ramifications of
this bill. Unfortunately, by moving so quickly to end debate, it
appears that the majority leader is trying to do just that.
Ms. MIKULSKI. Mr. President, I wish to support the Cybersecurity
Information Sharing Act of 2015.
Cyber security is the most pressing economic and national security
threat facing our country today. As a member of the Senate Select
Committee on Intelligence, I am keenly aware of the damage cyber
attacks cause on our Nation. As vice chairwoman of the Senate
Appropriations Committee, I believe we must have a clear and
comprehensive approach to funding cyber security.
In boardrooms and around kitchen tables, concern over cyber security
is heightening. It is gaining new traction following the cyber attack
on the Office of Personnel Management, which compromised the personal
information of more than 22 million Federal employees, contractors, and
their families.
The American people expect serious action by Congress. This can and
must be done, while respecting privacy and avoiding data misuse by the
government or businesses. Congress must act with a sense of urgency to
pass the Cybersecurity Information Sharing Act. If we wait for another
major cyber attack, we risk overreacting, overregulating, overspending,
and overlegislating. The time to act is now.
Our Nation is under attack. Every day, cyber attacks are happening.
Cyber terrorists are working to damage critical infrastructure by
taking over the power grid or disrupting air traffic control. Cyber
spies are moving at breakneck speeds to steal state secrets,
intellectual property, and personal information. Cyber criminals are
hacking our networks, stealing financial information, and disrupting
business operations. These cyber attacks can disrupt critical
infrastructure, wipe out a family's entire life savings, take down
entire companies, and put human lives at risk. In the past year alone,
we've seen cyber attacks against Sony, Home Depot, UPS, JP Morgan
Chase, Experian, T-Mobile, Scottrade, and the list goes on. The
economic losses of cyber crime are stunning. In 2014, the Center for
Strategic and International Studies and McAfee estimated the annual
cost from cyber crime to be over $400 billion.
I have been working on cyber issues since I was elected to the
Senate. Our cyber warriors at the National Security Agency are in
Maryland, and I have been working with the NSA to ensure signals
intelligence was a national security focus even before cyber was a
method of warfare.
In my role on the Intelligence Committee, I served on the Cyber
Working Group, which developed findings to guide Congress on getting
cyber governance right, protecting civil liberties, and improving the
cyber workforce.
As vice chairwoman of the Appropriations Committee and the Commerce,
Justice, and Science Subcommittee, I put funds in the Federal checkbook
for critical cyber security agencies. These include the Federal Bureau
of Investigation, which investigates cyber crime; the National
Institute of Standards and Technology, which works with the private
sector to develop standards for cyber security technology; and the
National Science Foundation, which researches ways to secure our
Nation. As a member of the Appropriations Subcommittee on Defense, I
fight for critical funding for the intelligence and cyber agencies,
including the National Security Agency, Central Intelligence Agency,
and Intelligence Advanced Research Projects Activity, who are coming up
with the new ideas to create jobs and keep our country safe. These
funds are critical to building the workforce and providing the
technology and resources to make our cyber security smarter, safer, and
more secure.
This bill does three things from a national security perspective.
First, it allows businesses and government to voluntarily share
information about cyber threats. Second, it requires the Director of
National Intelligence to share more cyber threat information with the
private sector, both classified and unclassified. Third, it establishes
a Department of Homeland Security ``portal'' for cyber info-sharing
with the government to help dot-gov and dot-com in a constitutional
manner. These three provisions are an innovation. Despite all the
amazing talent companies have, many are being attacked and don't even
realize it. This legislation allows unprecedented dot-com and dot-gov
cooperation. There are also key provisions on privacy protections and
liability protection for companies that monitor their own networks or
share information.
Why do we need a bill to make these vital partnerships happen?
America is under attack every second of every day. The threat is here,
and it is now. If we do not act or if we let the perfect be the enemy
of the good, this country will be more vulnerable than ever before, and
Congress will have done nothing.
This bill is not perfect. The Department of Homeland Security's role
has been criticized by many, including myself. I have been skeptical
about their ability to perform some duties assigned in this bill. I am
still skeptical, although less so than before. But this bill takes
important steps to diversify government and private sector actors, so
we are not just focusing on DHS, but also keeping civilian agencies in
charge. We cannot have intelligence agencies leading this effort with
the private sector. Some would like to see that go further, but that is
what the amendment process is for.
People in the civil liberties community worry that this bill could
allow government intrusions into people's privacy. This was of
tantamount concern for me. If we don't protect civil liberties, the
added security is for naught because we lose what we value most: our
freedom. The authors of this bill, especially Senator Feinstein, have
made key improvements on issues of law enforcement powers and
protecting core privacy concerns. While not everyone is entirely
pleased, this bill has made important strides to balance information
sharing and privacy.
The business community is concerned because it fears strangulation
and overregulation. They worry that they will open themselves up to
lawsuits if they participate in the program with the government. I have
heard from Maryland businesses and these are valid concerns.
Importantly, this bill has made strides in accommodating business and
builds a voluntary framework to allow businesses to choose that
protection. Protection does not come without responsibility for
participants, but this bill links the need for cyber security,
appropriate liability protection, and the expertise of our business
community in a way that answers a lot of companies' concerns. We cannot
eliminate all government involvement in this issue because it simply
won't work, and we will lose key government expertise in the Department
of Defense, Federal Bureau of Investigation, and elsewhere. However, we
can work to try to minimize it while maintaining the government's role
in protecting national security.
I am so proud that the Senate came together in a bipartisan way to
draft and pass this legislation. The Senate must pass this legislation
now. Working together, we can make our Nation safer and stronger and
show the American people we can cooperate to get an important job done.
Amendment No. 2557
Mr. President, today I wish to speak about my amendment to the cyber
security bill. This amendment would provide an additional $37 million
for the Office of Personnel Management, OPM,
[[Page S7398]]
to accelerate completion of its information technology, IT,
modernization and thwart future cyber attacks.
This additional funding would allow OPM to make needed upgrades to
cyber security and network systems 1 year ahead of schedule. This means
OPM will not have to wait another year to protect sensitive personnel
data by implementing hardware and software upgrades recommended by
security experts.
The $37 million is designated as an emergency under the Budget
Control Act of 2011.
For over a year, the Office of Personnel Management's systems were
compromised. This hack exposed the financial and personal information
of 22 million Federal employees and their families, contractors, job
candidates and retirees. This is unacceptable.
OPM's retirement services and background investigation databases
contain the most sensitive data OPM holds, including Social Security
numbers, health information and fingerprints.
I have heard from employees across the government. Data breaches
undermine morale and complicate their ability to serve the American
people.
OPM has moved to provide protections, but that is not enough.
Securing these systems must be done now. We can't wait for the next
budget cycle.
I urge support for my amendment. This is a crisis, so we ought to
treat it like one. Twenty-two million Americans who entrusted their
data and fingerprints to the government deserve the highest standard of
protection.
There is a reason OPM was exploited. Federal cyber security has been
weak. The Appropriations Committee has consistently given agencies the
resources they asked for to protect their dot-gov systems. But under
sequester-level budgeting it hasn't been enough. Constrained agencies
don't ask for what is truly needed to do the cyber security job.
Tight budgets mean immediate problems get requested and funded before
other much needed IT protection and maintenance. We aren't even doing
the simple things.
After the OPM breach, the Office of Management and Budget, OMB,
conducted a cyber sprint. OMB asked agencies to take four minimal
steps: No. 1, deploy Department of Homeland Security malicious activity
detectors; No. 2, patch critical vulnerabilities; No. 3, tighten
privileged user policies; and No. 4, accelerate deployment of
multifactor authentication.
While there was improvement, only 14 of the 24 agencies met the
fourth goal. Some of it is a lack of will, but some is a lack of
resources.
OPM knows it needs to harden its information technology.
That is why I am offering this amendment, providing $37 million in
emergency spending to harden OPM systems now--not a year from now.
These funds meet the criteria for being designated as emergency
spending as set out in the Budget Control Act of 2011. OPM's needs are
urgent, temporary, and, regrettably, unforeseen.
What does it mean to designate funds as emergency spending? It means
no offsets, so we don't pay for this amendment by drawing from existing
funding used to defend the Nation or help America's families.
The need is urgent--our adversaries are still trying to attack us.
The need is temporary--these are one-time costs to accelerate IT
reform. And the need is unforeseen which is sadly the reason they were
not requested in the President's fiscal year 2016 budget in February.
Some say this funding is premature, and OPM is not ready to deploy it
effectively. However, those reports were written before Beth Cobert
became OPM Acting Director. She is turning OPM around, but she needs
the resources to secure OPM's IT systems, and cyber security is a
critical issue.
Government can't be reckless with the sensitive data it has. We must
do better with dot-gov and get our own house in order. We know what OPM
needs to do--they have the will, they have a business plan, and now
they need the wallet.
Vote for my amendment No. 2557 to get OPM the resources it needs.
The PRESIDING OFFICER. The Senator from Wisconsin.
[...]
Amendment No. 2582
Mr. FLAKE. Mr. President, I rise to speak in support of the Flake
amendment No. 2582 that is currently pending before the body. This
amendment is very simple. It simply adds a 6-year sunset to the bill.
This amendment also keeps in place the liability protections
established by the Cyber Security and Information Sharing Act for
information that is shared pursuant to the requirements of the bill.
Furthermore, the amendment ensures that the requirements on how the
information is shared under the act is to be handled remain in effect
after the sunset date.
That is all this amendment does. It simply sunsets the bill in 6
years, and it does so in a reasonable and responsible way. I believe in
the sunset provision. It is good for us to consider our past decisions
6 years from now, to determine whether what we enacted is operating
well, and to debate the overall success of the legislation that we
passed 6 years prior. We ought to do that, frankly, on a lot of other
legislation we pass.
I do believe the bill we are currently considering, as it is written,
strikes the right balance. It puts in place the proper privacy
protections, and I plan to support the legislation. However, it is
important to make sure that we are forced to go back and evaluate it in
the years to come to make sure we actually got it right. Given the
nature of the bill being debated before us, it is all the more
important to do so in this instance.
I would also note that this 6-year sunset is similar to sunset
provisions that were included in both House-passed cyber security
bills. So if it is in the House, we ought to have it in the Senate as
well.
Both the Protecting Cyber Networks Act, which passed the House by a
vote
[[Page S7405]]
of 307 to 116, and the National Cybersecurity Protection Advancement
Act, which passed the House by a vote of 355 to 63, include a 7-year
sunset.
I ask my colleagues to support this amendment. I think it does
strengthen the bill. It ensures that we evaluate, as we should, any
legislation that we pass to ensure that it is having its intended
effect.
I yield back the remainder of my time.
I suggest the absence of a quorum.
The PRESIDING OFFICER (Mr. Lee). The clerk will call the roll.
The senior assistant legislative clerk proceeded to call the roll.
The PRESIDING OFFICER. The Senator from Louisiana.
Mr. VITTER. I ask unanimous consent that the order for the quorum
call be rescinded.
The PRESIDING OFFICER. Without objection, it is so ordered.
[...]