[Congressional Record Volume 161, Number 158 (Tuesday, October 27, 2015)]
[Senate]
[Pages S7498-S7510]
CYBERSECURITY INFORMATION SHARING ACT OF 2015
The PRESIDING OFFICER. Under the previous order, the Senate will
resume consideration of S. 754, which the clerk will report.
The senior assistant legislative clerk read as follows:
A bill (S. 754) to improve cybersecurity in the United
States through enhanced sharing of information about
cybersecurity threats, and for other purposes.
Pending:
Burr/Feinstein amendment No. 2716, in the nature of a
substitute.
Burr (for Cotton) modified amendment No. 2581 (to amendment
No. 2716), to exempt from the capability and process within
the Department of Homeland Security communication between a
private entity and the Federal Bureau of Investigation or the
United States Secret Service regarding cybersecurity threats.
Feinstein (for Coons) modified amendment No. 2552 (to
amendment No. 2716), to modify section 5 to require DHS to
review all cyber threat indicators and countermeasures in
order to remove certain personal information.
Burr (for Flake/Franken) amendment No. 2582 (to amendment
No. 2716), to terminate the provisions of the Act after ten
years.
Feinstein (for Franken) further modified amendment No. 2612
(to amendment No. 2716), to improve the definitions of
cybersecurity threat and cyber threat indicator.
Burr (for Heller) modified amendment No. 2548 (to amendment
No. 2716), to protect information that is reasonably believed
to be personal information or information that identifies a
specific person.
Feinstein (for Leahy) modified amendment No. 2587 (to
amendment No. 2716), to strike the FOIA exemption.
Feinstein (for Mikulski/Cardin) amendment No. 2557 (to
amendment No. 2716), to provide amounts necessary for
accelerated cybersecurity in response to data breaches.
Feinstein (for Whitehouse/Graham) modified amendment No.
2626 (to amendment No. 2716), to amend title 18, United
States Code, to protect Americans from cybercrime.
Feinstein (for Wyden) modified amendment No. 2621 (to
amendment No. 2716), to improve the requirements relating to
removal of personal information from cyber threat indicators
before sharing.
The PRESIDING OFFICER. Under the previous order, the time until 11
a.m. will be equally divided between the two leaders or their
designees.
The assistant Democratic leader.
Mr. DURBIN. Mr. President, the debate which we will engage in today
on the floor of the Senate is really one that parallels the historic
debates that have occurred in the course of our Nation's history. When
a great democracy sets out to defend its citizens and to engage in
security, it really is with a challenge: Can we keep our Nation safe
and still protect our rights and liberties? That question has been
raised, and that challenge has been raised time and again.
It was President Abraham Lincoln during the Civil War who suspended
the right of habeas corpus. It was challenged by some as an
overextension by the executive branch, but President Lincoln thought it
was necessary to resolve the Civil War in favor of the Union. In World
War I, the passage of the Alien and Sedition Acts raised questions
about the loyalty of Americans who question many of the great issues
that were being raised during that war. We certainly all remember what
happened during World War II when, even under President Franklin
Roosevelt, thousands of Japanese Americans were interned because of our
concerns about safety and security in the United States. It continued
in the Cold War with the McCarthy hearings and accusations that certain
members of the State Department and other officials were, in fact,
Communist sympathizers. That history goes on and on.
So whenever we engage in a question of the security and safety for
our Nation, we are always going to be faced
[[Page S7499]]
with that challenge. Are we going too far? Are we giving too much
authority to the government? Are we sacrificing our individual rights
and liberty and privacy far more than we should to keep this Nation
safe? That, in fact, is the debate we have today on the most
sophisticated new form of warfare--cyber war.
Cyber security is an enormous concern not just for private companies
but for every American. Data breaches happen almost every day. We read
not that long ago that 21 million current and former Federal employees
had their records breached and stolen from the Office of Personnel
Management. Just this month more than 700,000 T-Mobile users in my home
State may have had their information compromised by hackers. It seems
there isn't a month that goes by where we don't hear of another
security breach. That is why we need to take steps to improve data
security and share cyber threat information.
Chairman Burr and Ranking Member Feinstein worked long and hard to
put together a bill to encourage private and governmental entities to
share potential threat information. This bill has evolved over 5 years.
No one has worked harder during that period of time than my colleague,
Senator Feinstein of California. Senator Burr is now joining her in
this effort.
Many are skeptical about the bill before us. Some have raised those
concerns on the floor. But we look at the major companies that are
opposing this bill as currently written--Apple, IBM, Microsoft, Google,
Facebook, and Amazon--just a few of the major companies that have said
they can't support the bill that is on the floor today. They note that
the bill does not require companies or the Federal Government to
protect private information, including personal emails, email
addresses, and more. In fact, this bill preempts all laws that would
prevent a company or agency from sharing personal information.
I am encouraged that the managers of this bill have moved in the
direction of addressing this concern. They have limited the
authorization to share cyber threat information to ``cyber security
purposes''--a valuable step toward making sure the bill is not used as
surveillance. They have included a provision requiring government
procedures to notify Americans if their information is shared
mistakenly by the government. They have clarified that the
authorization to employ defensive measures--or defensive ``hacking''--
does not allow an entity to gain unauthorized access to another's
computer network.
There will be some amendments before us today that I will support
which I think strengthen the privacy protections that should be
included in this bill.
I am a cosponsor of the Franken amendment to improve the definitions
of ``cyber security threat'' and other cyber threat indicators.
Narrowing this definition from information that ``may'' be a threat to
information that is ``reasonably likely'' to pose a threat would reduce
the amount of potentially personal information shared under the bill.
I also urge my colleagues to support the Wyden amendment to
strengthen the requirement that private companies remove sensitive
personal information before sharing cyber threat indicators. Again,
this amendment would limit the amount of potentially personal
information shared under the bill.
I support the Coons amendment to give the Department of Homeland
Security time to remove or scrub personal information from the
information it shares with other Federal agencies. There is simply no
need for personal information unrelated to a threat to be shared with
law enforcement agencies such as the Department of Justice and NSA.
These amendments would strengthen privacy protections in the bill
much more than the original managers' package. I look forward to
working with Senators Burr and Feinstein and others to ensure that the
final bill addresses our cyber security concerns while still protecting
privacy--something I know we all want to do.
Mr. President, I yield the floor.
Mrs. FEINSTEIN. Mr. President, I suggest the absence of a quorum.
The PRESIDING OFFICER. The clerk will call the roll.
The senior assistant legislative clerk proceeded to call the roll.
Mrs. FEINSTEIN. Mr. President, I ask unanimous consent that the order
for the quorum call be rescinded.
The PRESIDING OFFICER. Without objection, it is so ordered.
Mrs. FEINSTEIN. Mr. President, I ask unanimous consent that the time
be charged equally on both sides.
The PRESIDING OFFICER. Is there objection?
Without objection, it is so ordered.
Mrs. FEINSTEIN. I suggest the absence of a quorum.
The PRESIDING OFFICER. The clerk will call the roll.
The senior assistant legislative clerk proceeded to call the roll.
Mr. BURR. Mr. President, I ask unanimous consent that the order for
the quorum call be rescinded.
The PRESIDING OFFICER. Without objection, it is so ordered.
Mr. BURR. Mr. President, shortly we will once again begin the process
on the cyber security bill. We will start votes hopefully right at 11
o'clock. We will try to work through five amendments this morning and
return this afternoon with a short period of debate, and once again, at
4 o'clock, we will take up five additional votes--or possibly four--and
be at the point where we could conclude this legislation.
Let me say to my colleagues that the Senate has tried for several
years now to bring cyber security legislation to the Senate floor and
find the will to pass it. With the work of the vice chairman, I think
we have been able to succeed in that. We enjoyed a 14-to-1 vote out of
the committee, showing tremendous bipartisan support. Thousands of
businesses and almost 100 organizations around the country are
supportive of the bill. But, more importantly, in the last several days
the bill has gained the support of the Wall Street Journal and the
Washington Post--not necessarily publications that chime in on the need
for certain pieces of legislation from the Senate floor, but in this
particular case, two publications understand the importance of cyber
security legislation getting signed into law.
This is the first step, and conferencing with the House will come
shortly after. I am proud to say that we already have legislation the
White House says they support. So I think we are in the final stretches
of actually getting legislation into law that would voluntarily allow
companies to partner with the Federal Government when their systems
have been breached, when personal data is at risk.
I still say today to those folks both in this institution and outside
of this institution who are concerned with privacy that I think the
vice chairman and I have bent over backward to accommodate concerns.
Some concerns still exist. We don't believe they are necessarily
accurate and that only by utilizing this system will, in fact, we
understand whether we have been deficient anywhere.
There are also several companies that are not supportive of this
bill, as is their right. I will say this: From the beginning, we
committed to make this bill voluntary, meaning that any company in
America, if its systems are breached, could choose voluntarily to
create the partnership with the Federal Government. Nobody is mandated
to do it. So I speak specifically to those companies right now: You
might not like the legislation, but for goodness' sakes, do not deprive
every other business in America from having the opportunity to have
this partnership. Do not deprive the other companies in this country
from trying to minimize the amount of personal data that is lost
because there has been a cyber attack. Do not try to stop this
legislation and put us in a situation where we ignore the fact that
cyber attacks are going to happen with greater frequency from more
individuals and that the sooner we learn how to defend our systems, the
better off personal data will be in the United States of America.
This is a huge deal. The vice chairman and I from day one have said
to our Members that we will entertain any good ideas that we think
strengthen the bill. On both sides of the aisle, we have said to
Members that if this breaks the agreement that we have for the support
we need, because they don't believe the policy is right, then
[[Page S7500]]
we will lock arms and we will vote against amendments.
We have about eight amendments today. On a majority of those, we will
do that. I am proud to tell my colleagues that during the overnight and
this morning--we will announce today that we have taken care of the
Flake amendment with a modification. We are changing the sunset on the
legislation to 10 years, and we will accept the Flake amendment on a
voice vote later this morning. We continue even over these last hours
to try to modify legislation that can be agreed to on both sides of the
aisle but, more importantly, without changing the delicate balance we
have tried to legislate into this legislation.
I am sure Members will come down over the next 35 minutes, but at
this time I will yield the floor so the vice chairman can seek time.
The PRESIDING OFFICER. The Senator from California.
Mrs. FEINSTEIN. Thank you, Mr. President.
I wish to begin by thanking the chairman for his work on the bill.
For me, this has been a 6-year effort. It hasn't been easy. It hasn't
been easy because we have tried to strike a balance and make the bill
understandable so that there would be a cooperative effort to share
between companies and the government.
Last Thursday the Senate showed its support for moving forward with
two strong votes. We had a vote of 83 to 14 to invoke cloture on the
substitute amendment, showing that there is, in fact, deep bipartisan
support for moving significant legislation to the President's desk.
To that end, I ask unanimous consent that editorials from the two
major U.S. newspapers be printed in the Record.
There being no objection, the material was ordered to be printed in
the Record, as follows:
[From the Washington Post, Oct. 22, 2015]
The Senate Should Take a Crucial First Step on Cybersecurity
(By Editorial Board)
After years of failure to find a consensus on
cybersecurity, the Senate is expected to vote early next week
on a bill that would enable the government and the private
sector to share information about malicious threats and
respond to them more quickly. The legislation is not going to
completely end the tidal wave of cyberattacks against the
government and corporations, but passing it is better than
doing nothing--and that is where Congress has left the matter
in recent years.
The legislation, approved by the Senate Select Committee on
Intelligence on a bipartisan 14-to-1 vote in March, is
intended to iron out legal and procedural hurdles to sharing
information on cyberthreats between companies and the
government. Private-sector networks have been extremely
vulnerable, while the government possesses sophisticated
tools that might be valuable in defending those networks. If
threats are shared in real time, they could be blunted. The
legislation is not a magic wand. Hackers innovate destructive
and intrusive attacks even faster than they can be detected.
The information sharing would be voluntary. But the bill is
at least a first step for Congress after several years of
inconclusive debate over how to respond to attacks that have
infiltrated networks ranging from those of Home Depot to the
Joint Chiefs of Staff.
The biggest complaint about the bill is from privacy
advocates, including Sen. Ron Wyden (D-Ore.), who cast the
sole dissenting vote on the intelligence committee. His
concerns have been amplified recently by several tech giants.
Apple told The Post this week that it opposes the legislation
because of privacy concerns. In a statement, the company
said, ``The trust of our customers means everything to us and
we don't believe security should come at the expense of their
privacy.'' Some other large technology firms are also
opposing the bill through a trade association. Separately,
alarmist claims have been made by privacy advocates who
describe it as a ``surveillance'' bill.
The notion that there is a binary choice between privacy
and security is false. We need both privacy protection and
cybersecurity, and the Senate legislation is one step toward
breaking the logjam on security. Sponsors have added privacy
protections that would scrub out personal information before
it is shared. They have made the legislation voluntary, so if
companies are really concerned, they can stay away. Abroad
coalition of business groups, including the U.S. Chamber of
Commerce, has backed the legislation, saying that cybertheft
and disruption are ``advancing in scope and complexity.''
The status quo is intolerable: Adversaries of the United
States are invading computer networks and hauling away
sensitive information and intellectual property by the
gigabyte. A much stronger response is called for in all
directions, both to defend U.S. networks and to punish those,
such as China, doing the stealing and spying. This
legislation is a needed defensive step from a Congress that
has so far not acted on a vital national concern.
____
[From the Wall Street Journal, Oct. 26, 2015]
A Cyber Defense Bill, at Last
Data sharing can improve security and consumer privacy
By now everyone knows the threat from cyber attacks on
American individuals and business, and Congress finally seems
poised to do something about it. As early as Tuesday the
Senate may vote on a bill that would let businesses and the
government cooperate to shore up U.S. cyber defenses.
This should have been done long ago, but Democrats blocked
a bipartisan bill while they controlled the Senate and
President Obama insisted on imposing costly new cyber-
security mandates on business. The GOP Senate takeover in
2014 has broken the logjam, helped by high-profile attacks
against the likes of Sony, Home Depot, Ashley Madison and the
federal Office of Personnel Management.
Special thanks to WikiLeaks, the anti-American operation
that last week announced that its latest public offering
would be information hacked from the private email account of
CIA chief John Brennan. We assume Mr. Brennan's government
email is better protected, but then this is the same
government that let Hillary Clinton send top-secret
communications on her private email server.
Democrats have decided it's now bad politics to keep
resisting a compromise, and last week the Cybersecurity
Information Sharing Act co-sponsored by North Carolina
Republican Richard Burr and California Democrat Dianne
Feinstein passed the filibuster hurdle. A similar bill passed
the House in April 307-106.
The idea behind the legislation is simple: Let private
businesses share information with each other, and with the
government, to better fight an escalating and constantly
evolving cyber threat. This shared data might be the
footprint of hackers that the government has seen but private
companies haven't. Or it might include more advanced
technology that private companies have developed as a
defense.
Since hackers can strike fast, real-time cooperation is
essential. A crucial provision would shield companies from
private lawsuits and antitrust laws if they seek help or
cooperate with one another. Democrats had long resisted this
legal safe harbor at the behest of plaintiffs lawyers who
view corporate victims of cyber attack as another source of
plunder.
The plaintiffs bar aside, the bill's main opponents now are
big tech companies that are still traumatized by the fallout
from the Edward Snowden data theft. Apple, Dropbox and
Twitter, among others, say the bill doesn't do enough to
protect individual privacy and might even allow government
snooping.
Everyone knows government makes mistakes, but the far
larger threat to privacy is from criminal or foreign-
government hackers who aren't burdened by U.S. due-process
protections. Cooperation is voluntary, and the bill includes
penalties if government misuses the information. Before
either side can share data, personal information that might
jeopardize customer privacy must be scrubbed.
The tech giants are the outliers in this debate, while
nearly all of the rest of American business supports the
bill. The White House has said Mr. Obama will sign the
legislation, which would make it a rare example of bipartisan
cooperation. The security-privacy debate is often portrayed
as a zero-sum trade-off, but this bill looks like a win for
both: Helping companies better protect their data from cyber
thieves will enhance American privacy.
Mrs. FEINSTEIN. The first is from the Washington Post dated October
22, entitled ``The Senate should take a crucial first step on
cybersecurity.'' The second is in today's Wall Street Journal, and it
is entitled ``A Cyber Defense Bill, At Last: Data sharing can improve
security and consumer privacy.''
I also note the endorsement from Secretary Jeh Johnson on October 22.
I have been privileged to work with our chairman. We have really
tried to produce a balanced bill. We have tried to make it
understandable to private industry so that companies understand it and
are willing to cooperate. This bill will allow companies and the
government to voluntarily share information about cyber threats and the
defensive measures they might be able to implement to protect their
networks.
Right now, the same cyber intrusions are used again and again to
penetrate different targets. That shouldn't happen. If someone sees a
particular virus or harmful cyber signature, they should tell others so
they can protect themselves.
That is what this bill does. It clears away the uncertainty and the
concerns that keep companies from sharing this information. It provides
that two competitors in a market can share information on cyber threats
with each other without facing anti-trust suits. It provides that
companies sharing
[[Page S7501]]
cyber threat information with the government for cyber security
purposes will have liability protection.
As I have said many times, the bill is completely voluntary. If a
company doesn't want to share information, it does not have to.
Today, we will vote on up to seven amendments. As late as this
morning, Senator Burr and I have been working to see if we can reach
agreement to accept or voice vote some of them, and I hope these
discussions will be successful. However, I remain in agreement with
Chairman Burr that we will oppose any amendments that undo the careful
compromises we have made on this bill. Over the past 10 months, we have
tried to thread a needle in fact to draft a bill that as I said gives
the private sector the insurances it needs to share more information
while including privacy protections to make sure Americans' information
is not compromised.
I see on the floor the ranking member of the Homeland Security and
Governmental Affairs Committee, the distinguished Senator from
Delaware, and I thank Senator Carper for all he has done to help us and
also to make what I consider a major amendment on this bill, which as
you know has been accepted.
Several of today's amendments would undo this balance. Senators
Wyden, Heller, and Franken have amendments that would lead to less
information sharing. Each of them would replace clear requirements that
are now in the bill on what a company or a government must do prior to
sharing information with a new subjective standard that would insert
the concern of legal liability.
I would offer to work with these Senators and others as the bill
moves forward and hopefully goes into conference to see if there is a
way to achieve their goals without interfering with the bill's goal of
increasing information sharing.
Senator Leahy's amendment would similarly decrease the amount of
sharing by opening up the chances of public disclosure through the
Freedom of Information Act of cyber threats shared under this bill.
While the bill seeks to share information about the nature of cyber
threats and suggestions on how to defend networks, this information
should not be made widely available to hackers and cyber criminals who
could use it for their own purposes.
Senator Burr and I worked closely with Senators Leahy and Cornyn in
putting together the managers' package to remove a FOIA exemption that
they viewed as unnecessary and harmful. I am pleased we were able to
reach that agreement. However, the FOIA exemption that remains in the
bill is needed to encourage companies to share this information, and I
would oppose this amendment.
The President has an amendment on the other side of the spectrum
which I will also strongly oppose. This amendment would basically undo
one of the core concepts of this bill. Instead of requiring cyber
information to go through a single portal at the Department of Homeland
Security, it would allow companies to share cyber information directly
with the FBI or the Secret Service and still provide full liability
protection.
This change runs afoul of one of the most important privacy
protections in the bill, which was to limit direct sharing of this
cyber information with the intelligence community or with law
enforcement. In other words, everything will go through the portal
first, where it will receive an additional scrub to remove any residual
personal information and then go to the respective departments. In this
way the privacy is kept by not being able to misuse the authority to
provide unrelated information directly to departments.
If there is a crime, companies should be able to share information
with law enforcement--I agree with that--but that is not what this bill
is about. This bill is about sharing cyber information on threats so
there can be greater awareness and better defenses.
When there is a cyber crime and law enforcement is called in, we are
talking about very different information. When the FBI investigates, it
takes entire databases and servers. It looks at everything--far beyond
the cyber information that could be lawfully shared in this act. So
sharing with the FBI outside of the DHS portal may be appropriate in
certain cases but not as a parallel option for cyber threat
information.
In fact, our bill already makes clear in section 105(c)(E) that it
``does not limit or prohibit otherwise lawful disclosures of
communications, records, or other information, including reporting of
known or suspected criminal activity.'' I would just refer to this
chart which quotes section 105(c). It says exactly that.
This amendment would undo the key structure of this bill--the central
portal for sharing information located at the Department of Homeland
Security--and decrease the ability of the government to effectively
manage all the cyber information it receives. So I will oppose this
amendment and urge my colleagues to do the same.
I very much appreciate that the Senate will complete its
consideration of this bill today. We still have a long way to go. We
have to conference the House bill with our bill. I want to make this
offer, and I know I think I speak for the chairman as well, that we are
happy to work with any Member as we go into conference, but I hope we
can complete these last few votes without upsetting the careful
negotiations and compromise we have been able to reach.
Again, I thank the Chair.
I yield back the remainder of my time, and I yield the floor.
The PRESIDING OFFICER. The Senator from Delaware.
Mr. CARPER. Let me start off by saying to Senator Feinstein, 6 years
ago, you, along with Senators Susan Collins, Joe Lieberman, Jay
Rockefeller, and others started leading the effort to put in place
comprehensive cyber security legislation and offered the first
comprehensive bill dealing with information sharing. We had a vote in
late 2012. It came up short, and we started all over again in the last
Congress. You have shown great leadership right from the start. I thank
you and I thank Senator Burr, the chair of the committee. I thank you
for cooperating with us and with others to make sure that we have not
just a good bill but a very good bill that addresses effectively the
greatest challenges we face in our country.
I have heard Senator Feinstein say this time and again, and I will
say it again today: If companies don't want to share information with
the Federal Government, they don't have to. It is elective. In some
cases they can form their own groups called ISOCs that will share
information with one another. They don't have to share information on
attacks with the Federal Government. They can share it with other peers
if they wish to, but if they do share it with the Federal Government,
with a couple of narrow exceptions, we ask that it be shared with the
Department of Homeland Security because the Department of Homeland
Security is set up in large part to provide a privacy scrub.
Next month the DHS will have the ability, when these threat
indicators come through that are reported by other businesses across
the country, in real time to be able to scrub that information through
the portal and remove from it personally identifiable information that
should not be shared with other Federal agencies, and just like that,
bingo, we are off to the races. It is a smart compromise that I am
pleased and grateful to have worked out with Senators Burr and
Feinstein and their staff. I thank both their staff and ours as well.
The other piece is the legislation we literally took out of the
Committee on Homeland Security and Governmental Affairs that has been
pending. I think the entire title 2 of the managers' amendment is the
legislation that Senator Johnson and I have worked on. We are grateful
for that.
One piece of it is something called EINSTEIN 1, 2, and 3--not to be
confused with the renowned scientist, Albert Einstein. But we have
something called EINSTEIN 1, EINSTEIN 2, and EINSTEIN 3. What do they
mean? What this legislation does is it means we are going to use these
tools--we are going to continue to update and modernize these tools--
to, No. 1, record intrusions; No. 2, to be able to detect the bad stuff
coming through into the Federal Government; and No. 3, block it.
We are going to make sure it is not just something that is positive
work on a piece of paper but that 100 percent of
[[Page S7502]]
the Federal agencies are able to use these new tools. Senator Johnson
and I worked on legislation included in this package that uses
encryption tools and doubles the number of processes we have available
to better protect our information.
Finally, I would mention that Senator Collins, the former chair of
the Homeland Security Committee--she and a number of our colleagues,
including Senator Mikulski, Senator McCaskill, and others, have worked
on legislation that we added to and all of that was reported out of the
committee. All of this together is a very robust defender of our dot-
gov domain and could be used to help those outside the Federal
Government as well.
Going back to the last Congress, Tom Coburn and I worked together to
do three things to strengthen the Department of Homeland Security to
let it do its job. Growing up, I remember seeing cartoon ads in a
magazine about some guy at the beach kicking sand on a smaller guy. The
smaller guy in this case would have been the Department of Homeland
Security, with respect to their ability to provide robust defense
against cyber attacks. If I can use that cartoon as an analogy, in the
past, the Department of Homeland Security was the 98-pound weakling,
and it is no weakling anymore. Legislation that Dr. Coburn and I
offered, passed in the Congress, to, No. 1, say the cyber ops center in
the Department of Homeland Security is real. We are standing it up. We
are making it real and robust.
The Federal Information Security Management Act for years was a
paperwork exercise and was a once-a-year check to make sure our cyber
defenses were secure. We are transforming that into a 24/7, robust,
around-the-clock operation by modifying legislation and improving
legislation called FISMA. We also in that legislation make clear what
OMB's job is and we make clear what the job of the Department of
Homeland Security is.
Finally, for years the Department of Homeland Security hired and
trained cyber warriors, and just as they were getting really good, they
were hired away because we couldn't retain them. We couldn't pay them
or provide retention bonuses or hiring bonuses. We need to make sure we
have some of the best cyber warriors in the world working at the
Department of Homeland Security. Now DHS has that authority, and we
will be able to hire these people.
Putting all this together, folks, what we have done is move the
needle. With passage of this legislation we will move the needle and we
need to do that.
There will be discussion later on of amendments. There are a couple
of them that for this Senator are especially troubling. Senator
Feinstein has mentioned a couple of them, and I suspect Senator Burr
has mentioned them as well. We will look at them as we go through, but
a couple of them set this legislation back and I will very strongly
oppose them.
Having said that, regarding the old saying--I am tired of hearing it
and I am tired of saying it, but ``don't let the perfect be the enemy
of the good.'' This isn't just good legislation, this is very good
legislation, and it has gotten better every step of the way because of
the willingness of the ranking member and the chairman of the Intel
Committee to collaborate. The three C's at work are communicating,
compromising, and collaborating. We should work out these amendments
today and pass this bill.
I thank the Chair.
The PRESIDING OFFICER. The Senator from Nevada.
Amendment No. 2548, as Modified
Mr. HELLER. Mr. President, this Senator, like everyone else in this
Chamber, realizes the need to address the threat of cyber attacks. The
impact of these attacks is a matter of individual financial security as
well as America's national security, and I contend that these efforts
must not interfere with Americans' privacy. In doing so, the cure,
which is this piece of legislation, is worse than the problem.
I have said it before and I will continue saying it, privacy for
Nevadans is nonnegotiable. Nevadans elected me in part to uphold their
civil rights and their liberties, and that is what I am on the floor
doing today. That is why I fought for passage of the USA FREEDOM Act.
That is why I offered my amendment being considered on this floor this
given day. Hundreds of Nevadans have reached out to my office
expressing concerns about the Cybersecurity Information Sharing Act,
saying it did not do enough to safeguard their personal information.
Also tech companies, including Google, Apple, Microsoft, Oracle, and
BSA Software Alliance, all expressed the same concerns about privacy
under this piece of legislation. It is our responsibility in Congress
to listen to these concerns and address them before allowing this piece
of legislation to become law. I recognize the chairman of the
intelligence committee does not support my amendment and has been
encouraging our colleagues to oppose it.
With respect, however, I believe my amendment is a commonsense,
middle-ground amendment. It ensures that we strike an appropriate
balance that guarantees privacy, but also allows for real-time sharing
of cyber threat indicators. My amendment would simply require the
Federal Government, before sharing any cyber threat indicators, to
strip out any personally identifiable information that they reasonably
believe is not directly related to a cyber security threat.
This standard creates a wide protection for American's personal
information. Furthermore, it also improves the operational capabilities
of this cyber sharing program. DHS has stated that removing more
personally identifiable information before sharing will help the
private sector meaningfully digest that information as they work to
combat cyber threats.
Again, I respect what Chairman Burr and Ranking Member Feinstein are
trying to do here, which is why I have carefully crafted this amendment
to meet the needs of both sides--those fighting for privacy and those
fighting for our national security. I would like to take a moment to
address the concerns expressed by the chairman, who has argued that
this amendment is a poison pill for this piece of legislation. I want
to be clear: This amendment is not creating legal uncertainty that
would delay the sharing of cyber threat indicators. In fact, the term
``reasonably believes'' is used as the standard for the private sector
in the House-passed cyber bill. Let me repeat that. This phrase,
``reasonably believes,'' is the standard applied to the private sector
in the House-passed bill. Our counterparts on the House Intelligence
Committee felt that this standard was high enough to protect privacy
while also meeting the goal of the bill which is real-time sharing.
If this standard is good enough for the private sector, it should be
good enough for the Federal Government. Just 6 months ago, the chamber
of commerce released a strong statement of support and praise for the
House-passed cyber legislation. Not once did they release statements of
concern over using the term ``reasonably believes'' as it applies to
the private sector, the industry which they represent. I ask again: If
it is good enough for the private sector, should it not be good enough
for the Federal Government?
Finally, I am proud to have the support of two of the Senate's
leading privacy advocates, Senators Leahy and Wyden, who have been
fighting with me to make key changes to this bill to maintain
Americans' rights. I strongly urge my colleagues today to vote in
support of my simple fix. Let's keep our oath to the American people
and make this bill stronger for privacy rights and civil liberties.
I yield the floor.
The PRESIDING OFFICER. The Senator from Oregon.
Mr. WYDEN. Mr. President, I ask unanimous consent that after Chairman
Burr has spoken, I be recognized for 2 minutes.
The PRESIDING OFFICER. Without objection, it is so ordered.
The PRESIDING OFFICER. The Senator from North Carolina.
Mr. BURR. Mr. President, I want to say to my colleague Senator
Heller, I wish we could accommodate all of the amendments. The fact is
that even a word here and there changes the balance of what Senator
Feinstein and I have tried to put together. Although on the surface it
may not look like a big deal--I understand we have two competing bills
that were passed in the House, and one has the language. The fact is,
our language for the entirety of the bill does not match the House
bill.
When you change something, we have to look at the cause and effect of
it.
[[Page S7503]]
Here are the realities. This is a voluntary bill. I will start backward
with some of the things Senator Heller said. Technology companies are
opposed to it. They are. I cannot do anything about that, but I can
plead with them: Why would you deprive thousands of businesses that
want to have a partnership with the Federal Government from having it
because you have determined for your business, even though you are a
large holder of personal data, that you don't want a partnership with
the Federal Government.
I would suggest that the first day they get penetrated, they may find
that partnership is worthy. I cannot change where they are on the
legislation. The reality is that for a voluntary bill, it means there
has to be a reason for people to want to participate. Uncertainty is
the No. 1 thing that drives that away. We believe the change the
Senator proposes provides that degree of uncertainty, and therefore we
would not have information shared either at all or in a timely fashion.
If it is not shared in a timely fashion, then we won't reach the real-
time transfer of data which gives us the basis of minimizing data loss
in this bill.
I think it is easy to look at certain pieces of the bill and say:
Well, this does not change it that much. But it changes it in a way
that would cause either companies to choose not to participate, or it
may change it in a way that delays the notification to the Federal
Government. Therefore, we are not able to accomplish what we set out to
do in the mission of this bill, which is to minimize the amount of data
that is lost not just at that company but across the U.S. economy.
Again, I urge our colleagues--we will move to amendments shortly. We
will have an opportunity to debate for 1 minute on each side on those
amendments. I would urge my colleagues to keep this bill intact. If we
change the balance of what we have been able to do, then it changes the
effects of how this will be implemented, and, in fact, we may or may
not at the end of the day----
Mr. HELLER. Will the chairman yield time so I can respond to his
comment?
Mr. BURR. I will be happy to yield.
Mr. HELLER. I appreciate everything the Senator is doing. I
understand the importance of fighting against cyber attacks. I want to
make two points--clarify two points that I think are very important.
The language in this bill is the same standard the private sector is
held to in the House-passed bill. The chamber had no problem 6 months
ago when that bill was passed out of the House of Representatives.
So I continue to ask the question: If it is good enough--if this
language is good enough for the private sector, why is it not good
enough for the public sector, for the Federal Government? The second
thing is that I believe my amendment does strike a balance, increasing
privacy but still providing that real-time information sharing. I just
wanted to make those two points.
Mr. BURR. Mr. President, I appreciate the Senator's input. I can only
say to my colleagues that it is the recommendation of the vice chair
and myself that this not be supported. It does change the balance, it
puts uncertainty in the level of participation, and any delay from real
time would, in fact, mean that we would not have lived up to the
mission of this bill, which is to minimize data loss.
I think, though, that there are similarities between the House and
Senate bills. Ours is significantly different, and therefore it has a
different implication when you change certain words.
With that, I yield the floor.
The PRESIDING OFFICER. The Senator from Oregon.
Mr. WYDEN. Before he leaves the floor, I want to commend my colleague
from Nevada. I strongly support his amendment.
Amendment No. 2621, as Modified
Colleagues, the first vote we will have at 11 o'clock is on my
amendment No. 2621. This amendment is supported by a wide variety of
leaders across the political spectrum, progressive voices that have
focused on cyber security and privacy as well as conservative
organizations. FreedomWorks, for example, an important conservative
organization, announced last night that they will consider the privacy
amendment that I will be offering. It will be the first vote, a key
vote on their congressional scorecard.
It was the view of FreedomWorks that this amendment, the first vote,
would add crucial privacy protections to this legislation. The point of
the first amendment we will vote on is to strengthen privacy
protections by requiring that companies make reasonable efforts to
remove unrelated personal information about their customers before
providing data to the government. It says that companies should take
these efforts to the extent feasible. Let me say that this truly offers
a great deal of flexibility and discretion to companies. It certainly
does not demand perfection, but it does say to these companies that
they should actually have to take some real responsibility, some
affirmative step.
We will have a chance, I guess for a minute or so, when we get to the
amendments, but for purposes of colleagues reflecting before we start
voting, the first amendment I will be offering is backed by important
progressive organizations, such as the Center for Democracy and
Technology, and conservative groups, such as FreedomWorks, which last
night said this is a particularly important vote with respect to
liberty and privacy. It says that with respect to the standard for
American companies, you just cannot hand it over, you have to take some
affirmative steps--reasonable, affirmative steps--before you share
personal information.
I yield the floor.
The PRESIDING OFFICER. The Senator from North Carolina.
Mr. BURR. Mr. President, we are going to go to these amendments, and
we will have five amendments this morning and possibly up to five this
afternoon starting at 4 o'clock.
Amendment Nos. 2626, as Modified, and 2557
I want to take this opportunity--there are two pending amendments
that are not germane. I ask unanimous consent that it be in order to
raise those points of order en bloc at this time.
The PRESIDING OFFICER. Without objection, it is so ordered.
Mr. BURR. I make a point of order that the Whitehouse amendment No.
2626 and the Mikulski amendment No. 2557 are not germane to amendment
No. 2716.
The PRESIDING OFFICER. The points of order are well taken and the
amendments fall.
Mr. BURR. Mr. President, I want to take this opportunity before we
start the final process to thank the vice chairman. She has been
incredibly willing to participate, even when we started in a different
place than where we ended. She brought to the table a tremendous amount
of experience on this issue because of the number of years she had
worked on it. She was very accommodating on areas that I felt were
important for us to either incorporate or at least debate.
What I really want to share with my colleagues is that we had a
wholesome debate in the committee. The debate the vice chair and I and
our staffs had was wholesome before it even came to the Presiding
Officer or to Senator Wyden. That is good. It is why some of the
Members might have said in committee: Gee, this looks like a good
amendment. Yet it did not fit within the framework of what the vice
chair and I sat down and agreed to.
So this has been a process over a lot of months of building support,
not just within this institution but across the country. It is not a
process where I expected to get to the end and for there to be nothing
but endorsements of the legislation. I have never seen a piece of
legislation achieve that coming out of the Senate. But I think the vice
chair and I believed when we actually put legislation together that we
were on the same page. The fact is, it is important that today we are
again still on the same page, that we have stuck there. I thank the
vice chairman.
I also thank Senator Johnson and Senator Carper, the chairman and the
ranking member of the homeland security committee. They have been
incredibly helpful and incredibly accommodating. We have tried to
incorporate everything we thought contributed positively to this
legislation, and they were huge contributors.
Lastly, let me say to all of my colleagues that it is tough to be put
in a situation--the vice chair and myself--where we have Members on
both sides
[[Page S7504]]
who are going to offer amendments--I understand that to them those
amendments are very reasonable, and I would only ask my colleagues to
understand the situation the vice chair and I are in. We have
negotiated a very delicately written piece of legislation, and any
change in that that is substantive we feel might, in fact, change the
outcome of what this bill accomplishes.
We will have votes on amendments this morning. One of those
amendments, Senator Flake's amendment--overnight we were able to
negotiate a change in the sunset provision to 10 years. We will modify
that on the floor and accept it by voice vote. The others will be
recorded votes.
With that, I yield the floor.
Amendment No. 2621, as Modified
The PRESIDING OFFICER (Mrs. Fischer). Under the previous order, the
question occurs on amendment No. 2621, as modified, offered by the
Senator from Oregon, Mr. Wyden.
There is 2 minutes of debate equally divided.
The Senator from Oregon.
Mr. WYDEN. Madam President, virtually all agree that cyber security
is a serious problem. Virtually all agree that it is useful to share
information, but sharing information without robust privacy standards
creates as many problems as it may solve.
The first amendment I am offering is supported by a wide variety of
organizations across the political spectrum because they want what this
amendment would do; that is, reasonable efforts have to be made to
strike unrelated personal information before it is handed over to the
government. Without that, you have a flimsy standard that says: When in
doubt, hand it over.
I urge colleagues to support this amendment. It is backed by
progressive groups and conservative groups.
Madam President, I ask unanimous consent to add Senator Warren as a
cosponsor to my amendment.
The PRESIDING OFFICER. Without objection, it is so ordered.
Mr. WYDEN. Madam President, I ask unanimous consent to have printed
in the Record a letter of support from FreedomWorks, a leading
conservative voice on these issues.
There being no objection, the material was ordered to be printed in
the Record, as follows:
FreedomWorks,
Washington, DC, October 26, 2015.
Key Vote YES on the Wyden Amendment #2621 to CISA
As one of our over 6.9 million FreedomWorks activists
nationwide, I urge you to contact your senators and ask them
to vote YES on the Wyden amendment to add crucial privacy
protections to the Cyber Information Sharing Act (CISA), S.
754.
CISA purports to facilitate stronger network security
across the nation by facilitating the interchange of
information on cyber threats between private companies and
government agencies. But one of CISA's several gaping flaws
is the incentive it creates for some companies to share this
data recklessly.
The personally identifiable information (PII) of a
company's users can be attached to cyber threat indicators
after a hack--potentially sensitive information that is
generally unnecessary to diagnose the threat. But since
companies which share cyber threat data are completely immune
to consequence if that shared data should be misused, their
incentive is to share the data as quickly as possible--even
if that means some would be sharing PII.
And if that personal data is irresponsibly shared with the
government, it gets spread far and wide between government
agencies (including the NSA) in real time, thanks to CISA's
mandatory interagency sharing provision.
The Wyden amendment goes a long way toward addressing the
potential misuse of this personal information by requiring
companies which share cyber threat data to review said data
to ensure that all PII that is not directly necessary to
counter the cyber threat is deleted before it is shared.
Passing the Wyden amendment wouldn't fully fix the problems
with CISA, but it is an important protection against
potential distribution and misuse of innocent consumers'
private information.
Please contact your senators and ask that they vote YES on
the Wyden amendment to CISA. FreedomWorks will count the vote
on this amendment as a Key Vote when calculating our
Congressional Scorecard for 2015. The scorecard is used to
determine eligibility for the FreedomFighter Award, which
recognizes Members of Congress who consistently vote to
support economic freedom and individual liberty.
Sincerely,
Adam Brandon,
CEO, FreedomWorks.
The PRESIDING OFFICER. The time of the Senator has expired.
The Senator from California.
Mrs. FEINSTEIN. Madam President, I rise to oppose the amendment. This
amendment would replace a key feature of the underlying bill. Right
now, under section 104(d) of the managers' amendment, a company is
required to conduct a review of any information before it is shared and
remove any personal information that is not ``directly related to a
cybersecurity threat.''
Senator Wyden's amendment, while well-intentioned, would replace that
review with a requirement that a company must remove personal
information ``to the extent feasible''--and there is the rub. This is a
very unclear requirement. In this bill, we are trying to provide
clarity on what a company has to do so that it is understandable.
Companies understand what it means to conduct a review to see whether
there is personal information and then strip it out. They don't know
what may or may not be feasible, and they worry that this lack of
clarity could create the risk of a lawsuit where the current language
does not.
The PRESIDING OFFICER. The time of the Senator has expired.
Mrs. FEINSTEIN. Therefore, I ask my colleagues to join with me in
voting no on the Wyden amendment.
The PRESIDING OFFICER. The question is on agreeing to the Wyden
amendment, as modified.
Mr. BURR. Madam President, I ask for the yeas and nays.
The PRESIDING OFFICER. Is there a sufficient second?
There appears to be a sufficient second.
The clerk will call the roll.
The legislative clerk called the roll.
Mr. CORNYN. The following Senators are necessarily absent: the
Senator from Texas (Mr. Cruz), the Senator from Kentucky (Mr. Paul),
the Senator from Florida (Mr. Rubio), and the Senator from Louisiana
(Mr. Vitter).
The PRESIDING OFFICER. Are there any other Senators in the Chamber
desiring to vote?
The result was announced--yeas 41, nays 55, as follows:
[Rollcall Vote No. 285 Leg.]
YEAS--41
Baldwin
Bennet
Blumenthal
Booker
Boxer
Brown
Cantwell
Cardin
Casey
Coons
Crapo
Daines
Durbin
Franken
Gardner
Gillibrand
Heinrich
Heller
Hirono
Klobuchar
Leahy
Lee
Markey
Menendez
Merkley
Murkowski
Murphy
Murray
Peters
Reed
Reid
Sanders
Schatz
Schumer
Shaheen
Stabenow
Sullivan
Tester
Udall
Warren
Wyden
NAYS--55
Alexander
Ayotte
Barrasso
Blunt
Boozman
Burr
Capito
Carper
Cassidy
Coats
Cochran
Collins
Corker
Cornyn
Cotton
Donnelly
Enzi
Ernst
Feinstein
Fischer
Flake
Graham
Grassley
Hatch
Heitkamp
Hoeven
Inhofe
Isakson
Johnson
Kaine
King
Kirk
Lankford
Manchin
McCain
McCaskill
McConnell
Mikulski
Moran
Nelson
Perdue
Portman
Risch
Roberts
Rounds
Sasse
Scott
Sessions
Shelby
Thune
Tillis
Toomey
Warner
Whitehouse
Wicker
NOT VOTING--4
Cruz
Paul
Rubio
Vitter
The amendment (No. 2621), as modified, was rejected.
Amendment No. 2548, as Modified
The PRESIDING OFFICER. Under the previous order, the question occurs
on amendment No. 2548, as modified, offered by the Senator from Nevada,
Mr. Heller.
There is 2 minutes of debate equally divided.
The Senator from Nevada.
Mr. HELLER. Madam President, the chairman has stated that this piece
of legislation has privacy protections. But I don't believe it goes far
enough or we wouldn't be in this Chamber, vote after vote after vote,
trying to move this so there is some personal privacy and so there are
some liberties that are protected.
This amendment in front of us right now is a commonsense, middle-
ground approach that strengthens the standards for the Federal
Government removing personal information prior to sharing it with the
private sector.
I want to leave my colleagues with two points. This is the same
standard
[[Page S7505]]
that the private sector is held to in the House-passed bill, supported
by the Chamber. If this amendment is good enough for the private
sector, the question is, Why isn't it good enough for the Federal
sector or the government? No. 2, my amendment strikes a balance between
increasing privacy but still providing for real-time information
sharing.
I urge my colleagues to support this amendment.
I yield the floor.
The PRESIDING OFFICER. The Senator from North Carolina.
Mr. BURR. Madam President, Senator Feinstein and I have tried to
reach a very delicate balance. We think we have done that. Senator
Heller raised one specific issue. He said the chamber is supportive of
the language. Let me just read: The chamber opposes Senator Heller's
amendment for much of the same reason that we oppose comparable
amendments being offered. It says: The difficulty with seemingly simple
tweaks and wording is that interpreting the language, such as ``
reasonably believes'' and ``reasonable efforts'' in legislation, is far
from simple. It would create legal uncertainty and is contrary to the
goal of real-time information sharing. The chamber will press to
maintain NOS as the standard.
Hopefully, this shares some texture with my colleagues about how
difficult this has been. As I said earlier, I would love to accept all
of the amendments. But when it changes the balance of what we have been
able to put--when we take a voluntary bill and provide uncertainty, we
have now given a reason for either companies not to participate or for
the government to delay the transmission to the appropriate agencies.
The PRESIDING OFFICER. The Senator's time has expired.
Mr. BURR. We believe we have the right protections in place. I urge
my colleagues to defeat the Heller amendment.
The PRESIDING OFFICER. The question is on agreeing to the amendment,
as modified.
Mr. THUNE. I ask for the yeas and nays.
The PRESIDING OFFICER. Is there a sufficient second?
There appears to be a sufficient second.
The clerk will call the roll.
The bill clerk called the roll.
Mr. CORNYN. The following Senators are necessarily absent: the
Senator from Texas (Mr. Cruz), the Senator from Kentucky (Mr. Paul),
the Senator from Florida (Mr. Rubio), and the Senator from Louisiana
(Mr. Vitter).
The PRESIDING OFFICER. Are there any other Senators in the Chamber
desiring to vote?
The result was announced--yeas 47, nays 49, as follows:
[Rollcall Vote No. 286 Leg.]
YEAS--47
Baldwin
Barrasso
Bennet
Blumenthal
Booker
Boxer
Cantwell
Cardin
Casey
Cassidy
Coons
Crapo
Daines
Donnelly
Durbin
Enzi
Ernst
Flake
Franken
Gardner
Gillibrand
Heinrich
Heitkamp
Heller
Hirono
Hoeven
Kaine
Lankford
Leahy
Lee
Markey
McCaskill
Menendez
Merkley
Moran
Murkowski
Murray
Peters
Portman
Reed
Sanders
Sullivan
Tester
Toomey
Udall
Warren
Wyden
NAYS--49
Alexander
Ayotte
Blunt
Boozman
Brown
Burr
Capito
Carper
Coats
Cochran
Collins
Corker
Cornyn
Cotton
Feinstein
Fischer
Graham
Grassley
Hatch
Inhofe
Isakson
Johnson
King
Kirk
Klobuchar
Manchin
McCain
McConnell
Mikulski
Murphy
Nelson
Perdue
Reid
Risch
Roberts
Rounds
Sasse
Schatz
Schumer
Scott
Sessions
Shaheen
Shelby
Stabenow
Thune
Tillis
Warner
Whitehouse
Wicker
NOT VOTING--4
Cruz
Paul
Rubio
Vitter
The amendment (No. 2548), as modified, was rejected.
Amendment No. 2587, as Modified
The PRESIDING OFFICER. Under the previous order, the question occurs
on amendment No. 2587, as modified, offered by the Senator from
Vermont, Mr. Leahy.
The Democratic leader.
Mr. REID. Madam President, I would ask that my remarks be under
leader time.
The PRESIDING OFFICER. Without objection, it is so ordered.
Congratulating Senator Leahy on Casting His 15,000th Vote
Mr. REID. Mr. President, today my friend and colleague Pat Leahy has
reached another milestone in an extraordinary career. He just cast his
15,000th vote. That is remarkable. He is only the sixth Senator in the
history of this great body to have done that. In 226 years, he is one
of 6.
Today's momentous occasion should come as no surprise because his
entire career in public service has been history in the making. He
graduated from St. Michael's College, which is a Vermont institution.
He graduated from Georgetown University Law Center.
He was first appointed as the State's attorney when he was 26 years
old. He was then reelected on two separate occasions. During that time,
Pat Leahy was a nationally renowned prosecutor. In 1974--his last as a
State's attorney--he was selected as one of the three most outstanding
prosecutors in America.
At age 34, Pat became the first Democrat in U.S. history to be
elected to the Senate from Vermont. After he was elected, the
Republican Senator he was to succeed, George Aiken, was asked by some
to resign his seat a day early--which you could do in those days--to
give Senator Leahy a head start in seniority among his fellow freshmen.
Here is what Senator Aiken said: ``If Vermont is foolish enough to
elect a Democrat, let him be number 100.''
Senator Leahy's career has proven that the people of Vermont were
wise in selecting him. From No. 100, Senator Leahy over time ascended
to the rank of President pro tempore of the Senate. Senator Leahy has
spent four decades in the Senate fighting for justice and equality. As
the chairman of the Judiciary Committee, he became a national leader
for an independent judiciary, the promotion of equal rights, and the
protection of our Constitution.
His main focus, though, has always been Vermont. He carries with him
a picture of what he calls his farmhouse, which is on lots of acres. It
looks like a picture you would use if you were trying to get somebody
to come and stay at your place--it is just beautiful. It doesn't remind
me of the desert, but it is beautiful.
Over the years, he has done everything he can to protect the State's
natural beauty, the resources, land and water, through conservation
efforts. When people visit Vermont, they see these beautiful green
vistas, pristine lakes and rivers, and picturesque farms. Senator Leahy
has worked hard to keep Vermont that way.
Senator Leahy has done everything in his power to promote agriculture
in his home State. As former chair of the agriculture committee, I can
remember what he has done to protect the dairy industry. It is legend
what he has done to protect the dairy industry. We all remember holding
up the Senate for periods of time until he got what he wanted for
dairy. He wrote the Organic Foods Production Act of 1990, which helped
foster Vermont and America's growing organic food industry. Today,
organic foods are a $40 billion industry. Many of those organic farms
and businesses are based in Vermont.
After Tropical Storm Irene, I remember, graphically, his fighting for
the State of Vermont. That storm devastated parts of Vermont. Roads
were underwater for weeks. He helped secure $500 million in assistance
for the people of Vermont to overcome a brutal natural disaster.
I am fortunate to be able to serve with Pat Leahy here in the Senate.
He is more than a colleague; he really is a dear friend, as is his wife
of 52 years, Marcelle, whom Landra and I know well. We have helped each
other through our times of joy and our times of travail. Senator Leahy
and his wife Marcelle have three wonderful children and five
grandchildren. Give Pat a minute alone and he will start telling you
about them.
Senator Leahy, congratulations on your 15,000th vote in the U.S.
Senate.
Mr. LEAHY. I thank my colleague.
[[Page S7506]]
(Applause, Senators rising.)
The PRESIDING OFFICER. The majority leader.
Mr. McCONNELL. Madam President, as the Democratic leader has pointed
out, this is indeed the 15,000th vote of the Senator from Vermont. That
means he has taken the largest number of votes among all of us
currently serving here in the Senate. It means he has taken the sixth
largest number of votes in Senate history. It certainly means he has
taken more votes than any other Senator from his State, and Vermont has
been sending Senators here since the late 1700s.
That is not the only thing that sets him apart from every other
Vermonter to serve here in the Senate. He was the first Democrat
elected to serve from Vermont. Unfortunately, that is a habit that has
not continued. I think we can safely assume he is Vermont's first
Batman fanboy to serve as well; the first Bat fan and probably the
first Dead Head as well.
There is no doubt that our colleague is the longest serving current
Member of the Senate from any State. We are happy to recognize today
his 15,000th vote.
(Applause, Senators rising.)
The PRESIDING OFFICER. The Senator from Iowa.
Mr. GRASSLEY. May I have 1 minute to speak to that point?
The PRESIDING OFFICER. Without objection, it is so ordered.
Mr. GRASSLEY. Madam President, I wish to commemorate my friend and
colleague for casting his 15,000th vote today in the Senate.
Senator Leahy has been a stalwart Member of this body since joining
the Senate at the age of 34 in 1975. Four decades later, Senator Leahy
continues to serve his State and our Nation with great passion and
conviction.
Senator Leahy has been a good friend as we work together in leading
the Senate Judiciary Committee.
So, Senator Leahy, congratulations on this tremendous milestone. I
hope we can cast many more votes together as we continue to work in a
bipartisan way on the committee.
I applaud the Senator from Vermont for his great commitment to
service, and I wish him many more votes in the future.
(Applause, Senators rising.)
The PRESIDING OFFICER. The junior Senator from Vermont.
Mr. SANDERS. Madam President, I rise to say a few words in
congratulating Senator Leahy, not just for his 15,000th vote but on his
many years of service serving the people of the State of Vermont.
Vermont is very proud of all of the work Pat Leahy has done.
As we all know, Senator Leahy has been a champion on agriculture
issues, on protecting family farmers, especially in dairy and organics.
He has been a champion in fighting for civil liberties in this country.
He has been a champion on environmental issues, making sure the planet
we leave our kids is a clean and healthy planet. He has been a champion
on women's issues, and on so many other issues.
Senator Leahy, on behalf of the people of Vermont, I want to thank
you so much for your years of service.
(Applause, Senators rising.)
Mr. LEAHY. Madam President, I want to thank my dear friends, Senator
Reid, Senator McConnell, Senator Sanders, and Senator Grassley for
their comments, and I appreciate the opportunity to be able to serve
with them. I thank the members of the Senate for this opportunity to
make a very few observations about this personal milestone.
You know, the Senate offers both great opportunities and
responsibility for both Senators from Vermont and all who serve here.
We have a chance, day after day, to make things better for Vermonters
and for all Americans. We can strengthen our country and ensure its
vitality into the future. We can forge solutions in the unending quest
throughout this Nation's history to form a more perfect Union.
I cast my first vote in this Chamber in 1975 on a resolution to
establish the Church Committee. The critical issues of the post-
Watergate era parallel issues we face today--proof of the enduring fact
that, while the votes we cast today address the issues we face now,
problems will persist, threats will continue, and improvements to the
democracy we all revere can always be made.
I think back on the 15,000 votes I have cast on behalf of Vermonters.
A lot of them come quickly to mind today--some specific to Vermont and
some national and some global--writing and enacting the organic farm
bill, the charter for what has become a thriving $30 billion industry;
stronger regulations on mercury pollution and combating the effects of
global warming; emergency relief for the devastation caused by Tropical
Storm Irene; adopting price support programs for small dairy farmers;
fighting for the privacy and civil liberties of all Americans;
supporting the Reagan-O'Neill deal to save Social Security; nutrition
bills to help Americans below the poverty line; bipartisan--strongly
bipartisan--campaign reform in McCain-Feingold; the bipartisan Leahy-
Smith Act, on patent reform; reauthorizing and greatly expanding and
strengthening the Violence Against Women Act; opposing the war in Iraq,
a venture that cost so many lives and trillions of taxpayer dollars.
The Senate at its best can be the conscience of the Nation. I have
seen that when it happens, and I marvel in the fundamental soundness
and wisdom of our system every time the Senate stands up and is the
conscience of our Nation. But we cannot afford to put any part of the
mechanism on automatic pilot. It takes constant work and vigilance to
keep our system working as it should for the betterment of our society
and the American people. And we can only do it if we work together.
I am so grateful to my fellow Vermonters for the confidence they have
shown in me. It is a measure of trust that urges me on. I will never
betray it, and I will never take it for granted. Reflecting on the past
15,000 votes reminds me about the significance every time we vote, why
I feel energized about what votes lie ahead, and how we can keep making
a difference.
I thank my friends, the two leaders, for their remarks, my respected
Senate colleague, Senator Sanders, my friend, Senator Grassley, with
whom I've served a long time. I appreciate my friendship with them and
have appreciated my friendship with other leaders, including Senators
Mansfield, Byrd, Baker, Dole, Lott, and Daschle, and lifelong gratitude
to my former colleague, Senator Stafford, a Republican, who took me
under his wing and guided me. And I am privileged to serve now--I mean,
our whole Vermont delegation is here: Senator Sanders, Congressman
Welch, and myself. Not many other States could do that and fit all of
them in this body. And lastly I remember what a thrill it was to tell
my wife, Marcelle, when I cast my first vote. And now 40 years later, I
can still tell her about the 15,000th vote, and she knows, she and our
children and grandchildren are the most important people in my life.
I do not want to further delay the Senate's work today, and I will
reflect more on this milestone later. I thank you for your friendships
that have meant more to me and my family than I can possibly say, and I
look forward to continuing serving here. Thank you very, very much.
(Applause, Senators rising.)
Mr. DURBIN. Madam President, I want to add my voice to the well-
deserved chorus of congratulations for our colleague and friend from
Vermont.
Of the 1,963 men and women who have ever served in the U.S. Senate,
only six have the distinction of casting 15,000 votes. And of those
august six, only Patrick Leahy continues to serve in this body today.
The only other members of the 15,000-vote league are Senators Robert C.
Byrd, Strom Thurmond, Daniel Inouye, Ted Kennedy, and Ted Stevens.
More important than the number of votes Senator Leahy has cast,
however, is the wisdom and courage reflected in his votes.
He was elected to the U.S. Senate in 1974--part of an historic group
of new Senators known as the ``Watergate Babies.''
He has voted time and again to uphold the values of our
Constitution--even when it contained some political risk.
His very first vote in this Senate was to authorize the Church
Committee--the precursor to today's Senate Select Committee on
Intelligence. The Church Committee was created to investigate possible
illegalities by the CIA, the FBI, and the National Security Agency--and
it resulted in major reforms.
[[Page S7507]]
As you may know, Senator Leahy is a major Batman fan. In fact, he has
made several cameo appearances in Batman movies.
His affinity for the Caped Crusader makes sense. You see, Batman is
one of the few superheroes with no superhuman powers. He is simply a
man with unusual courage and determination to fight wrongdoing. That is
Patrick Leahy, too.
I have served on the Senate Judiciary Committee for more than 18
years. During that time, Senator Leahy has been either our committee
chairman or its ranking member.
I have the greatest respect for his fidelity to the rule of law and
his determined efforts to safeguard the independence and integrity of
America's Federal courts.
He is a champion of human rights at home and abroad.
According to the nonpartisan website GovTrack, Senator Leahy has
sponsored more bipartisan bills than any other current member of this
Senate. Sixty-one percent of his bills have had both Democratic and
Republican cosponsors. In this time of increasingly sharp partisanship,
that is a record that we would all do well to emulate.
I am particularly grateful to Senator Leahy for his strong support of
a bipartisan bill that I am cosponsoring, along with a broad array of
Senators, from Chairman Chuck Grassley to Senator Cory Booker. The
Sentencing Reform and Corrections Act would make Federal sentencing
laws smarter, fairer, more effective, and more fiscally responsible. It
passed the Judiciary Committee last week by a vote of 15-5. Senator
Leahy's leadership has been critical in building this broad support,
and I look forward to the day--in the near future, I hope--when we can
celebrate passage of this important measure.
I learned recently that Senator Leahy dedicates all of his fees and
royalties from his acting roles to charities. A favorite charity is the
Kellogg-Hubbard library in Montpelier, VT, where he read comic books as
a child. I hope that there are young boys and girls discovering in that
library the same uncommon courage and love of justice that Patrick
Leahy found there.
America needs more heroes like Pat Leahy.
Amendment No. 2587, as Modified
The PRESIDING OFFICER. Under the previous order, the question occurs
on amendment No. 2587, as modified, offered by the Senator from
Vermont, Mr. Leahy.
Mr. McCONNELL. I ask for the yeas and nays.
The PRESIDING OFFICER. Is there a sufficient second?
There appears to be a sufficient second.
The yeas and nays were ordered.
There will now be 2 minutes equally divided.
The Senator from California.
Mrs. FEINSTEIN. Madam President, I rise regretfully to speak against
the amendment directly following the important monument of 15,000 votes
by one of the idols of my life, but so be it.
As it might become very clear, Senator Burr and I, on a bill that
came out of committee 14 to 1, have tried to keep a balance and have
tried to prevent this kind of information sharing from being a threat
to business so they won't participate. Therefore, the words that are
used are all important as to whether they have a legal derivation.
Senator Leahy's amendment would essentially decrease the amount of
sharing by opening up the chance of public disclosure through the
Freedom of Information Act of cyber threats shared under this bill.
Now, we seek to share information about the nature of cyber effects
and suggestions on how to defend networks. This information clearly
should not be made available to hackers and cyber criminals who could
use it for their own purposes. So Senator Burr and I worked closely
with Senator Leahy and Senator Cornyn in putting together the managers'
package to remove a FOIA exemption that they viewed as unnecessary and
harmful. That has been removed in the managers' package.
The PRESIDING OFFICER. The time of the Senator has expired.
Mrs. FEINSTEIN. I thank the Chair.
The PRESIDING OFFICER. The Senator from Vermont.
Mr. LEAHY. Madam President, as much as I hate to disagree with my
dear friend from California, I will on this amendment.
I don't like to see unnecessary exemptions to the Freedom of
Information Act.
Today I offer an amendment to the Cybersecurity Information Sharing
Act that would remove from the bill an overly broad and wholly
unnecessary new FOIA exemption. That new exemption to our Nation's
premier transparency law was added without public debate and in a
closed session by the Senate Intelligence Committee. Any amendments to
the Freedom of Information Act should be considered openly and publicly
by the Senate Judiciary Committee, which has exclusive jurisdiction
over FOIA--not in secret by the Senate Intelligence Committee.
I expect that much of the information to be shared with the
government under CISA would be protected from disclosure to the general
public. A thorough committee process, including consideration by the
Senate Judiciary Committee, would have made clear that the vast
majority of sensitive information to be shared under this bill is
already protected from disclosure under existing FOIA exemptions. This
includes exemption (b)(4), which protects confidential business and
financial information; exemption (b)(6) which protects personal
privacy; and exemption (b)(7), which protects information related to
law enforcement investigations.
In case there is any doubt that this information would be exempt from
disclosure, the underlying bill already makes clear that information
provided to the Federal Government ``shall be considered the
commercial, financial, and proprietary information'' of the entity
submitting the information. Commercial and financial information is
exempt from disclosure under FOIA pursuant to exemption (b)(4), and
additional protections are unnecessary. The comprehensive exemptions
already in law have been carefully crafted to protect the most
sensitive information from disclosure while prohibiting the Federal
Government from withholding information the public is entitled to.
Creating unnecessary exemptions will call into question the existing
FOIA framework and threaten its twin goals of promoting government
transparency and accountability.
The new FOIA exemption in the cyber bill also includes a preemption
clause that is overly broad and sets a terrible precedent. As drafted,
it applies not only to FOIA, but to all State, local, or tribal
disclosure laws. By its very terms, this provision applies not just to
transparency and sunshine laws, but to any law ``requiring disclosure
of information or records.'' Because this broad preemption of State and
local law has not received careful, open consideration, there has not
been adequate consultation with State and local governments to consider
the potential impacts. Such a sweeping approach could impact hundreds
of State and local laws and lead to unintended consequences.
Amending our Nation's premier transparency law and preempting State
and local law deserves more public debate and consideration. If we do
not oppose this new FOIA exemption, then I expect more antitransparency
language will be slipped into other bills without the consideration of
the Judiciary Committee. Just a few months ago, I was here on the
Senate floor fighting against new FOIA exemptions that had been tucked
into the surface transportation bill, and I have no doubt I will be
down here again in the future fighting similar fights. But an open and
transparent government is worth fighting for. I believe in transparency
in our Federal Government, and I believe that FOIA is the backbone to
ensuring an open and accountable government. I urge all Members to join
me in this effort and vote for the Leahy amendment.
The PRESIDING OFFICER. The time of the Senator has expired.
Mr. LEAHY. I thank the Chair.
The PRESIDING OFFICER. The question is on agreeing to amendment No.
2587, as modified.
The yeas and nays have been ordered.
The clerk will call the roll.
The senior assistant legislative clerk called the roll.
Mr. CORNYN. The following Senators are necessarily absent: the
Senator from Texas (Mr. Cruz), the Senator from Kentucky (Mr. Paul),
the Senator from Florida (Mr. Rubio), and the Senator from Louisiana
(Mr. Vitter).
[[Page S7508]]
The PRESIDING OFFICER. Are there any other Senators in the Chamber
desiring to vote?
The result was announced--yeas 37, nays 59, as follows:
[Rollcall Vote No. 287 Leg.]
YEAS--37
Baldwin
Bennet
Blumenthal
Booker
Boxer
Brown
Cantwell
Cardin
Casey
Coons
Daines
Durbin
Franken
Gillibrand
Heinrich
Heller
Hirono
Klobuchar
Leahy
Lee
Markey
Menendez
Merkley
Murray
Peters
Reed
Reid
Sanders
Schatz
Schumer
Shaheen
Stabenow
Sullivan
Tester
Udall
Warren
Wyden
NAYS--59
Alexander
Ayotte
Barrasso
Blunt
Boozman
Burr
Capito
Carper
Cassidy
Coats
Cochran
Collins
Corker
Cornyn
Cotton
Crapo
Donnelly
Enzi
Ernst
Feinstein
Fischer
Flake
Gardner
Graham
Grassley
Hatch
Heitkamp
Hoeven
Inhofe
Isakson
Johnson
Kaine
King
Kirk
Lankford
Manchin
McCain
McCaskill
McConnell
Mikulski
Moran
Murkowski
Murphy
Nelson
Perdue
Portman
Risch
Roberts
Rounds
Sasse
Scott
Sessions
Shelby
Thune
Tillis
Toomey
Warner
Whitehouse
Wicker
NOT VOTING--4
Cruz
Paul
Rubio
Vitter
The amendment (No. 2582), as modified, was rejected.
Amendment No. 2582
The PRESIDING OFFICER. Under the previous order, the question occurs
on amendment No. 2582, offered by the Senator from Arizona, Mr. Flake.
The Senator from North Carolina.
Amendment Nos. 2582, as Modified, and 2552, as Further Modified
Mr. BURR. Madam President, I ask unanimous consent that the Flake
amendment No. 2582 and the Coons amendment No. 2552 be modified with
the changes at the desk.
The PRESIDING OFFICER. Without objection, it is so ordered.
The amendments (No. 2582), as modified, and (2552), as further
modified, are as follows:
AMENDMENT NO. 2582, as Modified
At the end, add the following:
SEC. 11. EFFECTIVE PERIOD.
(a) In General.--Except as provided in subsection (b), this
Act and the amendments made by this Act shall be in effect
during the 10-year period beginning on the date of the
enactment of this Act.
(b) Exception.--With respect to any action authorized by
this Act or information obtained pursuant to an action
authorized by this Act, which occurred before the date on
which the provisions referred to in subsection (a) cease to
have effect, the provisions of this Act shall continue in
effect.
Amendment No. 2552, as further modified
Beginning on page 23, strike line 3 and all that follows
through page 33, line 10 and insert the following:
(3) Requirements concerning policies and procedures.--
Consistent with the guidelines required by subsection (b),
the policies and procedures developed and promulgated under
this subsection shall--
(A) ensure that cyber threat indicators shared with the
Federal Government by any entity pursuant to section 104(c)
through the real-time process described in subsection (c) of
this section--
(i) are shared in an automated manner with all of the
appropriate Federal entities;
(ii) are not subject to any unnecessary delay,
interference, or any other action that could impede receipt
by all of the appropriate Federal entities; and
(iii) may be provided to other Federal entities;
(B) ensure that cyber threat indicators shared with the
Federal Government by any entity pursuant to section 104 in a
manner other than the real time process described in
subsection (c) of this section--
(i) are shared as quickly as operationally practicable with
all of the appropriate Federal entities;
(ii) are not subject to any unnecessary delay,
interference, or any other action that could impede receipt
by all of the appropriate Federal entities; and
(iii) may be provided to other Federal entities;
(C) consistent with this title, any other applicable
provisions of law, and the fair information practice
principles set forth in appendix A of the document entitled
``National Strategy for Trusted Identities in Cyberspace''
and published by the President in April 2011, govern the
retention, use, and dissemination by the Federal Government
of cyber threat indicators shared with the Federal Government
under this title, including the extent, if any, to which such
cyber threat indicators may be used by the Federal
Government; and
(D) ensure there are--
(i) audit capabilities; and
(ii) appropriate sanctions in place for officers,
employees, or agents of a Federal entity who knowingly and
willfully conduct activities under this title in an
unauthorized manner.
(4) Guidelines for entities sharing cyber threat indicators
with federal government.--
(A) In general.--Not later than 60 days after the date of
the enactment of this Act, the Attorney General and the
Secretary of Homeland Security shall develop and make
publicly available guidance to assist entities and promote
sharing of cyber threat indicators with Federal entities
under this title.
(B) Contents.--The guidelines developed and made publicly
available under subparagraph (A) shall include guidance on
the following:
(i) Identification of types of information that would
qualify as a cyber threat indicator under this title that
would be unlikely to include personal information or
information that identifies a specific person not directly
related to a cyber security threat.
(ii) Identification of types of information protected under
otherwise applicable privacy laws that are unlikely to be
directly related to a cybersecurity threat.
(iii) Such other matters as the Attorney General and the
Secretary of Homeland Security consider appropriate for
entities sharing cyber threat indicators with Federal
entities under this title.
(b) Privacy and Civil Liberties.--
(1) Guidelines of attorney general.--Not later than 60 days
after the date of the enactment of this Act, the Attorney
General shall, in coordination with heads of the appropriate
Federal entities and in consultation with officers designated
under section 1062 of the National Security Intelligence
Reform Act of 2004 (42 U.S.C. 2000ee-1), develop, submit to
Congress, and make available to the public interim guidelines
relating to privacy and civil liberties which shall govern
the receipt, retention, use, and dissemination of cyber
threat indicators by a Federal entity obtained in connection
with activities authorized in this title.
(2) Final guidelines.--
(A) In general.--Not later than 180 days after the date of
the enactment of this Act, the Attorney General shall, in
coordination with heads of the appropriate Federal entities
and in consultation with officers designated under section
1062 of the National Security Intelligence Reform Act of 2004
(42 U.S.C. 2000ee-1) and such private entities with industry
expertise as the Attorney General considers relevant,
promulgate final guidelines relating to privacy and civil
liberties which shall govern the receipt, retention, use, and
dissemination of cyber threat indicators by a Federal entity
obtained in connection with activities authorized in this
title.
(B) Periodic review.--The Attorney General shall, in
coordination with heads of the appropriate Federal entities
and in consultation with officers and private entities
described in subparagraph (A), periodically, but not less
frequently than once every two years, review the guidelines
promulgated under subparagraph (A).
(3) Content.--The guidelines required by paragraphs (1) and
(2) shall, consistent with the need to protect information
systems from cybersecurity threats and mitigate cybersecurity
threats--
(A) limit the effect on privacy and civil liberties of
activities by the Federal Government under this title;
(B) limit the receipt, retention, use, and dissemination of
cyber threat indicators containing personal information or
information that identifies specific persons, including by
establishing--
(i) a process for the timely destruction of such
information that is known not to be directly related to uses
authorized under this title; and
(ii) specific limitations on the length of any period in
which a cyber threat indicator may be retained;
(C) include requirements to safeguard cyber threat
indicators containing personal information or information
that identifies specific persons from unauthorized access or
acquisition, including appropriate sanctions for activities
by officers, employees, or agents of the Federal Government
in contravention of such guidelines;
(D) include procedures for notifying entities and Federal
entities if information received pursuant to this section is
known or determined by a Federal entity receiving such
information not to constitute a cyber threat indicator;
(E) protect the confidentiality of cyber threat indicators
containing personal information or information that
identifies specific persons to the greatest extent
practicable and require recipients to be informed that such
indicators may only be used for purposes authorized under
this title; and
(F) include steps that may be needed so that dissemination
of cyber threat indicators is consistent with the protection
of classified and other sensitive national security
information.
(c) Capability and Process Within the Department of
Homeland Security.--
(1) In general.--Not later than 90 days after the date of
the enactment of this Act, the Secretary of Homeland
Security, in coordination with the heads of the appropriate
Federal entities, shall develop and implement a capability
and process within the Department of Homeland Security that--
[[Page S7509]]
(A) shall accept from any entity in real time cyber threat
indicators and defensive measures, pursuant to this section;
(B) shall, upon submittal of the certification under
paragraph (2) that such capability and process fully and
effectively operates as described in such paragraph, be the
process by which the Federal Government receives cyber threat
indicators and defensive measures under this title that are
shared by a private entity with the Federal Government
through electronic mail or media, an interactive form on an
Internet website, or a real time, automated process between
information systems except--
(i) consistent with section 104, communications between a
Federal entity and a private entity regarding a previously
shared cyber threat indicator to describe the relevant
cybersecurity threat or develop a defensive measure based on
such cyber threat indicator; and
(ii) communications by a regulated entity with such
entity's Federal regulatory authority regarding a
cybersecurity threat;
(C) shall require the Department of Homeland Security to
develop and implement measures to remove, through the most
efficient means practicable, any personal information of or
identifying a specific person not necessary to identify or
describe the cybersecurity threat before sharing a cyber
threat indicator or defensive measure with appropriate
Federal entities;
(D) ensures that all of the appropriate Federal entities
receive in an automated manner such cyber threat indicators
as quickly as operationally possible from the Department of
Homeland Security;
(E) is in compliance with the policies, procedures, and
guidelines required by this section; and
(F) does not limit or prohibit otherwise lawful disclosures
of communications, records, or other information, including--
(i) reporting of known or suspected criminal activity, by
an entity to any other entity or a Federal entity;
(ii) voluntary or legally compelled participation in a
Federal investigation; and
(iii) providing cyber threat indicators or defensive
measures as part of a statutory or authorized contractual
requirement.
(2) Certification.--Not later than 10 days prior to the
implementation of the capability and process required by
paragraph (1), the Secretary of Homeland Security shall, in
consultation with the heads of the appropriate Federal
entities, certify to Congress whether such capability and
process fully and effectively operates--
(A) as the process by which the Federal Government receives
from any entity a cyber threat indicator or defensive measure
under this title; and
(B) in accordance with the policies, procedures, and
guidelines developed under this section.
(3) Public notice and access.--The Secretary of Homeland
Security shall ensure there is public notice of, and access
to, the capability and process developed and implemented
under paragraph (1) so that--
(A) any entity may share cyber threat indicators and
defensive measures through such process with the Federal
Government; and
(B) all of the appropriate Federal entities receive such
cyber threat indicators and defensive measures as quickly as
operationally practicable with receipt through the process
within the Department of Homeland Security.
(4) Effective date of certain provision.--The requirement
described in paragraph (1)(C) shall take effect upon the
earlier of--
(A) the date on which the Secretary of Homeland Security
determines that the Department of Homeland Security has
developed the measures described in paragraph (1)(C); or
(B) the date that is 12 months after the date of enactment
of this Act.
Amendment No. 2582, as Modified
Mr. FLAKE. Madam President, I thank the chair of the subcommittee and
the vice chair, ranking member, for working on this. This was initially
a 6-year sunset. This has been moved under the amendment to a 10-year
sunset. I believe it is important, when we deal with information that
is sensitive, to have a look back after a number of years to see if we
have struck the right balance.
We have done that on other sensitive programs like this. I think it
ought to be done here. I appreciate the work that Senators Burr and
Feinstein and my colleagues have put into this.
I urge support.
The PRESIDING OFFICER. The Senator from North Carolina.
Mr. BURR. Madam President, I thank my colleagues. We have agreed on
this. We can hopefully do this by voice vote.
The PRESIDING OFFICER. If there is no further debate, the question is
on agreeing to the amendment, as modified.
The amendment (No. 2582), as modified, was agreed to.
Amendment No. 2612, as Further Modified
The PRESIDING OFFICER. Under the previous order, the question occurs
on amendment No. 2612, as further modified, offered by the Senator from
Minnesota, Mr. Franken.
The Senator from Minnesota.
Mr. FRANKEN. Madam President, the Franken, Leahy, Durbin, and Wyden
amendment addresses concerns raised by privacy advocates, tech
companies, and security experts, including the Department of Homeland
Security.
The amendment tightens definitions of the terms ``cyber security
threat'' and ``cyber threat indicator,'' which are currently too broad
and too vague, and would encourage the sharing of extraneous
information--unhelpful information.
Overbreadth is not just a privacy problem; as DHS has noted, it is
bad for cyber security if too much of the wrong kind of information
floods into agencies.
My amendment redefines ``cyber security threat'' as an action that is
at least reasonably likely to try to adversely impact an information
system. It is a standard that tells companies what is expected of them
and assures consumers that CISA imposes appropriate limits.
The PRESIDING OFFICER. The Senator's time has expired.
Mr. FRANKEN. Madam President, I ask unanimous consent for 20 more
seconds.
The PRESIDING OFFICER. Without objection, it is so ordered.
Mr. FRANKEN. The amendment also tightens the definition of ``cyber
threat indicator'' to avoid the sharing of unnecessary information. The
amendment is intentionally modest. It makes only changes that are most
needed for the sake of both privacy and security.
I urge my colleagues to support this amendment.
The PRESIDING OFFICER. The Senator from North Carolina.
Mr. BURR. Madam President, let me say to my colleagues, again, we are
trying to change the words that have been very delicately chosen to
provide the certainty that companies understand and need for them to
make a decision to share.
Like some other amendments, if you don't want them to share, then
provide uncertainty. That is in language changing from ``may'' to
``reasonably likely,'' changing from ``actual'' or ``potential'' to
``harm caused by an incident.'' The Department of Homeland Security is
for this bill. The White House is for this bill. Fifty-two
organizations representing thousands of companies in America are for
this bill. We have reached the right balance. Let's defeat this
amendment and let's move to this afternoon's amendments.
I yield the floor.
The PRESIDING OFFICER. The question is on agreeing to the amendment,
as further modified.
Mr. TILLIS. I ask for the yeas and nays.
The PRESIDING OFFICER. Is there a sufficient second?
There appears to be a sufficient second.
The clerk will call the roll.
The bill clerk called the roll.
Mr. CORNYN. The following Senators are necessarily absent: the
Senator from Texas (Mr. Cruz), the Senator from South Carolina (Mr.
Graham), the Senator from Kentucky (Mr. Paul), the Senator from Florida
(Mr. Rubio), and the Senator from Louisiana (Mr. Vitter).
The PRESIDING OFFICER. Are there any other Senators in the Chamber
desiring to vote?
The result was announced--yeas 35, nays 60, as follows:
[Rollcall Vote No. 288 Leg.]
YEAS--35
Baldwin
Bennet
Blumenthal
Booker
Boxer
Brown
Cantwell
Cardin
Coons
Daines
Durbin
Franken
Gillibrand
Heinrich
Heller
Hirono
Klobuchar
Lankford
Leahy
Lee
Markey
Menendez
Merkley
Murray
Peters
Reid
Sanders
Schatz
Schumer
Shaheen
Stabenow
Tester
Udall
Warren
Wyden
NAYS--60
Alexander
Ayotte
Barrasso
Blunt
Boozman
Burr
Capito
Carper
Casey
Cassidy
Coats
Cochran
Collins
Corker
Cornyn
Cotton
Crapo
Donnelly
Enzi
Ernst
Feinstein
Fischer
Flake
Gardner
Grassley
Hatch
Heitkamp
Hoeven
Inhofe
Isakson
Johnson
Kaine
King
Kirk
Manchin
McCain
[[Page S7510]]
McCaskill
McConnell
Mikulski
Moran
Murkowski
Murphy
Nelson
Perdue
Portman
Reed
Risch
Roberts
Rounds
Sasse
Scott
Sessions
Shelby
Sullivan
Thune
Tillis
Toomey
Warner
Whitehouse
Wicker
NOT VOTING--5
Cruz
Graham
Paul
Rubio
Vitter
The amendment (No. 2612), as further modified, was rejected.
The PRESIDING OFFICER. The Senator from Missouri.
Mr. BLUNT. Madam President, I ask unanimous consent to address the
floor for up to 15 minutes.
The PRESIDING OFFICER. Without objection, it is so ordered.
Mr. BLUNT. Madam President, last week I came to the floor to express
my support for the Cybersecurity Information Sharing Act, which we are
dealing with today. The bipartisan vote of 83 to 14 that happened later
that day was an important step in the right direction to deal with this
issue. The debate has been encouraging. We need to deal with this
threat to our economy. It is a threat to our security, it is a threat
to our privacy, and we need to deal with it now.
As I and others have said before, if we wait until there is an event
that gets people's attention in such a dramatic way that everybody
suddenly realizes what is at stake, there is no telling what kind of
overreaction Congress will make. This has been a good debate at the
time we should have it. Now, of course, we need to move on.
There have been a lot of amendments offered. Many amendments have
been accepted by the managers of the bill. With almost all certainty,
today we will finish the remaining amendments pending on the bill and
hopefully finish the bill itself. A lot of these amendments have been
very well-intentioned--in fact, I suspect they all have been well-
intentioned--but in many cases they fundamentally undermine the core
purpose of the bill, which is to have voluntary real-time sharing of
cyber threats, to allow that sharing to be between private entities and
the Federal Government, and even for private entities to be able to
share with each other.
This is a bill that creates the liability protections and the anti-
trust protections which that particular kind of sharing would allow. Of
course, throughout this whole debate, there has been much discussion
about how we protect our liberty in an information age. How do we have
both security and liberty?
Having served for a number of years on both the House Intelligence
Committee and the Senate Intelligence Committee, having served on the
Armed Services Committee in the last Congress and in this Congress on
the Defense Appropriations Committee, there is no argument in any of
those committees that one of our great vulnerabilities is cyber
security and how we protect ourselves.
We saw in the last few days that the head of the CIA had his own
personal account hacked into apparently by a teenager who is in the
process of sharing that information. If the head of the CIA and the
head of Homeland Security do not know how to protect their own personal
information, obviously information much more valuable than they might
personally share is also in jeopardy.
We do need to ensure that we protect people's personal liberties. We
need to do that in a way that defends the country. Both of those are
primarily responsibilities that we accept when we take these jobs, and
it is certainly our responsibility to the Constitution itself.
I think Chairman Burr and Vice Chairman Feinstein have done a good
job of bringing that balance together. This bill is carefully crafted
in a way that creates a number of different layers of efforts to try to
do both of those things.
First, the bill only encourages sharing; it doesn't require it. It
doesn't require anybody to share anything they don't want to share, but
it encourages the sharing of cyber threats. It works on the techniques
and the malware used by hackers. It specifically does not authorize the
sharing of personal information, and in fact the bill explicitly
directs the Federal Government to develop and make available to the
public guidelines to protect privacy and civil liberties in the course
of sharing the information.
The Attorney General is required to review these guidelines on a
regular basis. The bill mandates reports on the implementation and any
privacy impacts by inspectors general and by the Privacy and Civil
Liberties Oversight Board, to ensure that these threats to privacy are
constantly looked at.
Senator Flake's amendment, which we accepted as part of the bill just
a few minutes ago, guarantees that this issue has to be revisited.
I gave a speech at Westminster College in Fulton, MO, about a month
ago at the beginning of the 70th year of the anniversary of Winston
Churchill giving the ``Iron Curtain'' speech on that campus and talking
about liberty versus security there. I said I thought one of the things
we should always do is have a time that forced us as a Congress to
revisit any of the laws we have looked at in recent years to be sure we
protect ourselves and protect our liberty at the same time. This is a
voluntary bill. Maybe that wouldn't have been quite as absolutely
necessary here, but I was pleased to see that requirement again added
to this bill, as it has been to other bills like this.
This is a responsible bill. The people the Presiding Officer and I
work for can feel good about the responsible balance it has. It defends
our security, but it also protects our liberty. I look forward to its
final passage today. The debate would lead me to believe, and the votes
would lead me to believe, that is going to happen, but of course we
need to continue to work now to put a bill on the President's desk that
does that.
There still remain things to be done. One of the things I have worked
on for the last 3 years--Senator Carper and I have worked together,
Senator Warner has been very engaged in this discussion, as has
Chairman Thune--is the protection of sensitive personal information as
well as how do we protect the systems themselves.
Clearly this information sharing will help in that fight. There is no
doubt about that. In addition to supporting this bill, I want to
continue to work with my colleagues to see that we have a way to notify
people in a consistent way when their information has been stolen.
There are at least a dozen different State laws that address how you
secure personal information, and there are 47 different State laws that
address how you tell people if their information has been stolen. That
is too much to comply with. We need to find one standard. This
patchwork of laws is a nightmare for everybody trying to comply and
frankly a nightmare for citizens who get all kinds of different notices
in all kinds of different ways.
Without a consistent national standard pertaining to securing
information, without a consistent national standard pertaining to what
happens when you have a data breach and your information is wrongly
taken by someone else, we have only done part of this job. So I want us
to continue to work to find the solutions there. We need to find a way
to establish that standard for both data security and data breach. I am
going to continue to work with the Presiding Officer and my other
colleagues. Our other committee, the commerce committee, is a critical
place to have that happen. I wish we could have done this on this bill.
We didn't get it done on this bill, but I would say that now the first
step to do what we need to do is dealing with the problem of cyber
security in the way this bill does and then finish the job at some
later time.
So I look forward to seeing this bill passed today. I am certainly
urging my colleagues to vote for it. I think it has the protections the
people we work for would want to see, and I am grateful to my
colleagues for giving me a few moments here to speak.
I yield the floor.
____________________
[Congressional Record Volume 161, Number 158 (Tuesday, October 27, 2015)]
[Senate]
[Pages S7510-S7534]
From the Congressional Record Online through the Government Publishing Office [www.gpo.gov]
CYBERSECURITY INFORMATION SHARING ACT OF 2015--Continued
The PRESIDING OFFICER. Under the previous order, the time until 4
[[Page S7511]]
p.m. is equally divided in the usual form.
The Senator from Rhode Island.
Mr. REED. Mr. President, I wish to comment briefly on the
Cybersecurity Information Sharing Act that the Senate is considering.
Let me first commend the sponsors, Senator Burr and Senator Feinstein,
for their extraordinary work.
This bill will help ensure greater sharing of cyber threat
information, more rapidly and broadly, across industry and government.
As we have seen with large-scale attacks against the Federal Government
and companies such as Sony, there is an urgent need to start addressing
these breaches. While such legislation is not going to eliminate our
cyber security challenges, it should materially help to defeat and
deter cyber attacks and assist law enforcement in tracking down and
prosecuting cyber criminals. Information sharing will also assist the
intelligence agencies and law enforcement to detect and trace the
attacks originating from foreign actors, which is a crucial step in
holding other countries accountable.
Many of our citizens and corporations are understandably concerned
about the impact of information sharing on privacy. But we also must
recognize that rampant cyber crime is a monumental threat to the
privacy of the American people, and that sharing information about
these criminal acts cannot only protect privacy but also protect our
public safety and national security.
With respect to the specific privacy protections in the legislation
before us, the managers of this bill have come a long way toward
improving the balance between security and privacy protection,
especially the changes made to the base bill by the managers'
substitute.
A major area of concern was whether the government should be
authorized to use information shared under this bill to investigate or
prosecute a host of crimes unrelated to cyber security. Now the bill is
more narrowly tailored and focused on using information gathered under
this bill to go after crimes that are specifically related to cyber
security.
The managers' substitute also adds a requirement that the information
sharing procedures, required to be issued under this bill, include a
duty to notify individuals when the Federal Government shares their
personally identifiable information, or PII, erroneously.
The managers' substitute also includes an improved reporting
requirement that will show the number of notices sent because the
government improperly shared an individual's PII and the number of
cyber threat indicators shared automatically and, in addition, the
number of times these indicators were used to prosecute crimes.
So the managers' substitute has come a long way toward being more
protective of individual privacy, and I would like, once again, to
recognize Senators Feinstein and Burr's hard work here and their
willingness to listen to their colleagues. While I might personally
have set the balance slightly different in some places, which is why I
have supported some of the amendments before us, I think they have done
a significant job in improving the bill and providing privacy
protection.
I do want to draw my colleagues' attention to one important
additional fact here, which in some cases has been largely overlooked.
The cyber information sharing system established by this bill will
require Federal dollars to implement. Many of the agencies involved--
the Department of Homeland Security being the primary portal for shared
threat indicators--are funded on the nondefense discretionary side of
the ledger. This is an example of why I and many of my colleagues have
been urging for sequester relief for both defense and nondefense
spending--because we cannot defend our homeland without funding
nondefense agencies such as the Department of Homeland Security and a
host of other key Federal agencies. Indeed, I am encouraged that we are
close to voting on a budget solution that will provide 2 years of
sequester relief on a proportionally equal basis for defense and
nondefense spending, and that protects the full faith and credit of the
United States by taking the threat of default off the table until March
of 2017.
For this reason, I look forward to final passage of this legislation.
I once again commend the principal authors, Senator Burr and Senator
Feinstein, for their extraordinary effort.
I yield the floor.
The PRESIDING OFFICER. The Senator from Delaware.
Amendment No. 2581, as Modified
Mr. CARPER. Mr. President, I want to go back in time a little more
than 12, 13 or 14 years ago, to 9/11. One of the lessons learned by the
committee on which the Presiding Officer and I serve, now the Homeland
Security and Governmental Affairs Committee, was learned from former
Governor Tom Kean of New Jersey, cochair, along with former Congressman
Lee Hamilton from Indiana, former chair of the House Foreign Affairs
Committee. They were the cochairs of the 9/11 Commission. One of the
things they brought to our committee and to the Congress, after a lot
of work by a number of good men and women who served on that
commission, was the root causes for how that disaster occurred: How
could those four aircraft take down the Twin Towers, crash into the
Pentagon, and crash into a field in Shanksville, PA, instead of this
building right here? How could that have happened?
There are a number of reasons why it happened. But one of the reasons
why it happened is that we had stovepiped our intelligence services.
What the folks over at the FBI knew wasn't necessarily known or shared
with the Department of Homeland Security. What the folks at the
National Security Agency knew was not shared with either of the other
two agencies. What the Defense Information Agency knew or what other
agencies knew simply didn't get shared--stovepiped--because we did a
lousy job of sharing the real story, the full truth on what was being
plotted, what was going to come down and literally take thousands of
lives in one day and change in many ways our country--in profound ways
that still exist today. ``Stovepiping''--I have heard that word a
hundred times in hearings and before our committee and in talking to
folks in the 9/11 Commission. The legislation that we passed on the
heels of that disaster was designed to make sure we didn't end up
stovepiping again with intelligence information that might lead us to
avert that kind of disaster. So far, it seems to be working and is much
needed, and I think it has been helpful.
Today, I want to talk about a different kind of stovepiping that I am
afraid we may end up with--not to avert or block an aviation takeover
of an aircraft and disasters involving the aviation sector but a
disaster in cyber space in the face of cyber threats to our country.
We are working here today and will be voting later today on an
amendment or two and then on final passage of the Cybersecurity
Information Sharing Act. Again, just to remind everybody, the reason
why we are considering this is there needs to be a better sharing of
information when businesses come under cyber attack from those within
our country, outside of our country, cyber nations, and criminal
organizations. We need to do a better job of sharing that information--
business to business and business to government--and for the government
to share that information within the government to agencies that need
to know so we can respond to those attacks.
Shortly after the 9/11 Commission recommendations were enacted, one
of the things that we did was we stood up a new department called the
Department of Homeland Security. It is a civilian agency, as we know.
It is not the Department of Defense. It is not the Department of
Justice. It is not the FBI, and it is not the National Security Agency.
It is a civilian organization.
When the Department of Homeland Security was created, one of the
ideas behind it was that it would not be just a civilian operation, but
it would be a civilian operation that could receive, from businesses
and from other governmental entities, information relating to cyber
attacks. That information could come through a portal--think about it;
almost like a window--through which those threat indicators would be
reported. Those threat indicators would come through that portal at the
Department of Homeland Security. The Department of Homeland Security
[[Page S7512]]
would do, almost in real time, a privacy scrub to strip off from the
information--the threat indicators submitted from other businesses or
other government entities--Social Security numbers or other personally
identifiable information or information that just shouldn't go to other
Federal agencies or other businesses. They would strip it out--not in a
week, not in a day, not in an hour, not even, in many cases, in a
minute, but just like that--immediately--real-time privacy scrub.
As the Presiding Officer knows, we tried for years to be able to
enact legislation that incentivizes businesses that have been victims
of cyber attacks to share that information with one another, with other
businesses, and with the Federal Government. A bunch of them have been
reluctant to do it. Some of them have been reluctant to do it because
they don't want to get sued. If they disclose that they had a breach
and maybe their competitors didn't, how would that be used against
them? How could they be named in lawsuits if attacks occurred?
So in order to get them to be willing to share information, we had to
incent them. And the way we decided to incent them is to say: Share the
information. You don't have to worry if you share it with the
Department of Homeland Security through the portal established in this
civilian agency. Share it with the Department of Homeland Security, and
you have liability protection or, as it turns out, if you already
shared it previously, if it has been shared previously with the Federal
Government, you can share it again and still enjoy liability
protection. You can share it with companies that are victims of cyber
attacks, share it with their regulator, and still enjoy liability
protection.
What we want to do is to make sure companies and businesses that are
hacked don't just sit on the information, that they do something with
it. This is a saying we have on Amtrak: If you see something, say
something. If something happens to a business--a cyber attack
intrusion--we want them to share it so other businesses and other
Federal agencies can be prepared for it, look out for it, and stop it.
Where does this take me? This takes me to an amendment that we are
going to be voting on later this afternoon offered by one of our
colleagues, Senator Cotton. It would, I fear, risk revisiting
stovepiping--not the kind of stovepiping that led to the disaster of 9/
11 but stovepiping that could lead to cyber threats--threat indicators
shared with the Federal Government but not with the Department of
Homeland Security, which receives these threats and immediately
disburses them to other agencies that have a need to know. But what the
Cotton amendment would do is that it would say that a business that is
a victim of a cyber attack could share with the FBI, could share with
Secret Service, but wouldn't have to share with the Department of
Homeland Security.
The reason why in our legislation, which Senator Burr, Senator
Feinstein, I, and others have worked on, we have it going through the
Department of Homeland Security is because, more than any Federal
agency, they are set up to do privacy scrubs. That is one of the things
they do, and, frankly, they do it really well. Their job is to then
spread that information and share that information back to the private
sector, in some cases, and in other cases, just with relevant
agencies--NSA, FBI, Department of Justice, Treasury, whoever else needs
to know that information.
As part of the authors of the legislation, I join them in this. Our
fear is if the information isn't shared with the Department of Homeland
Security, which will then broadly share it in real-time and share that
information with those who need to know it, and if it ends up that the
FBI or, frankly, any other agency that doesn't have that ability to do
a great privacy scrub maybe, that doesn't have maybe the mission to
immediately share that information in real time to other relevant
players, then the news--the word about that cyber attack--could
literally stay at that agency--the FBI or the Secret Service, for that
matter. We don't want that to happen. We don't want to see that
information stovepiped in one agency. We want to make sure that it goes
to one agency that does the privacy scrub. We want to make sure the
agency that does the privacy scrub shares that information in real time
with relevant Federal agencies and the private sector.
I probably shouldn't pretend to speak for Senator Feinstein and
Senator Burr. They will be here to speak for themselves. But I know
they share my concerns about this legislation. I ask, on behalf of
them, and, frankly, for others of us who believe that this is a
dangerous amendment--and I don't say that lightly. We have worked
really hard. We have worked really well across the aisle--literally for
months now--to get to this point. To use a football analogy, we are not
just in the red zone passing this legislation; we are on the 10-yard
line, and it is first down and goal to go. Let's not muff the play.
Let's get the ball to the end zone. Let's pass this legislation. Let's
vote down the Cotton amendment, and let's go to conference. Let's go to
conference and provide the kind of protection against cyber attacks
that this country desperately needs and deserves.
I yield the floor.
The PRESIDING OFFICER. The Senator from West Virginia.
Carbon Regulations
Mrs. CAPITO. Mr. President, today I rise on behalf of West Virginian
workers, families, communities, and all hardworking Americans who will
bear the burden of these onerous carbon mandates. The bipartisan
resolution of disapproval, which I have introduced with my colleague
Senator Heidi Heitkamp from North Dakota and 47 other cosponsors, will
block EPA's greenhouse gas regulation targeting existing power sources.
I also strongly support Leader McConnell's companion resolution to
block the regulations targeting new power limits.
As I was thinking about the speech today and as I rise to give this
speech, I realize I have said many of these same words so many times
before. I have expressed the same frustrations and spouted off similar
statistics. What is the difference this time? The difference is we have
already seen the devastating effects and the callous nature of
regulatory overreach. We know what the new reality would be. The new
reality would be what we are facing with these new carbon regulations:
the reality of the families, the faces, and the hardships that we have
already endured; the thousands of layoffs in my State of West Virginia
that have already been issued; the jobs that have been lost and will
never come back.
Just this morning, nearly 200 West Virginia coal miners in Randolph
County were informed that their jobs will be gone by Christmas. Think
about how those families will spend their Christmas holiday. Then
consider how those realities will be magnified and felt throughout many
households across the country if these carbon mandates move forward--
the higher electricity bills that will result, the squeeze that already
is squeezing struggling middle-class families who are living on fixed
incomes, and the squeeze that those who live on fixed incomes will
feel. Our most vulnerable will bear the burden. Consider the far-
reaching effects these regulations will have on schools that are now
seeing their budgets shrink, home values that are now on the decline,
and fewer dollars that are available for public safety and law
enforcement.
It is reality that the policies emanating from this government--from
our government--are causing this destruction. This is not a natural
disaster. This is not a fiscal crisis. This is not an uncontrollable
event but a carefully crafted, precise, and very meditated assault on
certain areas of the country. These are policies that help some States
and truly hurt others, policies that target States like West Virginia
and North Dakota where we produce some of the most reliable and
affordable energy, and policies that are ripping the American dream
away from families in my State and communities. Our families want and
deserve healthy, clean air and water, and they want to live in a great
environment. But policies from Washington that pit one State against
another and prioritize certain communities and certain jobs over others
are bringing the livelihoods of many to a halt. On behalf of Americans
across the country, Members of Congress now have the opportunity to
express our concerns with these carbon mandates. We have an opportunity
to weigh in about whether these burdensome regulations should go into
effect.
[[Page S7513]]
I believe that a majority of my colleagues understand the need for
affordable and reliable energy, and that is why I am confident that
Congress will pass these resolutions and place this critical issue of
America's economic future squarely on President Obama's desk. With the
international climate negotiations in Paris scheduled for December, the
world is watching whether the United States will foolishly move forward
with regulations that will do virtually nothing to protect our
environment and will tie one hand behind our back economically. Even if
the President vetoes these resolutions--and we recognize the likelihood
that he will--passing them will send a clear message to the world that
the American people do not stand behind the President's efforts to
address climate change with economically catastrophic regulations.
I am pleased to be joined by several colleagues on the floor who
understand the need for affordable and reliable energy. I would like to
recognize Senator Heitkamp.
I ask unanimous consent to engage in a colloquy with my colleagues
for up to 30 minutes.
The PRESIDING OFFICER. Without objection, it is so ordered.
Ms. HEITKAMP. Thank you, Mr. President, and thank you to my great
colleague from the great State of West Virginia, a State that has been
powering America for many years--in fact, from the very beginning. My
thanks go to all of the great workers and coal miners in her State who
have added to our economic opportunity, not just for the people in West
Virginia but for the people of an entire region.
That is one thing we forget--that in America a great miracle happens
every day. We turn on a light switch and the lights come on. If that
doesn't happen or if it is too expensive to turn on that light switch,
we will not be the country that we are. With this regulation, I think
what we have done is cede the all-important role of electrical security
and energy security to an environmental agency that does not have the
experience or expertise to understand what it takes to get an electron
in the wire.
I am proud to stand today with my colleague Senator Capito and
introduce a bill to roll back the EPA rule on carbon emissions--that
rule which threatens the supply of abundant, affordable, and reliable
electricity in North Dakota. I pledge to register my displeasure
through multiple channels. This legislation today is the most public
way of expressing not just my frustration but the frustration and
concern of my State regulators and my State utilities.
Although this rule will have dramatic consequences across the
country, it unfairly targets North Dakota utilities. During the
original draft rule, North Dakota's allocation was 11 percent. This is
not something we were happy with given the extent of the jurisdictional
reach but something that people started rolling up their sleeves saying
if we have to reduce by 11 percent, how are we going to do it and how
are we going to meet this challenge? That is the North Dakota way, to
not only fight for our rights but also look at what the alternatives
are. Unfortunately, when the draft rule went from an 11-percent to a
45-percent reduction in the final rule, that was the straw that broke
the camel's back.
I am trying to do everything I can to push back against EPA's
burdensome powerplant rules to find workable solutions so North
Dakotans can continue to have low-cost, reliable electricity. This CRA
is one of the many different avenues I am taking to make sure that
North Dakota is treated fairly.
I want to talk about what is unique about North Dakota. In fact, a
lot of the generation that happens in North Dakota is generation that
is generated by rural electric co-ops. These co-ops own and operate
about 90 percent of the State's coal-based generation facilities, and
they provide electricity to rural areas that in the past other
utilities would not serve, not just rural areas in North Dakota but
rural areas all through the region. These are people at the end of the
line, as we call them, the very people that this rule will most impact
and that EPA and this administration failed to consider when they made
this final rule.
North Dakota's utilities are heavily invested in coal-based
generation for a good and historic reason. I think this is an important
point to make because a lot of people may say: Well, what is the
difference? You can fuel switch. But at the time our electric co-ops
built these generation facilities, they used coal because it was
against Federal law to use natural gas. The fuel use act made it
illegal to use natural gas for power generation, virtually forcing
these power companies to make the investment that they made in this
fuel source of coal. Now, after making billions of dollars of
investments to meet the mandates under the fuel use act and to meet the
numerous emissions standards that have been put forth by EPA, the
administration once again is straining these assets, causing them in
many cases to be stranded. If the administration were willing to pay
fair market value to strand these assets, then maybe we could have a
discussion, but I don't see that deal on the table. These utilities
built, modified, and retrofitted all at great cost and according to
Federal law at the time, and now they are threatening the very
existence of this generation.
These assets are not just critical to North Dakota. Our coal-based
generation provides dependable, affordable, reliable baseload
electricity to millions of people in the Great Plains with roughly 55
percent of electric power generated in North Dakota being shipped
outside our border.
When this final rule came out, I simply said that it was a slap in
the face to our utilities and our regulators. This final rule was so
vastly different from the rule that was proposed, it was almost
laughable that EPA said it wasn't in any way informed by any real input
or any real comment. How can you take a utility and a State from 11
percent to 45 percent and not reissue that rule? How can that be the
movement in the final rule?
I think this final rule is a rule that jeopardizes close to 17,000
good-paying jobs in my State. It provides power for rural communities
that otherwise would struggle for affordable, reliable baseload power.
We have some of the lowest power costs in the country because we have
some of the best utilities in the country, which are always looking out
for the consumer at the end of the line.
North Dakota has never stepped down from a tough challenge,
especially when the challenge is fair, the goal is attainable, and the
timeline is achievable, but that is not this rule. The goal is not
fair, the challenge is not fair, the goal is not attainable, and the
timeline is unachievable in my State--unachievable. That is not
anything the Clean Air Act ever anticipated--that we would set a goal
with no feasible or possible way of meeting that goal, given current
technology. Yet that is the position we are in.
At the end of the day, what matters most is making sure that our
utilities can do their jobs, making sure that when a North Dakotan or a
South Dakotan or someone from Wyoming or Colorado, where we deliver
power--and certainly those in Minnesota--reaches over to turn on that
light switch, regardless of the time of the day, that light comes on.
That is called baseload power. People who think this is easy, people
who think this is just switch fuels or switch technology, have never
sat in a boardroom as I have and listened to the challenges of putting
that electron on that wire.
I stand with my colleague from West Virginia and my colleague Joe
Manchin here on our side of the aisle saying enough is enough. This is
a problem we need to address. Maybe that is the difference in how we
look at this. This is an issue that we can tackle and achieve results
over time, but this rule is wrong. It is wrongheaded. It will, in fact,
cause huge disruption to the economy of my State and the economy of the
middle of this country. We have to do everything we can to prevent this
rule from becoming a reality.
Thank you for letting me join you, the great Senator from West
Virginia. We have two great Senators from West Virginia here.
I yield the floor.
The PRESIDING OFFICER. The majority leader.
Mr. McCONNELL. Mr. President, there is a war on coal in America--a
war on coal in America. The leader is the President of the United
States. A number of us were in the Senate in 2009 and 2010, and the
administration
[[Page S7514]]
couldn't pass their cap-and-trade proposal through the Senate. They had
60 votes in the Senate. The President and his party had 60 votes in the
Senate, but they couldn't pass the cap-and-trade proposal through this
body, so they decided they were going to do it anyway. They decided
they were going to do it anyway.
As the two Senators from West Virginia can attest, we have a
depression in central Appalachia, created not because of anything we
did here in Congress but because of the President's zeal to have an
impact worldwide on the issue of climate. I suspect that even if we
follow this path all the way to the end, this effort by the United
States would have about as much impact as dropping a pebble in the
ocean. Yet we are paying a real price for it here at home. Eastern
Kentucky looks like the Dust Bowl during the thirties--no jobs, no
opportunity, no future, not as a result of anything we passed through
the people's elected representatives but by this sort of arrogant,
singlehanded messianic goal to deal with worldwide climate.
Our options to stop it are quite limited. We do have the possibility
of the Congressional Review Act, but the weakness of that obviously is
that even though we can pass it with a simple majority, he is likely to
veto it.
We are here today to stand up for our people, the ratepayers of
America, and not only the ratepayers--90 percent of the electricity in
Kentucky comes from coal--but the communities that have been devastated
by this. I have never seen anything like it. I heard my parents talk
about what the Depression was like. It sounds and looks a lot like the
stories they told me about America in the 1930s.
This is a venture that will have no impact on the issue for which it
is being pursued but is having a devastating and current adverse impact
on the people we represent.
We have representatives from both parties here on the floor today
working toward overturning the administration's deeply regressive
energy regulations. These regulations are going to ship more middle-
class jobs overseas. I told my constituents last year: Coal has a
future; the question is, Does coal have a future in this country? The
Indians and the Chinese are not going to give up their future by not
using this cheap and abundant source of power. The Germans--one of the
greenest countries in Europe--are now importing coal. So coal has a
future. The question is, Does it have a future here after this
administration?
My folks can't even put food on the table. The ones who can find a
job somewhere are leaving. The population continues to decline.
As I said earlier, it is not going to have much of an impact on the
environment of our planet. This isn't going to do anything meaningful
to affect global carbon levels. It just seems that someone wants to be
able to pat themselves on the back for doing something even if they
accomplish hardly anything at all, except hurt a whole lot of
Americans. Higher energy bills and lost jobs may be trivial to some
folks out on the political left--not their jobs; they don't care--but
it is a different story for the middle-class Kentuckians whom I
represent.
So here we have on the floor Senators from both parties who are
saying it is time to take off the ideological blinders and instead
think about those who have already suffered enough over the past few
years. We have worked together to file bipartisan measures that would
overturn the administration's two-pronged regulations. I have joined
with Senator Heitkamp and Senator Capito on a measure that would
address one of those prongs, the one that pertains to existing energy
sources. Senator Manchin is here on the floor and joined me as I
introduced a measure that would address the other prong, the one that
pertains to new sources. These bipartisan measures together represent a
comprehensive solution. As I said, I am pleased to be joined here on
the floor by Senators from West Virginia and North Dakota. Senator
Daines from Montana is here--another important coal State. The chairman
of our Environment and Public Works Committee, Senator Inhofe, is here,
and some have already spoken and some will speak after me. I am proud
and pleased to be here on the floor with all of my colleagues standing
up for our aggrieved constituents who have been mightily abused by this
administration.
I yield the floor.
The PRESIDING OFFICER (Mr. Perdue). The Senator from West Virginia.
Mr. MANCHIN. Mr. President, first of all, I want to thank my
colleagues, Senator McConnell, Senator Capito, who is my colleague from
the State of West Virginia, Senator Daines, Senator Inhofe, and my good
friend Senator Heitkamp.
This is a bipartisan approach. Not often do we see a bipartisan
effort, a bipartisan colloquy on the floor of the Senate anymore, and
there should be because we all have the same interests. Basically, how
do we provide affordable, dependable, and reliable energy? That is what
this country was built on. We have defended this country by having
resources that we could use to basically defend ourselves, and that
resource has come from what the Good Lord gave us. Coal has been in
abundance in the United States of America. We have fought every war, we
have defended, we have energized, and we have built a middle class
unlike at any time in the history of this world.
So now it comes to the point where there is a group--basically the
ones on an ideological pathway--who says we can do it differently. If
someone came to me and said: We have this new great energy, and I am
sorry, West Virginia and North Dakota and Oklahoma and Montana, we have
this new energy--and maybe it is commercial hydrogen, which will be
water vapor--that is wonderful. We will figure a way. We will embrace
that. We will figure a way to make it. We will do something. We will
diversify. That is not the case. The case is simply this: This country
has depended and will depend--even by this administration's admission,
this country will depend on fossil fuel for at least the next three
decades. It is in the EIA report. They are going to have to have it.
Baseload, as the Senator from North Dakota said, is simply this:
something that will give us power 24/7, day and night, rain or shine.
There are only two things in the world that can do it: coal and
nuclear. Gas is coming on and gas will be a baseload when the
distribution lines and the pipelines are there to provide it. Right now
it is not, but it is coming on strong.
Just look no further than Japan. Japan was mostly moving toward
nuclear. Fukushima happens. When that happened, Japan had to change.
What did they do? They changed to coal. But they decided the new plants
they would build would be ultra super critical. That means 40 percent
efficiency, burning at the highest levels to reduce the emissions. They
are moving in technology ways.
Now, what does the plan that we are talking about and we have our
colleagues talking about--existing source, which means they can't
continue with what we have today, and new source, which means any new
plant has to be built to certain standards. Carbon capture
sequestration has not been proven commercially, not at one plant in
America. Yet these rules are based on using carbon capture
sequestration.
All we have said--some of us have said this: Why don't you at least
demonstrate that you can have that type of commercial operation and
that it can withstand 1 year under commercial load and show us those
are the new limits you want us to meet? That, to me, is reasonable.
Let me tell my colleagues this: If you were in the business of
producing power and you desired not to do that even though we had
technology, then you would have to close your plant. I understand that.
That is not the case. They can't show us technology and show us that it
has a commercial feasible pathway to be able to perform and provide the
energy we need. There is no way they can do it.
So I have said this: If it is unobtainable, it is unreasonable. That
is all. Don't expect me to do something that has never been done. If
the Federal Government says: Fine, we have $8 billion lying down at the
Department of Energy--$8 billion that hasn't been tapped--does that not
tell us something?
The private sector has not stepped up to take those types of loans
and to use those types of loans to find the new technology for the
future because they don't believe the administration wants
[[Page S7515]]
us to find any new technology that might be able to adhere to the
standards they have set.
So we sat back and we have done nothing. Then, on top of that, they
expect these plants, 30 years from now--if they are expecting to get
commercial power, electricity, fill the grid with power coming from
coal for the next 30 years--most of our plants average 50 years of age.
They can't produce the power they are going to produce--that we will
need for this country to have for 30 more years. An 80-year-old plant
just won't do it. So that means they come off the line, off the grid.
When that comes off the grid, what we call dependable, reliable, and
affordable energy goes away. It goes away.
I have said this: Someone needs to respectfully ask our President,
this administration, the EPA, the DOE: If for the next 90 days not
another ton of coal was delivered to a coal plant in America--not
another ton of coal because--and I have said this to the
administration. They have been very eloquent in basically telling the
American people: We don't like coal, we don't want coal, and we don't
need coal. If those were the facts, then make sure you tell the
American people, if they didn't have coal for 90 days, what the United
States of America would look like. Just tell me what it would look
like. Ask anybody what it would look like. The lives of 130 million
people would be in jeopardy tomorrow--130 million people. This system
could collapse. The east coast could be dark. Now, you tell me how you
are going to fill that in. And if you are not willing to be honest with
the American people and tell them that, don't make them believe there
is something that is not there, that you can run this off of wind and
solar.
We have a lot of wind in West Virginia, and we are proud of that. I
will give an example. My colleagues will remember the hottest days this
past summer, that very hot spell we had, 90 to 100 degrees. We have 17
acres of a wind farm on top of a beautiful mountain in West Virginia,
560 megawatts. We have a coal-fired plant sitting there, the cleanest
super-critical coal-fired plant on Mount Storm, 1,600 megawatts. Guess
how many megawatts of power the wind produced during the hottest times
of the summer when we needed the power. Two megawatts. Two. The wind
didn't blow. It was so hot and stagnant, it didn't blow. That poor
little coal-fired plant was giving it everything it had to try to
produce the power the Nation needed.
I am just saying the facts are the facts whether we like them or not.
So when this plan comes out and says that any new coal-fired plant
being built has to be--you can basically be assured they are not going
to build any. When they are saying existing plants have to meet certain
standards, they won't invest and try to hit a moving target.
So now what happens? For the 35 to 40 percent of the power you are
telling the United States of America, the people in this great country,
that we have--don't worry, we are going to take care of you, it is not
going to happen. We are not going to stand by and say we are not going
to fight for that. We are not only fighting for a way of life for West
Virginia, we are fighting for a way of life for this country.
This country depends on energy we have been able to produce. We have
always depended on our little State. North Dakota, now one of the best
energy-producing States we have in the country--Montana, Wyoming,
Oklahoma--we have been the heavy lifters. We will continue to work for
this great country. We just need a little help. That is all we are
asking for.
So I would say, ask the question: What would the country look like
tomorrow? The standards they are setting are basically unreasonable,
totally unreasonable, because they are unobtainable.
The impact is going to be devastating, basically. The system is going
to be to the point to where we can't depend on it, it is not reliable,
and we don't have the power of the future yet. Maybe our children or
grandchildren might see that. I hope so. But until the time comes where
we are going to transition from one to the other, make sure it is a
smooth transition. Make sure it is a dependable transition. Make sure
it is one that keeps this country the superpower of the world. If we
don't, I guarantee we will be the last generation standing as a
superpower saying that we are energy independent; we are not fighting
wars around the world basically for the energy this country needs. We
have the ability to basically take care of ourselves. We can be totally
independent with energy if we have an energy policy that works, but it
has to be realistic. This is not.
That is why I totally oppose this new power plan which is coming out.
It is a shame that we have to rely on the courts to protect something
we should be doing in the Halls of this Senate. It is a shame that the
courts have to step in to protect us.
With that being said, I yield the floor, and I thank my colleagues
for being here on this important issue.
The PRESIDING OFFICER. The Senator from Oklahoma.
Mr. INHOFE. Mr. President, first of all, I appreciate the fact that
my colleagues from West Virginia, North Dakota, Kentucky, and Montana--
all of us are getting together on this in a bipartisan way. I think it
is worth repeating, to make sure everyone understands where we are on
this, what a CRA is. The CRA is the Congressional Review Act. It is an
act that allows an elected person who is answerable to the public to
weigh in on these decisions that are made by the President--who can't
run again for office--and by the unelected bureaucrats who are
destroying this country.
As was pointed out by the Senator from Kentucky, I do chair the
committee called the Environment and Public Works Committee. On this
committee, we deal with these regulations. We have jurisdiction over
the EPA. It is interesting I would say that because we tried to get the
EPA to come in and testify as witnesses as to how the President plans
to move to the percentage of power that is going to be generated by the
year 2030 by renewables, and they won't testify because they don't have
a plan. They don't know how they are going to do it.
The CRA is significant because there are a lot of people in this case
who would be the liberals in this body who like the idea of being
overregulated, who like the idea of having the regulators run our
lives, and they are the ones who would love to go home when people are
complaining about the cost of all of these things and they can say:
Well, wait a minute. Don't blame us. That was a bureaucrat who did
that; that wasn't me.
Well, this forces accountability, and these guys don't like it. I can
assure you right now that we are going to give everyone an opportunity
to weigh in on what these issues are. They would much prefer to go home
and say: I know we are overregulating and I know it is destroying the
States--whatever the States happen to be--but it wasn't me, don't look
at me.
Now we are going to see who is responsible because what is going to
happen is we are going to have a vote. The vote is going to take place,
and I think our leader is correct when he says the President will
probably veto this. If the President vetoes it, it comes back for a
veto override, and then people will know who is for it and who is
against it. So I think a CRA has another great value. It forces
accountability by people who are answerable to the public.
On the issue we are discussing today, the interesting and the
consistent pattern we have is that what this President does is he gets
the things they tried to do through over--through legislation, and
those things that fail through legislation he tries then to do by
regulation.
Let me give you an example. Another issue--not the issue we are
talking about today--is the WOTUS issue, the waters of the United
States. Historically, it has been the States that have regulations over
the waters except for navigable waters. Well, of course, liberals want
everything in Washington. So 5 years ago a bill was introduced, and the
bill would have essentially taken the word ``navigable'' out so that
the Federal Government would have control over all the waters in my
State of Oklahoma and throughout America. Two of them introduced a
bill, one was Senator Feingold of Wisconsin and the House Member was
Congressman Oberstar from one of the Northern States. I don't know
which one it was. They introduced a bill to take the word ``navigable''
out. Not only did we overwhelmingly defeat the legislation, but the
public defeated the two of them in the next election.
[[Page S7516]]
Now the President is trying to do what he was not able to do through
legislation through regulation. The same thing is true--the Senator
from West Virginia is right when he talked about what they are trying
to do. It is very interesting when you look at this bill. We are
talking about the emissions of CO2. The first bill that was
introduced was in 2002. It was the McCain-Lieberman bill. We defeated
that. The next one was the McCain-Lieberman bill in 2005, and the third
one was the Warren-Lieberman bill in 2008. Then we had the Waxman-
Markey bill that we never even got to vote on because nobody was going
to vote for it.
So what they fail to be able to do legislatively, they are now trying
to do through regulations, and that is why a CRA is significant because
it does force accountability.
Let me make one other statement. This thing about Paris that is going
to take place in December. This is the big party that the United
Nations puts on every year. It is the 21st year they have done this. I
can remember when they did it in 2009. That was going to be Copenhagen.
Several people went over there at that time. President Obama was in the
Senate, Hillary was in the Senate, Pelosi was there, and John Kerry
went. They went over there to tell the 192 countries that were meeting
in Copenhagen--the same 192 countries that will be meeting in 2
months--went over to tell them we were going to pass cap-and-trade
legislation that year. That was 2009.
I went over after they had given their testimony there. I went all
the way over to Copenhagen, spent 3 hours, and came all the way back on
the next flight. I probably had the most enjoyable 3 hours I ever had
because I was able to talk to 192 countries and tell them they had been
lied to; that we are not going to be passing it. The same thing is
going on in December of this year.
By the way, let me just mention one thing that hasn't been said.
There are people out there listening to this who actually believe this
stuff, that the world is going to come to an end because of
CO2 manmade gases. This is something we have been listening
to for a long period of time. I remember right before going to
Copenhagen in 2009--at that time the Administrator of the Environmental
Protection Agency was Lisa Jackson, an appointee by President Obama,
and I asked her this question on the record, live on TV. I asked: If we
had passed any of the legislation or the regulations that we are
talking about passing, would this have an effect of lowering the
CO2 worldwide? She said--now keep in mind this was an Obama
appointee--by the way, Obama was President at that time when he went to
Copenhagen. She said: Well, no, it wouldn't reduce emissions worldwide
because it just pertains to the United States.
This isn't where the problem is. The problem is in India, it is in
China, it is in Mexico. The problem we would have there is, yes, we
might lower our CO2 emissions in the United States. However,
those other countries will not, and it could have the effect of
increasing, not decreasing, CO2 emissions because as we
chase our manufacturing base overseas to places they don't have any
restrictions, we would have the effect of increasing it.
So I am just saying I appreciate the fact we are all together on this
and making the necessary efforts to make people accountable. I think it
might surprise a lot of people as to who changes their mind on this
once they know they have to cast a vote and be accountable.
I applaud, certainly, my friends from West Virginia and the other
States that are involved in this. I think this is the right thing to
do. Let's keep in mind the Utility MACT--that is the maximum achievable
control technology--was the first shock to put coal under. At that time
we did a CRA, and we actually came within four votes of getting the
bill passed, and that was when Republicans were not a majority. I look
for some good things to happen, and I think we are doing what is right
and responsible.
I yield the floor.
The PRESIDING OFFICER. The Senator from West Virginia.
Mrs. CAPITO. Mr. President, I ask unanimous consent for additional
time so the Senator from Montana can join the colloquy. As he reminds
me, the Senator has the largest recoverable tonnage of coal in the
Nation.
The PRESIDING OFFICER. Without objection, it is so ordered.
Mr. DAINES. Thank you, Mr. President.
This administration is shutting down coal-fired powerplants in the
United States. I thank the Senator from West Virginia, Mrs. Capito, the
other Senator from West Virginia, Mr. Manchin, and we have Senator
Heitkamp here. We had Democrats and Republicans in colloquy talking
about what is going on with coal-fired plants and the Clean Power Plan
of this administration.
This is what is happening. It is killing good-paying jobs for union
workers, for pipefitters, for boilermakers, and tribal members in my
State with these so-called Clean Power Plan regulations. At the same
time, it is stifling investment that could lead to innovation to make
coal cleaner in the United States.
As I travel across Montana, I have heard Montanans describe the EPA
as--a rancher once told me it stands for ``Eliminate Production
Agriculture.'' A union member recently told me it stands for the
``Employment Prevention Agency.'' President Obama and his ``Employment
Prevention Agency'' continues to wage war on American energy, American
families, and on American jobs. This so-called Clean Power Plan is an
all-out frontal assault on affordable energy and good-paying union jobs
as well as tribal jobs. This will leave President Obama directly
responsible for skyrocketing energy bills, a loss of tax revenue for
our schools, teachers and our roads and the unemployment of thousands
of hard-working Americans. The President ignores the fact that more
than half of Montana's electricity comes from coal, as do thousands of
jobs and $120 million in tax revenue every year.
In fact, 40 percent of our Nation's energy comes from coal. When a
young person plugs their iPhone or their smartphone into the wall and
charges it, most likely it is being charged by coal.
In my hometown of Bozeman, we have a Tesla charging station at one of
our hotels. Elon Musk at Tesla did an amazing, innovative job creating
electric vehicles, but when they plug those Tesla vehicles into those
chargers, those Tesla vehicles in Montana are likely powered by coal.
The facts are that coal production in the United States is much safer
and less carbon intensive than coal from other nations. As had been
mentioned, this is a global challenge we must think about and address.
The Powder River Basin in Southeast Montana has coal that is among the
cleanest in the world. It has lower sulfur content and cleaner than
Indonesian coal. Shutting down U.S. coal will have a negligible impact
on global coal demand and global emissions. However, it will ultimately
make it more likely that less technologically advanced coal production
techniques will be used around the world.
This is the way to think about it. The United States consumes about
10 percent of the world's coal. Said another way, 90 percent of the
coal consumption in the world occurs outside the United States, and the
global demand for coal-fired energy will not disappear even if the
United States were to shut down every last coal mine and every last
coal-fired plant.
Again, individuals are entitled to their own opinions but not to
their own facts. Here are the facts. Coal use around the world has
grown about four times faster than renewables. There are 1,200 coal
plants planned across 59 countries. About three-quarters of them will
be in China and India. China consumes 4 billion tons of coal per year
versus the United States at 1 billion tons. China is building a new
coal-fired plant every 10 days, and that is projected to last for the
next 10 years.
In Japan--I used to have an office in Tokyo. My degree was in
chemical engineering, and I was part of a software company with offices
around the world. I remember the big earthquake that struck Japan--the
9.0 quake. The Fukushima nuclear reactors were disabled. How is Japan
dealing with that? They are building 43 coal-fired powerplants. By
2020, India may outbuild 2\1/2\ times more coal capacity as the United
States is about to use. So it is shortsighted and misguided to move
forward on an agenda that is going to devastate
[[Page S7517]]
significant parts of the economy. It is going to raise energy prices
and destroy union jobs and tribal jobs.
We are seeing that already in Montana. Earlier this month, in the
month of October, a customer of the Crow Tribe, the Sherco Coal plant
in Minnesota announced it needs to shut down two units. This cuts off a
significant portion of the customer base for Crow coal. Because the
Crow Tribe relies on coal-fired Midwest utilities for most of its non-
Federal revenue and for good-paying private jobs at the Absaloka Mine,
the unemployment rate on the Crow reservation today is in the high 40
percent. Without these coal mining jobs, that unemployment rate will go
to 80 to 85 percent.
Ironically, some of the first impacted by the Obama administration's
new regulations are those who can least afford it. You have heard it
from Senators on both sides of the aisle today. Under the final rule,
the Colstrip powerplant in Montana will likely be shuttered, putting
thousands of jobs at risk. We must take action. We need to stop these
senseless rules.
This past weekend I joined the Montana attorney general, Tim Fox, in
Helena to announce that Montana, along with 23 other States, has filed
a lawsuit against the Federal Government because of Obama's recent
decision. There are currently 26 States--the majority of the States in
this United States--through three different lawsuits that have
requested an initial stay on the rule.
As Leader McConnell mentioned in 2010, a Democratic-controlled
Congress could not pass these regulations. The people's House stopped
it, but now President Obama and the EPA are moving forward without the
people's consent.
I am thankful to partner with a bipartisan group of my colleagues,
Leader McConnell, Senator Capito, Senator Inhofe, Senator Manchin, and
Senator Heitkamp, who are speaking out and working to stop this harmful
rule. I am proud to stand and join them as a cosponsor of two
bipartisan resolutions of disapproval under the Congressional Review
Act that would stop the EPA from imposing the anti-coal regulation.
Coal keeps the lights on, it charges our iPhones, and it will
continue to power the world for decades to come. Rather than dismissing
this reality, the United States should be on the cutting edge of
technological advancements in energy development. We should be leading
the way in using clean, affordable American energy.
America can and should power the world. We can only do it if the
Obama administration steps back from the out-of-touch regulations and
allows American innovation to thrive once again. In summary, we need
more innovation, not more regulations.
Thank you, and I yield back my time.
The PRESIDING OFFICER. The Senator from West Virginia.
Mrs. CAPITO. Mr. President, I would like to thank my colleagues for
joining me in a colloquy, particularly the Senator from North Dakota,
who is cosponsoring the Congressional Review Act legislation with me on
existing coal-fired powerplants, and certainly my colleague from West
Virginia Senator Manchin. We have worked very well together in a
bipartisan way on these issues--Leader McConnell, Chairman Inhofe, and
Senator Daines from Montana.
I think we have presented a clear picture of the impact of these
rules. So I ask unanimous consent that any time spent in a quorum call
before the 4 p.m. vote series be charged equally against both sides.
The PRESIDING OFFICER. Without objection, it is so ordered.
Mrs. CAPITO. I yield the floor.
The PRESIDING OFFICER. The Senator from Florida.
Puerto Rico
Mr. NELSON. Mr. President, I want to talk about the financial crisis
that is going on in Puerto Rico. We have all heard about the current
situation that Puerto Rico finds itself in. They are suffering. They
are having trouble paying their bills and their economy is in shambles.
Some people have the attitude ``Well, that is not our problem,'' but
they are forgetting the fact that Puerto Rico is part of the United
States. It is a territory. It is not a foreign country. Puerto Ricans
are American citizens.
If a problem exists in Puerto Rico, it exists in the United States.
It is not something we can just ignore. It impacts the entire country.
If the economy continues to suffer in Puerto Rico, the people there
will just move to another part of the country. I want to repeat that.
If things are bad in Puerto Rico economically, they--Puerto Ricans--can
move to another part of the country. This is not immigration; this is a
move to the mainland. Many Puerto Ricans are leaving Puerto Rico
because of it is troubles.
Happily, many of the people who live on the island are moving to
Florida. They are adding to the diversity and immense fabric of Florida
that reflects the entire country, but our gain in Florida is Puerto
Rico's loss. There are more than 1 million people in Florida alone who
may have preferred to stay at home on the island with their friends and
their families. People who otherwise would be opening small businesses
or new doctors' offices in San Juan are opening them in Orlando. This
only hurts Puerto Rico's economic future.
We need to give Puerto Rico the tools it needs to get its economy
back on track. Puerto Rico cannot do that alone. Congress needs to
pitch in. I have joined a number of our colleagues--Blumenthal,
Schumer, and Menendez--in being a sponsor of the Puerto Rico Chapter 9
Uniformity Act. It fixes a glitch in the Federal bankruptcy law that
stops Puerto Rico's municipalities and public corporations from
restructuring their debt through the Federal bankruptcy court,
something that is law in all of the States. That is why we have a
bankruptcy law, but there is a glitch that you cannot do that in Puerto
Rico. That is simply unfair. The people of Puerto Rico should get equal
protection under the law.
Both the Finance Committee and the Energy and Natural Resources
Committee have held hearings in the past few weeks about the economic
crisis in Puerto Rico. Two of Puerto Rico's elected officials, Governor
Garcia Padilla and Congressman Pierluisi, have testified at these
hearings. Both said that Puerto Rican public corporations need access
to Chapter 9 debt restructuring.
It is this Senator's strong desire that we see them treated equally
under the law and that this legislation to fix this glitch comes to the
floor soon. We also need to help Puerto Rico's health care system. The
Medicaid Program in Puerto Rico serves nearly 1.7 million residents. It
is in terrible shape. In 2010, Congress passed the Affordable Care Act,
which provided Puerto Rico with a $5.4 billion one-time payment to
cover health care costs. That money is set to expire in 2019, but it
could even run out sooner.
Under Medicare Part D, Puerto Rican residents are being treated like
second-class citizens. They don't get the same financial support that
State residents get for prescription drug coverage. This has an effect
on their economy, stifling their ability to emerge from the crisis, not
to speak of the fact that they are not getting the health care other
American citizens have.
I remind you, Puerto Ricans are American citizens. So this kind of
treatment under Medicare flies in the face of the most basic American
value--equality. That is why several of us have joined Senator Schumer
on a bill to improve the way Puerto Rico is treated under Medicare and
Medicaid.
Last week, thankfully, the White House released a set of legislative
proposals to help Puerto Rico. Included in that list were some of the
bills I have mentioned here that I support. I urge our colleagues to
give this problem the attention it demands. We should move the
proposals that we can move in this legislative body. We should do it
with haste. There are more than 3\1/2\ million people in Puerto Rico.
They are U.S. citizens who, unlike most U.S. citizens, have no one to
represent them in this Chamber and only have a nonvoting delegate in
the House of Representatives. They have no voice here, but even with no
voice, there are some of us in this Chamber who will make sure that
their voice is heard. We cannot turn our backs on fellow Americans. By
the way, when it comes time to defend this country and our national
security, look at the percentage of Puerto Ricans who sign up for the
military. They are fellow Americans. I ask my colleagues to look deep
in their hearts
[[Page S7518]]
and find a way to come together to help the island of Puerto Rico, a
territory, our fellow American citizens, to get through this troubled
time.
I yield the floor.
I suggest the absence of a quorum.
The PRESIDING OFFICER. The clerk will call the roll.
The legislative clerk proceeded to call the roll.
Mr. NELSON. Mr. President, I ask unanimous consent that the order for
the quorum call be rescinded.
The PRESIDING OFFICER. Without objection, it is so ordered.
Budget Agreement
Mr. NELSON. Mr. President, since I see no one is waiting to speak, I
might offer a couple of comments about the proposed budget agreement.
We are still evaluating this, looking at the details, but first things
first. This seems to me to be something we should agree to. It
certainly gets us past this artificial debt crisis that would cause the
United States to go into economic cataclysmic fits.
If we do not raise the debt ceiling, America cannot pay its
obligations it has already incurred. It would be the first time the
U.S. Government went into default. That time has already run out, but
through extraordinary measures the Secretary of the Treasury has been
able to keep the cashflow going, but he is running out of all of his
tricks of the trade next week, November 3. That is the first thing it
would do most immediately.
The second thing it would do is it would get us over this budgetary
impasse of a budget that lays out the blueprint--for the flushing out
of that blueprint, which are the appropriations bills. So in the case
of the budget, what had been brought forth was a budgetary gimmick of
saying we were going to raise the amount of money we needed for
defense, but it was not going to meet this arbitrary budget cap that
had been set 3 years ago by the cuts across the board called the
sequester. But oh, by the way, we were going to increase that defense
spending a little more by creating an additional account over and above
what we spend overseas called the overseas contingency fund, OCO, and
therefore money was going to be supplied--the increases we need in
defense--with in fact not increasing the budgetary caps on spending.
Well, that was budgetary fakery. That was budgetary sleight of hand.
That was not budgetary truth. This agreement stops that for the next 2
years. Two years from now we will have to face the same thing and get
rid of this artificial cut across the board. That is no way of dealing
with trying to cut the budget. You ought to be cutting the budget with
a scalpel, not with a meat cleaver, where you come across the board on
every program.
Indeed, what this agreement does is it raises the caps on defense in
this first year $25 billion. It allows an OCO increase of $23 billion--
and that is considerably less than what had been proposed earlier.
Indeed, as you get into fiscal year 2017, it raises the budgetary caps
on defense by $15 billion, also a $23 billion OCO, or overseas
contingency fund, for the war effort over in Central Asia.
This is a good program, but the other thing this agreement corrects--
in the Republican budget, they had only raised money for defense
spending, and all the other needs of government that need to be
appropriated--nondefense discretionary spending--were kept artificially
low. If you are talking about grants from NIH, that was all being
limited. If you are talking about money for NASA as we get into the
program of going to Mars, all of that had been cut. If you are talking
about agricultural programs, all of that had been cut. No matter what
program--education, the environment, you go on down the list--all of
that had been cut.
This budget agreement that we will vote on hopefully in the next 2 or
3 days does, in fact, raise those budgetary caps for nondefense
spending as well as for defense spending. So where the caps were raised
in this first year of fiscal year 2016 by $25 billion for defense
spending, so too $25 billion for nondefense discretionary spending.
Likewise, in the next fiscal year, 2017, where the caps had been raised
$15 billion for defense spending, likewise, nondefense discretionary
and all those other needs of government, the same amount--$15 billion.
I will have more to say about this later, but while I have the
opportunity, I wish to commend to the Senate that I think it is
certainly in the interests off of our country to move forward and
approve this new budgetary agreement.
By the way, I might add as I close that an agreement has been
hammered out between the Republican and the Democratic leadership in
both Houses, along with the White House.
I yield the floor.
Mr. LEAHY. Mr. President, in today's digital age, many Americans live
their lives online. We communicate via email, use photo sharing and
social networking Web sites, store documents in the cloud, and access
our private financial and medical information through the Internet. The
amount of sensitive electronic data that we create and store on the
Internet is staggering and will only continue to grow. We know that
cyber security is an important component of protecting our critical
infrastructure. A cyber attack targeting the electric grid in the
Northeast, for example, could have dire effects during a cold Vermont
winter. I know that Vermonters care about cyber security, and Congress
must act responsibly to strengthen our ability to defend against cyber
attacks and breaches. But I also know that Vermonters care deeply about
their privacy and civil liberties, and I believe just as strongly that
whatever Congress does in the name of cyber security must not
inadvertently undermine the privacy and security of Vermonters and all
Americans.
For years, Congress has seemed singularly focused on the private
sector's desire for voluntary information sharing legislation. While
improving the flow of cyber threat information between the government
and private sector is a laudable goal that I support, it is not a
panacea for our cyber security problems. Information sharing alone
would not have prevented the major breaches of the past year, such as
the breach at the Office of Personnel Management, OPM, or the breaches
at Sony, Home Depot, or Anthem.
Narrowly tailored legislation to facilitate the sharing of technical,
cyber threat data could be beneficial, but the Senate Intelligence
Committee's bill lacks certain basic safeguards and threatens to
significantly harm Americans' privacy. That is why I have heard from a
number of Vermonters who oppose the bill and that is why consumer
advocacy organizations, privacy and civil liberties groups, and major
technology companies like Apple, Dropbox, and Twitter all vocally
oppose the bill. The technology companies know firsthand the importance
of ensuring our cyber security, and they oppose this bill because they
believe it does little to improve our cyber security and would
ultimately undermine their users' privacy.
For months, I have worked with Senator Feinstein to improve this
bill. She has been receptive to my concerns, and I appreciate that many
of the revisions that I suggested are now incorporated into the
managers' amendment. The managers' amendment now makes clear that
companies can only share information for cyber security purposes, which
is an improvement from the original legislation. It also prohibits the
government from using information shared by private companies to
investigate routine crimes that have nothing to do with cyber security.
And it removes a completely unnecessary and destructive new exemption
to the Freedom of Information Act, FOIA, which had the potential to
greatly restrict government transparency. These are significant
improvements, and I am thankful to Senator Feinstein for working with
me to incorporate them into the bill.
Unfortunately, the Senate Intelligence Committee's bill still has
major flaws. This bill overrides all existing legal restrictions to
allow an unprecedented amount of data--including Americans' personal
information--to flow to the government without adequate controls and
restrictions. It needlessly requires all information shared with the
government to be immediately disseminated to a host of Federal
agencies, including to the NSA. It fails to adequately require
companies to remove irrelevant personal information before sharing with
the government. The bill contains broad authorizations that allow
companies to monitor traffic on their networks with liability
protection and employ ``defensive measures'' that may
[[Page S7519]]
cause collateral harm to innocent Internet users. The bill also
continues to include another unnecessary FOIA exemption that will
weaken the existing FOIA framework.
Proponents of the bill have attempted to assuage many of these
concerns by arguing that sharing under this bill is voluntary, and if
companies do not want to share information with the government or use
the authorities in the bill, they do not have to. This bill may be
voluntary for companies, but it is not voluntary for consumers.
American consumers have no say on whether their information is shared
with the government and ends up in an NSA or IRS database. They may
have no recourse if a company needlessly monitors their Internet
activity or inappropriately shares their personal information with the
government.
Rather than limiting the dissemination of information in order to
protect the private and proprietary information of Americans and
American businesses, this bill goes in the wrong direction by giving
companies more liability protection and more leeway on how to share our
information. The most effective action Congress can take to improve our
cyber security is to pass legislation that requires companies to take
greater care of how they use and protect our data, not less. And we
should pass my Consumer Privacy Protection Act to require companies to
protect our personal information and help prevent breaches in the first
place. The cyber security legislation before us today does nothing to
address this very real concern, so I cannot support it. I fear that
this bill will significantly undermine our privacy, and I urge Senators
to vote against passage.
The PRESIDING OFFICER. The Senator from Arkansas.
Mr. COTTON. Mr. President, I ask unanimous consent to speak for up to
15 minutes.
The PRESIDING OFFICER. Is there objection?
Without objection, it is so ordered.
Amendment No. 2581, as Modified
Mr. COTTON. Mr. President, today I speak in support of the Cotton
amendment to the Cybersecurity Information Sharing Act. My amendment is
straightforward. It simply would provide liability protection to any
business or other private organization that shares cyber threat
indicators to the FBI or the Secret Service.
In its current form, the Cybersecurity Information Sharing Act would
require entities to submit these cyber threat indicators through a
portal created and run by the Department of Homeland Security in order
to receive liability protection. But there are also two exceptions that
would allow entities to receive liability protection outside the DHS
portal: first, if a submission was related to a previously shared cyber
threat indicator, and second, if the submitting entity is sharing
information with its Federal regulatory authority. But not every
private entity has a Federal regulatory authority, thank goodness, so
where a cable company can share with the FCC or an energy company can
go to the Department of Energy or FERC, other businesses are forced to
go to the DHS portal. Good examples are retailers such as JCPenney,
Walmart, Target, and Home Depot.
When the trade associations for two victims of the biggest cyber
attacks in recent memory--Target and Home Depot--are pleading for this
language, we should take notice and incorporate it. Anything else would
be unfair, inequitable, and unwise.
We ought to give these companies an alternative to the DHS portal.
One simple reason is that nobody knows what the portal will look like,
how it will function, or how much it will cost companies to interact
with it. The Federal Government, after all, doesn't have the best track
record for designing and deploying IT systems. Healthcare.gov was not
exactly a resounding success. One could easily imagine a company trying
to share a cyber threat indicator and getting an error message from the
portal, just as millions of Americans received when they tried to sign
up for ObamaCare.
In this case, regulated businesses can just go to their regulator.
Private and small businesses will be out of luck, though. This is the
primary reason my amendment has such strong private support.
Organizations such as the National Retail Federation, the chamber of
commerce, the National Cable & Telecommunications Association, and many
others support this commonsense amendment.
The second main reason that entities should be able to share directly
with the FBI and the Secret Service is that the bill is about promoting
collaboration between the government and the private sector, as the
National Security Council says that we should in this tweet: ``More
than any other national security topic, effective cybersecurity
requires the US gov't & private sector to work together.'' I agree.
As Director Comey recently told the Senate Intelligence Committee,
the FBI has redoubled its efforts to reach out to private businesses in
this area. This has paid dividends. And there is no entity in the
Federal Government that the private sector trusts more on cyber
security than the FBI. That is why Sony Pictures called the FBI when it
was hacked by North Koreans last year.
I also have to imagine that is the main reason the White House
endorsed my amendment over the weekend when they sent out this very
helpful tweet: ``If you are a victim of a major cyber incident, a call
to @FBI, @SecretService, or @DHSgov is a call to all.'' My goodness,
Susan Rice and I stand together in agreement that if you are a victim
of a cyber incident, you should be able to call the FBI, the Secret
Service, or the DHS. I thank the National Security Advisor and the
White House for their support for the concept behind my amendment.
I would also like to take a few moments to dispel a few myths about
this amendment. The first myth is that the Cybersecurity Information
Sharing Act creates a single portal at DHS for liability-protected
information sharing with the Federal Government and that the Cotton
amendment would create an unprecedented second channel.
This is false. The bill authorizes multiple liability-protected
sharing channels with the Federal Government, not just one, through a
broad exception to the DHS portal that permits certain regulated
businesses to engage in liability-protected sharing of cyber threat
information directly with any Federal regulators without requiring that
it first pass through DHS. The Cotton amendment simply provides the
same flexibility for businesses that already have established threat-
sharing relationships with the FBI or the Secret Service to maintain
their existing channels for sharing and not incur significant costs and
delays to establish new ones with DHS. My amendment is consistent with
this multichannel sharing approach.
The second myth is that my amendment would harm privacy as it would
allow the sharing of cyber threat indicators with the FBI and the
Secret Service and that the sharing with these agencies wouldn't happen
under the bill in its current form.
This is also false. Under the current version of the bill, if an
entity shares information through the DHS portal, the FBI and Secret
Service will receive it. My amendment doesn't change that or the
privacy protections in the bill. Both with and without my amendment,
the FBI and Secret Service will get cyber threat indicators.
The third myth is that the scrub DHS would have to conduct for
personally identifiable information is not as rigorous under my
amendment.
Again, this is not true. The Cybersecurity Information Sharing Act
requires all Federal entities receiving threat indicators to protect
privacy by removing personal information that may still be contained in
them before sharing with other entities. My amendment does not
eliminate or weaken any of the bill's privacy requirements, as the FBI
and Secret Service are required to protect privacy in the same way all
other Federal entities receiving threat indicators.
Finally, I simply want to note that the House-passed version of the
bill contains a nearly identical provision, and that bill passed with
overwhelming bipartisan support on a 307-to-116 vote.
To sum up, the Cotton amendment has overwhelming support in the
private sector, including companies that have been victims of cyber
crimes. It would lead to greater information sharing between the
private sector and the Federal Government. It preserves the privacy
protections in the bill. When it was included in the House bill, both
[[Page S7520]]
Republicans and Democrats voted yes. I therefore ask my colleagues on
both sides of the aisle to support this amendment.
I yield the floor.
I suggest the absence of a quorum.
The PRESIDING OFFICER. The clerk will call the roll.
The legislative clerk proceeded to call the roll.
Mr. BURR. Mr. President, I ask unanimous consent that the order for
the quorum call be rescinded.
The PRESIDING OFFICER (Mr. Lankford). Without objection, it is so
ordered.
Mr. BURR. Mr. President, what is the order of business?
Amendment No. 2552, as Further Modified
The PRESIDING OFFICER. Under the previous order, the question occurs
on amendment No. 2552, as further modified, offered by the Senator from
Delaware, Mr. Coons.
The Senator from California.
Mrs. FEINSTEIN. Mr. President, I wish to speak and urge a ``no'' vote
on amendment No. 2552, known as the Coons amendment.
This amendment essentially adds another layer of review to the bill's
current requirements. We worked this out in an earlier amendment with
Senator Carper. This amendment goes further, and it could prevent parts
of the government from quickly learning about cyber threats at machine
speed because it would require an additional privacy review for any
information going through the DHS portal.
The Carper amendment that I spoke about was adopted as part of the
managers' package, which made clear that the government should take
automated steps to ensure that the real-time information sharing system
can both protect privacy and allow for sharing at the speed necessary
to stop cyber threats. Because the Coons amendment will slow down
sharing via the DHS portal, I ask my colleagues to join me in voting
no.
The PRESIDING OFFICER. The Senator from Delaware.
Mr. COONS. Mr. President, I rise today to urge my colleagues to
support my amendment to make sure that this bill strikes the right
balance between privacy and security.
I respect the very hard work of Senators Burr and Feinstein and the
constructive amendment that my senior Senator Tom Carper added to the
managers' amendment. I do believe this bill has made significant
movement in the right direction. But I remain concerned, and my
amendment's purpose is to require that DHS review all cyber threat
indicators it receives and to remove personally identifying information
by the most efficient means practicable. It would not necessarily--
according to the amendment in the managers' package--be required that
DHS scrub, unless multiple agency heads unanimously agree on the
scrubbing process. My amendment's purpose is to simply ensure that
these privacy scrubs--done at machine speed, done in a responsible
way--protect citizen privacy and our security. I don't think we should
be forced to choose between those two.
I urge my colleagues to support my amendment.
The PRESIDING OFFICER. The question occurs on agreeing to amendment
No. 2552, as further modified.
Mr. BURR. I ask for the yeas and nays.
The PRESIDING OFFICER. Is there a sufficient second?
There appears to be a sufficient second.
The clerk will call the roll.
The legislative clerk called the roll.
Mr. CORNYN. The following Senators are necessarily absent: the
Senator from Texas (Mr. Cruz), the Senator from South Carolina (Mr.
Graham), the Senator from Kentucky (Mr. Paul), the Senator from Florida
(Mr. Rubio), and the Senator from Louisiana (Mr. Vitter).
The PRESIDING OFFICER (Ms. Ayotte). Are there any other Senators in
the Chamber desiring to vote?
The result was announced--yeas 41, nays 54, as follows:
[Rollcall Vote No. 289 Leg.]
YEAS--41
Baldwin
Bennet
Blumenthal
Booker
Boxer
Brown
Cantwell
Cardin
Coons
Daines
Durbin
Flake
Franken
Gardner
Gillibrand
Heinrich
Heller
Hirono
Klobuchar
Leahy
Lee
Markey
Menendez
Merkley
Moran
Murkowski
Murphy
Murray
Peters
Reed
Reid
Sanders
Schatz
Schumer
Shaheen
Stabenow
Sullivan
Tester
Udall
Warren
Wyden
NAYS--54
Alexander
Ayotte
Barrasso
Blunt
Boozman
Burr
Capito
Carper
Casey
Cassidy
Coats
Cochran
Collins
Corker
Cornyn
Cotton
Crapo
Donnelly
Enzi
Ernst
Feinstein
Fischer
Grassley
Hatch
Heitkamp
Hoeven
Inhofe
Isakson
Johnson
Kaine
King
Kirk
Lankford
Manchin
McCain
McCaskill
McConnell
Mikulski
Nelson
Perdue
Portman
Risch
Roberts
Rounds
Sasse
Scott
Sessions
Shelby
Thune
Tillis
Toomey
Warner
Whitehouse
Wicker
NOT VOTING--5
Cruz
Graham
Paul
Rubio
Vitter
The amendment (No. 2552), as further modified, was rejected.
The PRESIDING OFFICER. The Senator from North Carolina.
Mr. BURR. Madam President, I ask unanimous consent that the cloture
motion on S. 754 be withdrawn; that prior to the vote on adoption of
the Burr-Feinstein substitute amendment, the managers' amendment at the
desk be agreed to; and that following adoption of the substitute, the
bill be read a third time and the Senate vote on passage of the bill,
as under the previous order. I further ask that notwithstanding
adoption, the Flake amendment No. 2582 be modified with the technical
change at the desk.
The PRESIDING OFFICER. Is there objection?
Without objection, it is so ordered.
The amendment (No. 2582), as further modified, is as follows:
At the end, add the following:
SEC. 408. EFFECTIVE PERIOD.
(a) In General.--Except as provided in subsection (b), this
Act and the amendments made by this Act shall be in effect
during the 10-year period beginning on the date of the
enactment of this Act.
(b) Exception.--With respect to any action authorized by
this Act or information obtained pursuant to an action
authorized by this Act, which occurred before the date on
which the provisions referred to in subsection (a) cease to
have effect, the provisions of this Act shall continue in
effect.
Amendment No. 2581, as Modified
The PRESIDING OFFICER. Under the previous order, the question occurs
on amendment No. 2581, as modified, offered by the Senator from
Arkansas, Mr. Cotton.
The Senator from Arkansas.
Mr. COTTON. Madam President, I support this important bill, but I
want to strengthen it.
Under the bill, a business receives liability protection by reporting
threats to DHS or its regulatory agency, but many businesses,
especially retailers like Target or Home Depot, don't have a regulator;
thus, they must report to DHS. They have no choice. They must report to
DHS even if they have longstanding ties to the FBI, as did Sony
Pictures.
I contend that we should allow these businesses to choose between the
DHS, FBI, and Secret Service. Fortunately, the White House appears to
agree with my position. The National Security Council tweeted over the
weekend: ``If you are a victim of a major cyber incident, a call to
@FBI, @SecretService, or @DHSgov is a call to all.''
This amendment wouldn't undermine the single-point-of-reporting
concept behind this bill because there is already an exception for the
regulators, nor would it impair privacy rights because those rules
apply to the FBI.
Finally, I would note that the House-passed version of this bill
includes a nearly identical provision, and that got 307 votes.
Let's join together in a bipartisan fashion, adopt this amendment,
and strengthen the bill.
The PRESIDING OFFICER. The Senator from North Carolina.
Mr. BURR. Madam President, we are almost at the end. This is the last
amendment.
Unfortunately, I rise to ask my colleagues to vote against the
amendment of not only my colleague but a member of the Intelligence
Committee. This is a deal-killer. I will be very honest. This kills the
deal. One of the thresholds that we had to reach was the balance to
have one portal that the information goes through. This creates a new
[[Page S7521]]
portal. The White House is not in favor of it. Downtown is not in favor
of it because they understand what it does.
We are this close right now to a voluntary information sharing bill.
I can assure you that this is the first step. We have a ways to go. But
if you want to stop it dead in its tracks, support this amendment. If,
in fact, you want to get this across the goal line, then I would ask
you to defeat the Cotton amendment and let us move to passage of this
bill. Let us go to conference with the House.
I yield the floor.
The PRESIDING OFFICER. The question is on agreeing to the amendment,
as modified.
Mr. BURR. I ask for the yeas and nays.
The PRESIDING OFFICER. Is there a sufficient second?
There appears to be a sufficient second.
The clerk will call the roll.
The senior assistant legislative clerk called the roll.
Mr. CORNYN. The following Senators are necessarily absent: the
Senator from Texas (Mr. Cruz), the Senator from South Carolina (Mr.
Graham), the Senator from Kentucky (Mr. Paul), the Senator from Florida
(Mr. Rubio), and the Senator from Louisiana (Mr. Vitter).
The PRESIDING OFFICER. Are there any other Senators in the Chamber
desiring to vote?
The result was announced--yeas 22, nays 73, as follows:
[Rollcall Vote No. 290 Leg.]
YEAS--22
Boozman
Capito
Cornyn
Cotton
Fischer
Grassley
Inhofe
Isakson
Kirk
Lankford
McCain
McConnell
Perdue
Portman
Rounds
Sasse
Scott
Sessions
Shelby
Thune
Toomey
Whitehouse
NAYS--73
Alexander
Ayotte
Baldwin
Barrasso
Bennet
Blumenthal
Blunt
Booker
Boxer
Brown
Burr
Cantwell
Cardin
Carper
Casey
Cassidy
Coats
Cochran
Collins
Coons
Corker
Crapo
Daines
Donnelly
Durbin
Enzi
Ernst
Feinstein
Flake
Franken
Gardner
Gillibrand
Hatch
Heinrich
Heitkamp
Heller
Hirono
Hoeven
Johnson
Kaine
King
Klobuchar
Leahy
Lee
Manchin
Markey
McCaskill
Menendez
Merkley
Mikulski
Moran
Murkowski
Murphy
Murray
Nelson
Peters
Reed
Reid
Risch
Roberts
Sanders
Schatz
Schumer
Shaheen
Stabenow
Sullivan
Tester
Tillis
Udall
Warner
Warren
Wicker
Wyden
NOT VOTING--5
Cruz
Graham
Paul
Rubio
Vitter
The amendment (No. 2581), as modified, was rejected.
Mr. COTTON. I yield back all time.
Amendment No. 2749 to Amendment No. 2716
(Purpose: To improve the substitute amendment)
The PRESIDING OFFICER. Under the previous order, the managers'
amendment, No. 2749, is agreed to.
The amendment is printed in today's Record under ``Text of
Amendments.''
Vote on Amendment No. 2716, as Amended
The PRESIDING OFFICER. The question is on agreeing to the substitute
amendment No. 2716, as amended.
The amendment (No. 2716), as amended, was agreed to.
The bill was ordered to be engrossed for a third reading and was read
the third time.
The PRESIDING OFFICER. The Senator from North Carolina.
Mr. BURR. Madam President, I ask my colleagues for just the next 2
minutes to allow Senator Feinstein and me to thank our colleagues for
their help over the last several days as we have worked through the
cyber bill.
I thank my vice chairman, who has been beside me all the way, and I
thank Chairman Johnson and Ranking Member Carper for the input they
provided.
I want to say to committee staff who has worked night and day to get
us to this point and to members of the committee who worked diligently
for months to get this legislation enacted that I could not have done
it without you.
Now the work begins as we go to conference.
I turn to the vice chairman.
Mrs. FEINSTEIN. I thank you very much.
Madam President, I just want to say a personal word to Chairman Burr,
and maybe it is to everyone in this body. One of the things I have
learned from two prior cyber bills is that if you really want to get a
bill done, it has to be bipartisan, particularly a bill that is
technical, difficult, and hard to put together, and a bill where often
there are two sides. I thank you for recognizing this. We stood
shoulder to shoulder and the right things happened, and now we can go
to conference.
I also want to say that we did everything in this bill we possibly
could to satisfy what were legitimate privacy concerns. The managers'
package had 14 such amendments, and before that our staffs sat down
with a number of proposals from Senators and went over literally dozens
of additional amendments. So we took what we could.
When the chairman talks about the balance, what he means is that this
is the first time the chamber of commerce has supported a bipartisan
bill. This is the first time we had virtually all the big employers--
banks and retailers and other companies--supporting a bipartisan bill
because today everybody understands what the problem of cybersecurity
is much greater. So we stood shoulder to shoulder, and you all
responded, and I am very grateful.
There is still a lot of work to be done, but, Mr. Chairman, you and
your staff have been terrific. I would like to single a couple of them
out, if I might, in particular, Chris Joyner, Michael Geffroy, Jack
Livingston, Janet Fisher, John Matchison, and Walter Weiss.
I also want to thank Tom Carper, who has been working to get this
bill passed as much as anyone. He wrote one of the key changes in the
managers' package to improve privacy as information moves through the
DHS portal. He was supported by his chairman, Senator Johnson. He has
been a close partner throughout the process, and I thank him.
I also thank Gabbie Batkin, Matt Grote, and the other members of
Senator Carper's staff.
We had incredible support from our committee. It is a committee of
15--8 Republicans and 7 Democrats. I thank Senator Collins, who was
particularly concerned about the critical infrastructure of this
country, as well as Senators Mikulski, Whitehouse, King, Warner,
Heinrich, Blunt, Nelson, and Coats. I know they will help us push this
bill forward as we go to conference with the House.
I greatly appreciate the supporters of this bill outside the Senate,
to include the U.S. chamber of commerce and the associations that have
endorsed this bill, tech companies like IBM and Oracle, Secretary Jeh
Johnson at the Department of Homeland Security, and NSA Directors Keith
Alexander and Mike Rogers, and Lisa Monaco and Michael Daniel at the
White House.
On my staff, I would like to thank David Grannis, our staff director
on the minority side. David has been there for these previous cyber
bills, and it has proven to be a very difficult issue. David, you are a
10.
I also thank Josh Alexander. Josh has been our lead drafter and
negotiator and knows these cyber issues better than anyone. He has been
tireless on reaching agreement after agreement on this bill, and is, as
much as anybody, responsible for today's vote.
I would also like to thank my former cyber staffer Andy Grotto, as
well as Mike Buchwald, Brett Freedman, Nate Adler, and Nick Basciano.
Thank you all so very much.
Finally, I very much appreciate the work done by Ayesha Khanna in the
Democratic leader's office and Jeffrey Ratner at the White House.
We have the administration behind the bill, we have the Department of
Homeland Security behind the bill, and we have the editorial pages of
the Washington Post and the Wall Street Journal, as well as the chamber
of commerce, and most of the businesses of America.
So, Mr. Chairman, you did a great job, and thank you from the bottom
of my heart.
The PRESIDING OFFICER. The majority leader.
Mr. McCONNELL. Madam President, I just want to add my words of
congratulation to Chairman Burr and Ranking Member Feinstein. This is a
[[Page S7522]]
very complicated issue, as we all know. It has been around multiple
Congresses, and it took their leadership and coordination and
cooperation first to produce a 14-to-1 vote in the committee and then
this extraordinary success we have had out here on the floor. I know
all of us are extremely proud of the great work you have done.
Congratulations. We deeply appreciate the contribution you have made
to our country.
The PRESIDING OFFICER. The bill having been read the third time, the
question is, Shall it pass?
Mr. TILLIS. I ask for the yeas and nays.
The PRESIDING OFFICER. Is there a sufficient second?
There is a sufficient second.
The clerk will call the roll.
The bill clerk called the roll.
Mr. CORNYN. The following Senators are necessarily absent: the
Senator from Texas (Mr. Cruz), the Senator from South Carolina (Mr.
Graham), the Senator from Kentucky (Mr. Paul), the Senator from Florida
(Mr. Rubio), and the Senator from Louisiana (Mr. Vitter).
The PRESIDING OFFICER. Are there any other Senators in the Chamber
desiring to vote?
The result was announced--yeas 74, nays 21, as follows:
[Rollcall Vote No. 291 Leg.]
YEAS--74
Alexander
Ayotte
Barrasso
Bennet
Blumenthal
Blunt
Boozman
Boxer
Burr
Cantwell
Capito
Carper
Casey
Cassidy
Coats
Cochran
Collins
Corker
Cornyn
Cotton
Donnelly
Durbin
Enzi
Ernst
Feinstein
Fischer
Flake
Gardner
Gillibrand
Grassley
Hatch
Heinrich
Heitkamp
Hirono
Hoeven
Inhofe
Isakson
Johnson
Kaine
King
Kirk
Klobuchar
Lankford
Manchin
McCain
McCaskill
McConnell
Mikulski
Moran
Murkowski
Murphy
Murray
Nelson
Perdue
Peters
Portman
Reed
Reid
Roberts
Rounds
Sasse
Schatz
Schumer
Scott
Sessions
Shaheen
Shelby
Stabenow
Thune
Tillis
Toomey
Warner
Whitehouse
Wicker
NAYS--21
Baldwin
Booker
Brown
Cardin
Coons
Crapo
Daines
Franken
Heller
Leahy
Lee
Markey
Menendez
Merkley
Risch
Sanders
Sullivan
Tester
Udall
Warren
Wyden
NOT VOTING--5
Cruz
Graham
Paul
Rubio
Vitter
The bill (S. 754), as amended, was passed, as follows:
S. 754
Be it enacted by the Senate and House of Representatives of
the United States of America in Congress assembled,
SECTION 1. TABLE OF CONTENTS.
The table of contents of this Act is as follows:
Sec. 1. Table of contents.
TITLE I--CYBERSECURITY INFORMATION SHARING
Sec. 101. Short title.
Sec. 102. Definitions.
Sec. 103. Sharing of information by the Federal Government.
Sec. 104. Authorizations for preventing, detecting, analyzing, and
mitigating cybersecurity threats.
Sec. 105. Sharing of cyber threat indicators and defensive measures
with the Federal Government.
Sec. 106. Protection from liability.
Sec. 107. Oversight of Government activities.
Sec. 108. Construction and preemption.
Sec. 109. Report on cybersecurity threats.
Sec. 110. Conforming amendment.
TITLE II--FEDERAL CYBERSECURITY ENHANCEMENT
Sec. 201. Short title.
Sec. 202. Definitions.
Sec. 203. Improved Federal network security.
Sec. 204. Advanced internal defenses.
Sec. 205. Federal cybersecurity requirements.
Sec. 206. Assessment; reports.
Sec. 207. Termination.
Sec. 208. Identification of information systems relating to national
security.
Sec. 209. Direction to agencies.
TITLE III--FEDERAL CYBERSECURITY WORKFORCE ASSESSMENT
Sec. 301. Short title.
Sec. 302. Definitions.
Sec. 303. National cybersecurity workforce measurement initiative.
Sec. 304. Identification of cyber-related roles of critical need.
Sec. 305. Government Accountability Office status reports.
TITLE IV--OTHER CYBER MATTERS
Sec. 401. Study on mobile device security.
Sec. 402. Department of State international cyberspace policy strategy.
Sec. 403. Apprehension and prosecution of international cyber
criminals.
Sec. 404. Enhancement of emergency services.
Sec. 405. Improving cybersecurity in the health care industry.
Sec. 406. Federal computer security.
Sec. 407. Strategy to protect critical infrastructure at greatest risk.
Sec. 408. Stopping the fraudulent sale of financial information of
people of the United States.
Sec. 409. Effective period.
TITLE I--CYBERSECURITY INFORMATION SHARING
SEC. 101. SHORT TITLE.
This title may be cited as the ``Cybersecurity Information
Sharing Act of 2015''.
SEC. 102. DEFINITIONS.
In this title:
(1) Agency.--The term ``agency'' has the meaning given the
term in section 3502 of title 44, United States Code.
(2) Antitrust laws.--The term ``antitrust laws''--
(A) has the meaning given the term in section 1 of the
Clayton Act (15 U.S.C. 12);
(B) includes section 5 of the Federal Trade Commission Act
(15 U.S.C. 45) to the extent that section 5 of that Act
applies to unfair methods of competition; and
(C) includes any State law that has the same intent and
effect as the laws under subparagraphs (A) and (B).
(3) Appropriate federal entities.--The term ``appropriate
Federal entities'' means the following:
(A) The Department of Commerce.
(B) The Department of Defense.
(C) The Department of Energy.
(D) The Department of Homeland Security.
(E) The Department of Justice.
(F) The Department of the Treasury.
(G) The Office of the Director of National Intelligence.
(4) Cybersecurity purpose.--The term ``cybersecurity
purpose'' means the purpose of protecting an information
system or information that is stored on, processed by, or
transiting an information system from a cybersecurity threat
or security vulnerability.
(5) Cybersecurity threat.--
(A) In general.--Except as provided in subparagraph (B),
the term ``cybersecurity threat'' means an action, not
protected by the First Amendment to the Constitution of the
United States, on or through an information system that may
result in an unauthorized effort to adversely impact the
security, availability, confidentiality, or integrity of an
information system or information that is stored on,
processed by, or transiting an information system.
(B) Exclusion.--The term ``cybersecurity threat'' does not
include any action that solely involves a violation of a
consumer term of service or a consumer licensing agreement.
(6) Cyber threat indicator.--The term ``cyber threat
indicator'' means information that is necessary to describe
or identify--
(A) malicious reconnaissance, including anomalous patterns
of communications that appear to be transmitted for the
purpose of gathering technical information related to a
cybersecurity threat or security vulnerability;
(B) a method of defeating a security control or
exploitation of a security vulnerability;
(C) a security vulnerability, including anomalous activity
that appears to indicate the existence of a security
vulnerability;
(D) a method of causing a user with legitimate access to an
information system or information that is stored on,
processed by, or transiting an information system to
unwittingly enable the defeat of a security control or
exploitation of a security vulnerability;
(E) malicious cyber command and control;
(F) the actual or potential harm caused by an incident,
including a description of the information exfiltrated as a
result of a particular cybersecurity threat;
(G) any other attribute of a cybersecurity threat, if
disclosure of such attribute is not otherwise prohibited by
law; or
(H) any combination thereof.
(7) Defensive measure.--
(A) In general.--Except as provided in subparagraph (B),
the term ``defensive measure'' means an action, device,
procedure, signature, technique, or other measure applied to
an information system or information that is stored on,
processed by, or transiting an information system that
detects, prevents, or mitigates a known or suspected
cybersecurity threat or security vulnerability.
(B) Exclusion.--The term ``defensive measure'' does not
include a measure that destroys, renders unusable, provides
unauthorized access to, or substantially harms an information
system or data on an information system not belonging to--
(i) the private entity operating the measure; or
(ii) another entity or Federal entity that is authorized to
provide consent and has provided consent to that private
entity for operation of such measure.
(8) Entity.--
(A) In general.--Except as otherwise provided in this
paragraph, the term ``entity'' means any private entity, non-
Federal government agency or department, or State,
[[Page S7523]]
tribal, or local government (including a political
subdivision, department, or component thereof).
(B) Inclusions.--The term ``entity'' includes a government
agency or department of the District of Columbia, the
Commonwealth of Puerto Rico, the Virgin Islands, Guam,
American Samoa, the Northern Mariana Islands, and any other
territory or possession of the United States.
(C) Exclusion.--The term ``entity'' does not include a
foreign power as defined in section 101 of the Foreign
Intelligence Surveillance Act of 1978 (50 U.S.C. 1801).
(9) Federal entity.--The term ``Federal entity'' means a
department or agency of the United States or any component of
such department or agency.
(10) Information system.--The term ``information system''--
(A) has the meaning given the term in section 3502 of title
44, United States Code; and
(B) includes industrial control systems, such as
supervisory control and data acquisition systems, distributed
control systems, and programmable logic controllers.
(11) Local government.--The term ``local government'' means
any borough, city, county, parish, town, township, village,
or other political subdivision of a State.
(12) Malicious cyber command and control.--The term
``malicious cyber command and control'' means a method for
unauthorized remote identification of, access to, or use of,
an information system or information that is stored on,
processed by, or transiting an information system.
(13) Malicious reconnaissance.--The term ``malicious
reconnaissance'' means a method for actively probing or
passively monitoring an information system for the purpose of
discerning security vulnerabilities of the information
system, if such method is associated with a known or
suspected cybersecurity threat.
(14) Monitor.--The term ``monitor'' means to acquire,
identify, or scan, or to possess, information that is stored
on, processed by, or transiting an information system.
(15) Private entity.--
(A) In general.--Except as otherwise provided in this
paragraph, the term ``private entity'' means any person or
private group, organization, proprietorship, partnership,
trust, cooperative, corporation, or other commercial or
nonprofit entity, including an officer, employee, or agent
thereof.
(B) Inclusion.--The term ``private entity'' includes a
State, tribal, or local government performing electric or
other utility services.
(C) Exclusion.--The term ``private entity'' does not
include a foreign power as defined in section 101 of the
Foreign Intelligence Surveillance Act of 1978 (50 U.S.C.
1801).
(16) Security control.--The term ``security control'' means
the management, operational, and technical controls used to
protect against an unauthorized effort to adversely affect
the confidentiality, integrity, and availability of an
information system or its information.
(17) Security vulnerability.--The term ``security
vulnerability'' means any attribute of hardware, software,
process, or procedure that could enable or facilitate the
defeat of a security control.
(18) Tribal.--The term ``tribal'' has the meaning given the
term ``Indian tribe'' in section 4 of the Indian Self-
Determination and Education Assistance Act (25 U.S.C. 450b).
SEC. 103. SHARING OF INFORMATION BY THE FEDERAL GOVERNMENT.
(a) In General.--Consistent with the protection of
classified information, intelligence sources and methods, and
privacy and civil liberties, the Director of National
Intelligence, the Secretary of Homeland Security, the
Secretary of Defense, and the Attorney General, in
consultation with the heads of the appropriate Federal
entities, shall develop and promulgate procedures to
facilitate and promote--
(1) the timely sharing of classified cyber threat
indicators in the possession of the Federal Government with
cleared representatives of relevant entities;
(2) the timely sharing with relevant entities of cyber
threat indicators or information in the possession of the
Federal Government that may be declassified and shared at an
unclassified level;
(3) the sharing with relevant entities, or the public if
appropriate, of unclassified, including controlled
unclassified, cyber threat indicators in the possession of
the Federal Government;
(4) the sharing with entities, if appropriate, of
information in the possession of the Federal Government about
cybersecurity threats to such entities to prevent or mitigate
adverse effects from such cybersecurity threats; and
(5) the periodic sharing, through publication and targeted
outreach, of cybersecurity best practices that are developed
based on ongoing analysis of cyber threat indicators and
information in possession of the Federal Government, with
attention to accessibility and implementation challenges
faced by small business concerns (as defined in section 3 of
the Small Business Act (15 U.S.C. 632)).
(b) Development of Procedures.--
(1) In general.--The procedures developed and promulgated
under subsection (a) shall--
(A) ensure the Federal Government has and maintains the
capability to share cyber threat indicators in real time
consistent with the protection of classified information;
(B) incorporate, to the greatest extent practicable,
existing processes and existing roles and responsibilities of
Federal and non-Federal entities for information sharing by
the Federal Government, including sector specific information
sharing and analysis centers;
(C) include procedures for notifying, in a timely manner,
entities that have received a cyber threat indicator from a
Federal entity under this title that is known or determined
to be in error or in contravention of the requirements of
this title or another provision of Federal law or policy of
such error or contravention;
(D) include requirements for Federal entities sharing cyber
threat indicators or defensive measures to implement and
utilize security controls to protect against unauthorized
access to or acquisition of such cyber threat indicators or
defensive measures;
(E) include procedures that require a Federal entity, prior
to the sharing of a cyber threat indicator--
(i) to review such cyber threat indicator to assess whether
such cyber threat indicator contains any information that
such Federal entity knows at the time of sharing to be
personal information or information that identifies a
specific person not directly related to a cybersecurity
threat and remove such information; or
(ii) to implement and utilize a technical capability
configured to remove any personal information or information
that identifies a specific person not directly related to a
cybersecurity threat; and
(F) include procedures for notifying, in a timely manner,
any United States person whose personal information is known
or determined to have been shared by a Federal entity in
violation of this Act.
(2) Coordination.--In developing the procedures required
under this section, the Director of National Intelligence,
the Secretary of Homeland Security, the Secretary of Defense,
and the Attorney General shall coordinate with appropriate
Federal entities, including the Small Business Administration
and the National Laboratories (as defined in section 2 of the
Energy Policy Act of 2005 (42 U.S.C. 15801)), to ensure that
effective protocols are implemented that will facilitate and
promote the sharing of cyber threat indicators by the Federal
Government in a timely manner.
(c) Submittal to Congress.--Not later than 60 days after
the date of the enactment of this Act, the Director of
National Intelligence, in consultation with the heads of the
appropriate Federal entities, shall submit to Congress the
procedures required by subsection (a).
SEC. 104. AUTHORIZATIONS FOR PREVENTING, DETECTING,
ANALYZING, AND MITIGATING CYBERSECURITY
THREATS.
(a) Authorization for Monitoring.--
(1) In general.--Notwithstanding any other provision of
law, a private entity may, for cybersecurity purposes,
monitor--
(A) an information system of such private entity;
(B) an information system of another entity, upon the
authorization and written consent of such other entity;
(C) an information system of a Federal entity, upon the
authorization and written consent of an authorized
representative of the Federal entity; and
(D) information that is stored on, processed by, or
transiting an information system monitored by the private
entity under this paragraph.
(2) Construction.--Nothing in this subsection shall be
construed--
(A) to authorize the monitoring of an information system,
or the use of any information obtained through such
monitoring, other than as provided in this title; or
(B) to limit otherwise lawful activity.
(b) Authorization for Operation of Defensive Measures.--
(1) In general.--Notwithstanding any other provision of
law, a private entity may, for cybersecurity purposes,
operate a defensive measure that is applied to--
(A) an information system of such private entity in order
to protect the rights or property of the private entity;
(B) an information system of another entity upon written
consent of such entity for operation of such defensive
measure to protect the rights or property of such entity; and
(C) an information system of a Federal entity upon written
consent of an authorized representative of such Federal
entity for operation of such defensive measure to protect the
rights or property of the Federal Government.
(2) Construction.--Nothing in this subsection shall be
construed--
(A) to authorize the use of a defensive measure other than
as provided in this subsection; or
(B) to limit otherwise lawful activity.
(c) Authorization for Sharing or Receiving Cyber Threat
Indicators or Defensive Measures.--
(1) In general.--Except as provided in paragraph (2) and
notwithstanding any other provision of law, an entity may,
for a cybersecurity purpose and consistent with the
protection of classified information, share with, or receive
from, any other entity or the Federal Government a cyber
threat indicator or defensive measure.
(2) Lawful restriction.--An entity receiving a cyber threat
indicator or defensive measure from another entity or Federal
entity shall comply with otherwise lawful restrictions placed
on the sharing or use of such cyber threat indicator or
defensive
[[Page S7524]]
measure by the sharing entity or Federal entity.
(3) Construction.--Nothing in this subsection shall be
construed--
(A) to authorize the sharing or receiving of a cyber threat
indicator or defensive measure other than as provided in this
subsection; or
(B) to limit otherwise lawful activity.
(d) Protection and Use of Information.--
(1) Security of information.--An entity monitoring an
information system, operating a defensive measure, or
providing or receiving a cyber threat indicator or defensive
measure under this section shall implement and utilize a
security control to protect against unauthorized access to or
acquisition of such cyber threat indicator or defensive
measure.
(2) Removal of certain personal information.--An entity
sharing a cyber threat indicator pursuant to this title
shall, prior to such sharing--
(A) review such cyber threat indicator to assess whether
such cyber threat indicator contains any information that the
entity knows at the time of sharing to be personal
information or information that identifies a specific person
not directly related to a cybersecurity threat and remove
such information; or
(B) implement and utilize a technical capability configured
to remove any information contained within such indicator
that the entity knows at the time of sharing to be personal
information or information that identifies a specific person
not directly related to a cybersecurity threat.
(3) Use of cyber threat indicators and defensive measures
by entities.--
(A) In general.--Consistent with this title, a cyber threat
indicator or defensive measure shared or received under this
section may, for cybersecurity purposes--
(i) be used by an entity to monitor or operate a defensive
measure that is applied to--
(I) an information system of the entity; or
(II) an information system of another entity or a Federal
entity upon the written consent of that other entity or that
Federal entity; and
(ii) be otherwise used, retained, and further shared by an
entity subject to--
(I) an otherwise lawful restriction placed by the sharing
entity or Federal entity on such cyber threat indicator or
defensive measure; or
(II) an otherwise applicable provision of law.
(B) Construction.--Nothing in this paragraph shall be
construed to authorize the use of a cyber threat indicator or
defensive measure other than as provided in this section.
(4) Use of cyber threat indicators by state, tribal, or
local government.--
(A) Law enforcement use.--
(i) Prior written consent.--Except as provided in clause
(ii), a cyber threat indicator shared with a State, tribal,
or local government under this section may, with the prior
written consent of the entity sharing such indicator, be used
by a State, tribal, or local government for the purpose of
preventing, investigating, or prosecuting any of the offenses
described in section 105(d)(5)(A)(vi).
(ii) Oral consent.--If exigent circumstances prevent
obtaining written consent under clause (i), such consent may
be provided orally with subsequent documentation of the
consent.
(B) Exemption from disclosure.--A cyber threat indicator
shared with a State, tribal, or local government under this
section shall be--
(i) deemed voluntarily shared information; and
(ii) exempt from disclosure under any State, tribal, or
local law requiring disclosure of information or records.
(C) State, tribal, and local regulatory authority.--
(i) In general.--Except as provided in clause (ii), a cyber
threat indicator or defensive measure shared with a State,
tribal, or local government under this title shall not be
directly used by any State, tribal, or local government to
regulate, including an enforcement action, the lawful
activity of any entity, including an activity relating to
monitoring, operating a defensive measure, or sharing of a
cyber threat indicator.
(ii) Regulatory authority specifically relating to
prevention or mitigation of cybersecurity threats.--A cyber
threat indicator or defensive measure shared as described in
clause (i) may, consistent with a State, tribal, or local
government regulatory authority specifically relating to the
prevention or mitigation of cybersecurity threats to
information systems, inform the development or implementation
of a regulation relating to such information systems.
(e) Antitrust Exemption.--
(1) In general.--Except as provided in section 108(e), it
shall not be considered a violation of any provision of
antitrust laws for 2 or more private entities to exchange or
provide a cyber threat indicator, or assistance relating to
the prevention, investigation, or mitigation of a
cybersecurity threat, for cybersecurity purposes under this
title.
(2) Applicability.--Paragraph (1) shall apply only to
information that is exchanged or assistance provided in order
to assist with--
(A) facilitating the prevention, investigation, or
mitigation of a cybersecurity threat to an information system
or information that is stored on, processed by, or transiting
an information system; or
(B) communicating or disclosing a cyber threat indicator to
help prevent, investigate, or mitigate the effect of a
cybersecurity threat to an information system or information
that is stored on, processed by, or transiting an information
system.
(f) No Right or Benefit.--The sharing of a cyber threat
indicator with an entity under this title shall not create a
right or benefit to similar information by such entity or any
other entity.
SEC. 105. SHARING OF CYBER THREAT INDICATORS AND DEFENSIVE
MEASURES WITH THE FEDERAL GOVERNMENT.
(a) Requirement for Policies and Procedures.--
(1) Interim policies and procedures.--Not later than 60
days after the date of the enactment of this Act, the
Attorney General and the Secretary of Homeland Security
shall, in coordination with the heads of the appropriate
Federal entities, develop and submit to Congress interim
policies and procedures relating to the receipt of cyber
threat indicators and defensive measures by the Federal
Government.
(2) Final policies and procedures.--Not later than 180 days
after the date of the enactment of this Act, the Attorney
General and the Secretary of Homeland Security shall, in
coordination with the heads of the appropriate Federal
entities, promulgate final policies and procedures relating
to the receipt of cyber threat indicators and defensive
measures by the Federal Government.
(3) Requirements concerning policies and procedures.--
Consistent with the guidelines required by subsection (b),
the policies and procedures developed and promulgated under
this subsection shall--
(A) ensure that cyber threat indicators shared with the
Federal Government by any entity pursuant to section 104(c)
through the real-time process described in subsection (c) of
this section--
(i) are shared in an automated manner with all of the
appropriate Federal entities;
(ii) are only subject to a delay, modification, or other
action due to controls established for such real-time process
that could impede real-time receipt by all of the appropriate
Federal entities when the delay, modification, or other
action is due to controls--
(I) agreed upon unanimously by all of the heads of the
appropriate Federal entities;
(II) carried out before any of the appropriate Federal
entities retains or uses the cyber threat indicators or
defensive measures; and
(III) uniformly applied such that each of the appropriate
Federal entities is subject to the same delay, modification,
or other action; and
(iii) may be provided to other Federal entities;
(B) ensure that cyber threat indicators shared with the
Federal Government by any entity pursuant to section 104 in a
manner other than the real time process described in
subsection (c) of this section--
(i) are shared as quickly as operationally practicable with
all of the appropriate Federal entities;
(ii) are not subject to any unnecessary delay,
interference, or any other action that could impede receipt
by all of the appropriate Federal entities; and
(iii) may be provided to other Federal entities;
(C) consistent with this title, any other applicable
provisions of law, and the fair information practice
principles set forth in appendix A of the document entitled
``National Strategy for Trusted Identities in Cyberspace''
and published by the President in April, 2011, govern the
retention, use, and dissemination by the Federal Government
of cyber threat indicators shared with the Federal Government
under this title, including the extent, if any, to which such
cyber threat indicators may be used by the Federal
Government; and
(D) ensure there are--
(i) audit capabilities; and
(ii) appropriate sanctions in place for officers,
employees, or agents of a Federal entity who knowingly and
willfully conduct activities under this title in an
unauthorized manner.
(4) Guidelines for entities sharing cyber threat indicators
with federal government.--
(A) In general.--Not later than 60 days after the date of
the enactment of this Act, the Attorney General and the
Secretary of Homeland Security shall develop and make
publicly available guidance to assist entities and promote
sharing of cyber threat indicators with Federal entities
under this title.
(B) Contents.--The guidelines developed and made publicly
available under subparagraph (A) shall include guidance on
the following:
(i) Identification of types of information that would
qualify as a cyber threat indicator under this title that
would be unlikely to include personal information or
information that identifies a specific person not directly
related to a cyber security threat.
(ii) Identification of types of information protected under
otherwise applicable privacy laws that are unlikely to be
directly related to a cybersecurity threat.
(iii) Such other matters as the Attorney General and the
Secretary of Homeland Security consider appropriate for
entities sharing cyber threat indicators with Federal
entities under this title.
(b) Privacy and Civil Liberties.--
[[Page S7525]]
(1) Guidelines of attorney general.--Not later than 60 days
after the date of the enactment of this Act, the Attorney
General shall, in coordination with heads of the appropriate
Federal entities and in consultation with officers designated
under section 1062 of the National Security Intelligence
Reform Act of 2004 (42 U.S.C. 2000ee-1), develop, submit to
Congress, and make available to the public interim guidelines
relating to privacy and civil liberties which shall govern
the receipt, retention, use, and dissemination of cyber
threat indicators by a Federal entity obtained in connection
with activities authorized in this title.
(2) Final guidelines.--
(A) In general.--Not later than 180 days after the date of
the enactment of this Act, the Attorney General shall, in
coordination with heads of the appropriate Federal entities
and in consultation with officers designated under section
1062 of the National Security Intelligence Reform Act of 2004
(42 U.S.C. 2000ee-1) and such private entities with industry
expertise as the Attorney General considers relevant,
promulgate final guidelines relating to privacy and civil
liberties which shall govern the receipt, retention, use, and
dissemination of cyber threat indicators by a Federal entity
obtained in connection with activities authorized in this
title.
(B) Periodic review.--The Attorney General shall, in
coordination with heads of the appropriate Federal entities
and in consultation with officers and private entities
described in subparagraph (A), periodically, but not less
frequently than once every two years, review the guidelines
promulgated under subparagraph (A).
(3) Content.--The guidelines required by paragraphs (1) and
(2) shall, consistent with the need to protect information
systems from cybersecurity threats and mitigate cybersecurity
threats--
(A) limit the effect on privacy and civil liberties of
activities by the Federal Government under this title;
(B) limit the receipt, retention, use, and dissemination of
cyber threat indicators containing personal information or
information that identifies specific persons, including by
establishing--
(i) a process for the timely destruction of such
information that is known not to be directly related to uses
authorized under this title; and
(ii) specific limitations on the length of any period in
which a cyber threat indicator may be retained;
(C) include requirements to safeguard cyber threat
indicators containing personal information or information
that identifies specific persons from unauthorized access or
acquisition, including appropriate sanctions for activities
by officers, employees, or agents of the Federal Government
in contravention of such guidelines;
(D) include procedures for notifying entities and Federal
entities if information received pursuant to this section is
known or determined by a Federal entity receiving such
information not to constitute a cyber threat indicator;
(E) protect the confidentiality of cyber threat indicators
containing personal information or information that
identifies specific persons to the greatest extent
practicable and require recipients to be informed that such
indicators may only be used for purposes authorized under
this title; and
(F) include steps that may be needed so that dissemination
of cyber threat indicators is consistent with the protection
of classified and other sensitive national security
information.
(c) Capability and Process Within the Department of
Homeland Security.--
(1) In general.--Not later than 90 days after the date of
the enactment of this Act, the Secretary of Homeland
Security, in coordination with the heads of the appropriate
Federal entities, shall develop and implement a capability
and process within the Department of Homeland Security that--
(A) shall accept from any entity in real time cyber threat
indicators and defensive measures, pursuant to this section;
(B) shall, upon submittal of the certification under
paragraph (2) that such capability and process fully and
effectively operates as described in such paragraph, be the
process by which the Federal Government receives cyber threat
indicators and defensive measures under this title that are
shared by a private entity with the Federal Government
through electronic mail or media, an interactive form on an
Internet website, or a real time, automated process between
information systems except--
(i) consistent with section 104, communications between a
Federal entity and a private entity regarding a previously
shared cyber threat indicator to describe the relevant
cybersecurity threat or develop a defensive measure based on
such cyber threat indicator; and
(ii) communications by a regulated entity with such
entity's Federal regulatory authority regarding a
cybersecurity threat;
(C) ensures that all of the appropriate Federal entities
receive in an automated manner such cyber threat indicators
shared through the real-time process within the Department of
Homeland Security;
(D) is in compliance with the policies, procedures, and
guidelines required by this section; and
(E) does not limit or prohibit otherwise lawful disclosures
of communications, records, or other information, including--
(i) reporting of known or suspected criminal activity, by
an entity to any other entity or a Federal entity;
(ii) voluntary or legally compelled participation in a
Federal investigation; and
(iii) providing cyber threat indicators or defensive
measures as part of a statutory or authorized contractual
requirement.
(2) Certification.--Not later than 10 days prior to the
implementation of the capability and process required by
paragraph (1), the Secretary of Homeland Security shall, in
consultation with the heads of the appropriate Federal
entities, certify to Congress whether such capability and
process fully and effectively operates--
(A) as the process by which the Federal Government receives
from any entity a cyber threat indicator or defensive measure
under this title; and
(B) in accordance with the policies, procedures, and
guidelines developed under this section.
(3) Public notice and access.--The Secretary of Homeland
Security shall ensure there is public notice of, and access
to, the capability and process developed and implemented
under paragraph (1) so that--
(A) any entity may share cyber threat indicators and
defensive measures through such process with the Federal
Government; and
(B) all of the appropriate Federal entities receive such
cyber threat indicators and defensive measures in real time
with receipt through the process within the Department of
Homeland Security.
(4) Other federal entities.--The process developed and
implemented under paragraph (1) shall ensure that other
Federal entities receive in a timely manner any cyber threat
indicators and defensive measures shared with the Federal
Government through such process.
(5) Report on development and implementation.--
(A) In general.--Not later than 60 days after the date of
the enactment of this Act, the Secretary of Homeland Security
shall submit to Congress a report on the development and
implementation of the capability and process required by
paragraph (1), including a description of such capability and
process and the public notice of, and access to, such
process.
(B) Classified annex.--The report required by subparagraph
(A) shall be submitted in unclassified form, but may include
a classified annex.
(d) Information Shared With or Provided to the Federal
Government.--
(1) No waiver of privilege or protection.--The provision of
cyber threat indicators and defensive measures to the Federal
Government under this title shall not constitute a waiver of
any applicable privilege or protection provided by law,
including trade secret protection.
(2) Proprietary information.--Consistent with section
104(c)(2), a cyber threat indicator or defensive measure
provided by an entity to the Federal Government under this
title shall be considered the commercial, financial, and
proprietary information of such entity when so designated by
the originating entity or a third party acting in accordance
with the written authorization of the originating entity.
(3) Exemption from disclosure.--Cyber threat indicators and
defensive measures provided to the Federal Government under
this title shall be--
(A) deemed voluntarily shared information and exempt from
disclosure under section 552 of title 5, United States Code,
and any State, tribal, or local law requiring disclosure of
information or records; and
(B) withheld, without discretion, from the public under
section 552(b)(3)(B) of title 5, United States Code, and any
State, tribal, or local provision of law requiring disclosure
of information or records.
(4) Ex parte communications.--The provision of a cyber
threat indicator or defensive measure to the Federal
Government under this title shall not be subject to a rule of
any Federal agency or department or any judicial doctrine
regarding ex parte communications with a decision-making
official.
(5) Disclosure, retention, and use.--
(A) Authorized activities.--Cyber threat indicators and
defensive measures provided to the Federal Government under
this title may be disclosed to, retained by, and used by,
consistent with otherwise applicable provisions of Federal
law, any Federal agency or department, component, officer,
employee, or agent of the Federal Government solely for--
(i) a cybersecurity purpose;
(ii) the purpose of identifying a cybersecurity threat,
including the source of such cybersecurity threat, or a
security vulnerability;
(iii) the purpose of identifying a cybersecurity threat
involving the use of an information system by a foreign
adversary or terrorist;
(iv) the purpose of responding to, or otherwise preventing
or mitigating, an imminent threat of death, serious bodily
harm, or serious economic harm, including a terrorist act or
a use of a weapon of mass destruction;
(v) the purpose of responding to, or otherwise preventing
or mitigating, a serious threat to a minor, including sexual
exploitation and threats to physical safety; or
(vi) the purpose of preventing, investigating, disrupting,
or prosecuting an offense arising out of a threat described
in clause (iv) or any of the offenses listed in--
[[Page S7526]]
(I) sections 1028 through 1030 of title 18, United States
Code (relating to fraud and identity theft);
(II) chapter 37 of such title (relating to espionage and
censorship); and
(III) chapter 90 of such title (relating to protection of
trade secrets).
(B) Prohibited activities.--Cyber threat indicators and
defensive measures provided to the Federal Government under
this title shall not be disclosed to, retained by, or used by
any Federal agency or department for any use not permitted
under subparagraph (A).
(C) Privacy and civil liberties.--Cyber threat indicators
and defensive measures provided to the Federal Government
under this title shall be retained, used, and disseminated by
the Federal Government--
(i) in accordance with the policies, procedures, and
guidelines required by subsections (a) and (b);
(ii) in a manner that protects from unauthorized use or
disclosure any cyber threat indicators that may contain
personal information or information that identifies specific
persons; and
(iii) in a manner that protects the confidentiality of
cyber threat indicators containing personal information or
information that identifies a specific person.
(D) Federal regulatory authority.--
(i) In general.--Except as provided in clause (ii), cyber
threat indicators and defensive measures provided to the
Federal Government under this title shall not be directly
used by any Federal, State, tribal, or local government to
regulate, including an enforcement action, the lawful
activities of any entity, including activities relating to
monitoring, operating defensive measures, or sharing cyber
threat indicators.
(ii) Exceptions.--
(I) Regulatory authority specifically relating to
prevention or mitigation of cybersecurity threats.--Cyber
threat indicators and defensive measures provided to the
Federal Government under this title may, consistent with
Federal or State regulatory authority specifically relating
to the prevention or mitigation of cybersecurity threats to
information systems, inform the development or implementation
of regulations relating to such information systems.
(II) Procedures developed and implemented under this
title.--Clause (i) shall not apply to procedures developed
and implemented under this title.
SEC. 106. PROTECTION FROM LIABILITY.
(a) Monitoring of Information Systems.--No cause of action
shall lie or be maintained in any court against any private
entity, and such action shall be promptly dismissed, for the
monitoring of information systems and information under
section 104(a) that is conducted in accordance with this
title.
(b) Sharing or Receipt of Cyber Threat Indicators.--No
cause of action shall lie or be maintained in any court
against any entity, and such action shall be promptly
dismissed, for the sharing or receipt of cyber threat
indicators or defensive measures under section 104(c) if--
(1) such sharing or receipt is conducted in accordance with
this title; and
(2) in a case in which a cyber threat indicator or
defensive measure is shared with the Federal Government, the
cyber threat indicator or defensive measure is shared in a
manner that is consistent with section 105(c)(1)(B) and the
sharing or receipt, as the case may be, occurs after the
earlier of--
(A) the date on which the interim policies and procedures
are submitted to Congress under section 105(a)(1) and
guidelines are submitted to Congress under section 105(b)(1);
or
(B) the date that is 60 days after the date of the
enactment of this Act.
(c) Construction.--Nothing in this section shall be
construed--
(1) to require dismissal of a cause of action against an
entity that has engaged in gross negligence or willful
misconduct in the course of conducting activities authorized
by this title; or
(2) to undermine or limit the availability of otherwise
applicable common law or statutory defenses.
SEC. 107. OVERSIGHT OF GOVERNMENT ACTIVITIES.
(a) Biennial Report on Implementation.--
(1) In general.--Not later than 1 year after the date of
the enactment of this Act, and not less frequently than once
every 2 years thereafter, the heads of the appropriate
Federal entities shall jointly submit and the Inspector
General of the Department of Homeland Security, the Inspector
General of the Intelligence Community, the Inspector General
of the Department of Justice, the Inspector General of the
Department of Defense, and the Inspector General of the
Department of Energy, in consultation with the Council of
Inspectors General on Financial Oversight, shall jointly
submit to Congress a detailed report concerning the
implementation of this title during--
(A) in the case of the first report submitted under this
paragraph, the most recent 1-year period; and
(B) in the case of any subsequent report submitted under
this paragraph, the most recent 2-year period.
(2) Contents.--Each report submitted under paragraph (1)
shall include, for the period covered by the report, the
following:
(A) An assessment of the sufficiency of the policies,
procedures, and guidelines required by section 105 in
ensuring that cyber threat indicators are shared effectively
and responsibly within the Federal Government.
(B) An evaluation of the effectiveness of real-time
information sharing through the capability and process
developed under section 105(c), including any impediments to
such real-time sharing.
(C) An assessment of the sufficiency of the procedures
developed under section 103 in ensuring that cyber threat
indicators in the possession of the Federal Government are
shared in a timely and adequate manner with appropriate
entities, or, if appropriate, are made publicly available.
(D) An assessment of whether cyber threat indicators have
been properly classified and an accounting of the number of
security clearances authorized by the Federal Government for
the purposes of this title.
(E) A review of the type of cyber threat indicators shared
with the appropriate Federal entities under this title,
including the following:
(i) The number of cyber threat indicators received through
the capability and process developed under section 105(c).
(ii) The number of times that information shared under this
title was used by a Federal entity to prosecute an offense
consistent with section 105(d)(5)(A).
(iii) The degree to which such information may affect the
privacy and civil liberties of specific persons.
(iv) A quantitative and qualitative assessment of the
effect of the sharing of such cyber threat indicators with
the Federal Government on privacy and civil liberties of
specific persons, including the number of notices that were
issued with respect to a failure to remove personal
information or information that identified a specific person
not directly related to a cybersecurity threat in accordance
with the procedures required by section 105(b)(3)(D).
(v) The adequacy of any steps taken by the Federal
Government to reduce such effect.
(F) A review of actions taken by the Federal Government
based on cyber threat indicators shared with the Federal
Government under this title, including the appropriateness of
any subsequent use or dissemination of such cyber threat
indicators by a Federal entity under section 105.
(G) A description of any significant violations of the
requirements of this title by the Federal Government.
(H) A summary of the number and type of entities that
received classified cyber threat indicators from the Federal
Government under this title and an evaluation of the risks
and benefits of sharing such cyber threat indicators.
(3) Recommendations.--Each report submitted under paragraph
(1) may include recommendations for improvements or
modifications to the authorities and processes under this
title.
(4) Form of report.--Each report required by paragraph (1)
shall be submitted in unclassified form, but may include a
classified annex.
(b) Reports on Privacy and Civil Liberties.--
(1) Biennial report from privacy and civil liberties
oversight board.--Not later than 2 years after the date of
the enactment of this Act and not less frequently than once
every 2 years thereafter, the Privacy and Civil Liberties
Oversight Board shall submit to Congress and the President a
report providing--
(A) an assessment of the effect on privacy and civil
liberties by the type of activities carried out under this
title; and
(B) an assessment of the sufficiency of the policies,
procedures, and guidelines established pursuant to section
105 in addressing concerns relating to privacy and civil
liberties.
(2) Biennial report of inspectors general.--
(A) In general.--Not later than 2 years after the date of
the enactment of this Act and not less frequently than once
every 2 years thereafter, the Inspector General of the
Department of Homeland Security, the Inspector General of the
Intelligence Community, the Inspector General of the
Department of Justice, the Inspector General of the
Department of Defense, and the Inspector General of the
Department of Energy shall, in consultation with the Council
of Inspectors General on Financial Oversight, jointly submit
to Congress a report on the receipt, use, and dissemination
of cyber threat indicators and defensive measures that have
been shared with Federal entities under this title.
(B) Contents.--Each report submitted under subparagraph (A)
shall include the following:
(i) A review of the types of cyber threat indicators shared
with Federal entities.
(ii) A review of the actions taken by Federal entities as a
result of the receipt of such cyber threat indicators.
(iii) A list of Federal entities receiving such cyber
threat indicators.
(iv) A review of the sharing of such cyber threat
indicators among Federal entities to identify inappropriate
barriers to sharing information.
(3) Recommendations.--Each report submitted under this
subsection may include such recommendations as the Privacy
and Civil Liberties Oversight Board, with respect to a report
submitted under paragraph (1), or the Inspectors General
referred to in paragraph (2)(A), with respect to a report
submitted under paragraph (2), may have for improvements or
modifications to the authorities under this title.
[[Page S7527]]
(4) Form.--Each report required under this subsection shall
be submitted in unclassified form, but may include a
classified annex.
SEC. 108. CONSTRUCTION AND PREEMPTION.
(a) Otherwise Lawful Disclosures.--Nothing in this title
shall be construed--
(1) to limit or prohibit otherwise lawful disclosures of
communications, records, or other information, including
reporting of known or suspected criminal activity, by an
entity to any other entity or the Federal Government under
this title; or
(2) to limit or prohibit otherwise lawful use of such
disclosures by any Federal entity, even when such otherwise
lawful disclosures duplicate or replicate disclosures made
under this title.
(b) Whistle Blower Protections.--Nothing in this title
shall be construed to prohibit or limit the disclosure of
information protected under section 2302(b)(8) of title 5,
United States Code (governing disclosures of illegality,
waste, fraud, abuse, or public health or safety threats),
section 7211 of title 5, United States Code (governing
disclosures to Congress), section 1034 of title 10, United
States Code (governing disclosure to Congress by members of
the military), section 1104 of the National Security Act of
1947 (50 U.S.C. 3234) (governing disclosure by employees of
elements of the intelligence community), or any similar
provision of Federal or State law.
(c) Protection of Sources and Methods.--Nothing in this
title shall be construed--
(1) as creating any immunity against, or otherwise
affecting, any action brought by the Federal Government, or
any agency or department thereof, to enforce any law,
executive order, or procedure governing the appropriate
handling, disclosure, or use of classified information;
(2) to affect the conduct of authorized law enforcement or
intelligence activities; or
(3) to modify the authority of a department or agency of
the Federal Government to protect classified information and
sources and methods and the national security of the United
States.
(d) Relationship to Other Laws.--Nothing in this title
shall be construed to affect any requirement under any other
provision of law for an entity to provide information to the
Federal Government.
(e) Prohibited Conduct.--Nothing in this title shall be
construed to permit price-fixing, allocating a market between
competitors, monopolizing or attempting to monopolize a
market, boycotting, or exchanges of price or cost
information, customer lists, or information regarding future
competitive planning.
(f) Information Sharing Relationships.--Nothing in this
title shall be construed--
(1) to limit or modify an existing information sharing
relationship;
(2) to prohibit a new information sharing relationship;
(3) to require a new information sharing relationship
between any entity and another entity or a Federal entity; or
(4) to require the use of the capability and process within
the Department of Homeland Security developed under section
105(c).
(g) Preservation of Contractual Obligations and Rights.--
Nothing in this title shall be construed--
(1) to amend, repeal, or supersede any current or future
contractual agreement, terms of service agreement, or other
contractual relationship between any entities, or between any
entity and a Federal entity; or
(2) to abrogate trade secret or intellectual property
rights of any entity or Federal entity.
(h) Anti-tasking Restriction.--Nothing in this title shall
be construed to permit a Federal entity--
(1) to require an entity to provide information to a
Federal entity or another entity;
(2) to condition the sharing of cyber threat indicators
with an entity on such entity's provision of cyber threat
indicators to a Federal entity or another entity; or
(3) to condition the award of any Federal grant, contract,
or purchase on the provision of a cyber threat indicator to a
Federal entity or another entity.
(i) No Liability for Non-participation.--Nothing in this
title shall be construed to subject any entity to liability
for choosing not to engage in the voluntary activities
authorized in this title.
(j) Use and Retention of Information.--Nothing in this
title shall be construed to authorize, or to modify any
existing authority of, a department or agency of the Federal
Government to retain or use any information shared under this
title for any use other than permitted in this title.
(k) Federal Preemption.--
(1) In general.--This title supersedes any statute or other
provision of law of a State or political subdivision of a
State that restricts or otherwise expressly regulates an
activity authorized under this title.
(2) State law enforcement.--Nothing in this title shall be
construed to supersede any statute or other provision of law
of a State or political subdivision of a State concerning the
use of authorized law enforcement practices and procedures.
(l) Regulatory Authority.--Nothing in this title shall be
construed--
(1) to authorize the promulgation of any regulations not
specifically authorized by this title;
(2) to establish or limit any regulatory authority not
specifically established or limited under this title; or
(3) to authorize regulatory actions that would duplicate or
conflict with regulatory requirements, mandatory standards,
or related processes under another provision of Federal law.
(m) Authority of Secretary of Defense To Respond to Cyber
Attacks.--Nothing in this title shall be construed to limit
the authority of the Secretary of Defense to develop,
prepare, coordinate, or, when authorized by the President to
do so, conduct a military cyber operation in response to a
malicious cyber activity carried out against the United
States or a United States person by a foreign government or
an organization sponsored by a foreign government or a
terrorist organization.
SEC. 109. REPORT ON CYBERSECURITY THREATS.
(a) Report Required.--Not later than 180 days after the
date of the enactment of this Act, the Director of National
Intelligence, in coordination with the heads of other
appropriate elements of the intelligence community, shall
submit to the Select Committee on Intelligence of the Senate
and the Permanent Select Committee on Intelligence of the
House of Representatives a report on cybersecurity threats,
including cyber attacks, theft, and data breaches.
(b) Contents.--The report required by subsection (a) shall
include the following:
(1) An assessment of the current intelligence sharing and
cooperation relationships of the United States with other
countries regarding cybersecurity threats, including cyber
attacks, theft, and data breaches, directed against the
United States and which threaten the United States national
security interests and economy and intellectual property,
specifically identifying the relative utility of such
relationships, which elements of the intelligence community
participate in such relationships, and whether and how such
relationships could be improved.
(2) A list and an assessment of the countries and nonstate
actors that are the primary threats of carrying out a
cybersecurity threat, including a cyber attack, theft, or
data breach, against the United States and which threaten the
United States national security, economy, and intellectual
property.
(3) A description of the extent to which the capabilities
of the United States Government to respond to or prevent
cybersecurity threats, including cyber attacks, theft, or
data breaches, directed against the United States private
sector are degraded by a delay in the prompt notification by
private entities of such threats or cyber attacks, theft, and
breaches.
(4) An assessment of additional technologies or
capabilities that would enhance the ability of the United
States to prevent and to respond to cybersecurity threats,
including cyber attacks, theft, and data breaches.
(5) An assessment of any technologies or practices utilized
by the private sector that could be rapidly fielded to assist
the intelligence community in preventing and responding to
cybersecurity threats.
(c) Additional Report.--At the time the report required by
subsection (a) is submitted, the Director of National
Intelligence shall submit to the Committee on Foreign
Relations of the Senate and the Committee on Foreign Affairs
of the House of Representatives a report containing the
information required by subsection (b)(2).
(d) Form of Report.--The report required by subsection (a)
shall be made available in classified and unclassified forms.
(e) Intelligence Community Defined.--In this section, the
term ``intelligence community'' has the meaning given that
term in section 3 of the National Security Act of 1947 (50
U.S.C. 3003).
SEC. 110. CONFORMING AMENDMENT.
Section 941(c)(3) of the National Defense Authorization Act
for Fiscal Year 2013 (Public Law 112-239; 10 U.S.C. 2224
note) is amended by inserting at the end the following: ``The
Secretary may share such information with other Federal
entities if such information consists of cyber threat
indicators and defensive measures and such information is
shared consistent with the policies and procedures
promulgated by the Attorney General and the Secretary of
Homeland Security under section 105 of the Cybersecurity
Information Sharing Act of 2015.''.
TITLE II--FEDERAL CYBERSECURITY ENHANCEMENT
SEC. 201. SHORT TITLE.
This title may be cited as the ``Federal Cybersecurity
Enhancement Act of 2015''.
SEC. 202. DEFINITIONS.
In this title--
(1) the term ``agency'' has the meaning given the term in
section 3502 of title 44, United States Code;
(2) the term ``agency information system'' has the meaning
given the term in section 228 of the Homeland Security Act of
2002, as added by section 203(a);
(3) the term ``appropriate congressional committees''
means--
(A) the Committee on Homeland Security and Governmental
Affairs of the Senate; and
(B) the Committee on Homeland Security of the House of
Representatives;
(4) the terms ``cybersecurity risk'' and ``information
system'' have the meanings given those terms in section 227
of the Homeland Security Act of 2002, as so redesignated by
section 203(a);
(5) the term ``Director'' means the Director of the Office
of Management and Budget;
(6) the term ``intelligence community'' has the meaning
given the term in section 3(4) of the National Security Act
of 1947 (50 U.S.C. 3003(4));
[[Page S7528]]
(7) the term ``national security system'' has the meaning
given the term in section 11103 of title 40, United States
Code; and
(8) the term ``Secretary'' means the Secretary of Homeland
Security.
SEC. 203. IMPROVED FEDERAL NETWORK SECURITY.
(a) In General.--Subtitle C of title II of the Homeland
Security Act of 2002 (6 U.S.C. 141 et seq.) is amended--
(1) by redesignating section 228 as section 229;
(2) by redesignating section 227 as subsection (c) of
section 228, as added by paragraph (4), and adjusting the
margins accordingly;
(3) by redesignating the second section designated as
section 226 (relating to the national cybersecurity and
communications integration center) as section 227;
(4) by inserting after section 227, as so redesignated, the
following:
``SEC. 228. CYBERSECURITY PLANS.
``(a) Definitions.--In this section--
``(1) the term `agency information system' means an
information system used or operated by an agency or by
another entity on behalf of an agency;
``(2) the terms `cybersecurity risk' and `information
system' have the meanings given those terms in section 227;
``(3) the term `intelligence community' has the meaning
given the term in section 3(4) of the National Security Act
of 1947 (50 U.S.C. 3003(4)); and
``(4) the term `national security system' has the meaning
given the term in section 11103 of title 40, United States
Code.
``(b) Intrusion Assessment Plan.--
``(1) Requirement.--The Secretary, in coordination with the
Director of the Office of Management and Budget, shall
develop and implement an intrusion assessment plan to
identify and remove intruders in agency information systems.
``(2) Exception.--The intrusion assessment plan required
under paragraph (1) shall not apply to the Department of
Defense, a national security system, or an element of the
intelligence community.'';
(5) in section 228(c), as so redesignated, by striking
``section 226'' and inserting ``section 227''; and
(6) by inserting after section 229, as so redesignated, the
following:
``SEC. 230. FEDERAL INTRUSION DETECTION AND PREVENTION
SYSTEM.
``(a) Definitions.--In this section--
``(1) the term `agency' has the meaning given that term in
section 3502 of title 44, United States Code;
``(2) the term `agency information' means information
collected or maintained by or on behalf of an agency;
``(3) the term `agency information system' has the meaning
given the term in section 228; and
``(4) the terms `cybersecurity risk' and `information
system' have the meanings given those terms in section 227.
``(b) Requirement.--
``(1) In general.--Not later than 1 year after the date of
enactment of this section, the Secretary shall deploy,
operate, and maintain, to make available for use by any
agency, with or without reimbursement--
``(A) a capability to detect cybersecurity risks in network
traffic transiting or traveling to or from an agency
information system; and
``(B) a capability to prevent network traffic associated
with such cybersecurity risks from transiting or traveling to
or from an agency information system or modify such network
traffic to remove the cybersecurity risk.
``(2) Regular improvement.--The Secretary shall regularly
deploy new technologies and modify existing technologies to
the intrusion detection and prevention capabilities described
in paragraph (1) as appropriate to improve the intrusion
detection and prevention capabilities.
``(c) Activities.--In carrying out subsection (b), the
Secretary--
``(1) may access, and the head of an agency may disclose to
the Secretary or a private entity providing assistance to the
Secretary under paragraph (2), information transiting or
traveling to or from an agency information system, regardless
of the location from which the Secretary or a private entity
providing assistance to the Secretary under paragraph (2)
accesses such information, notwithstanding any other
provision of law that would otherwise restrict or prevent the
head of an agency from disclosing such information to the
Secretary or a private entity providing assistance to the
Secretary under paragraph (2);
``(2) may enter into contracts or other agreements with, or
otherwise request and obtain the assistance of, private
entities to deploy and operate technologies in accordance
with subsection (b);
``(3) may retain, use, and disclose information obtained
through the conduct of activities authorized under this
section only to protect information and information systems
from cybersecurity risks;
``(4) shall regularly assess through operational test and
evaluation in real world or simulated environments available
advanced protective technologies to improve detection and
prevention capabilities, including commercial and non-
commercial technologies and detection technologies beyond
signature-based detection, and utilize such technologies when
appropriate;
``(5) shall establish a pilot to acquire, test, and deploy,
as rapidly as possible, technologies described in paragraph
(4);
``(6) shall periodically update the privacy impact
assessment required under section 208(b) of the E-Government
Act of 2002 (44 U.S.C. 3501 note); and
``(7) shall ensure that--
``(A) activities carried out under this section are
reasonably necessary for the purpose of protecting agency
information and agency information systems from a
cybersecurity risk;
``(B) information accessed by the Secretary will be
retained no longer than reasonably necessary for the purpose
of protecting agency information and agency information
systems from a cybersecurity risk;
``(C) notice has been provided to users of an agency
information system concerning access to communications of
users of the agency information system for the purpose of
protecting agency information and the agency information
system; and
``(D) the activities are implemented pursuant to policies
and procedures governing the operation of the intrusion
detection and prevention capabilities.
``(d) Private Entities.--
``(1) Conditions.--A private entity described in subsection
(c)(2) may not--
``(A) disclose any network traffic transiting or traveling
to or from an agency information system to any entity without
the consent of the Department or the agency that disclosed
the information under subsection (c)(1); or
``(B) use any network traffic transiting or traveling to or
from an agency information system to which the private entity
gains access in accordance with this section for any purpose
other than to protect agency information and agency
information systems against cybersecurity risks or to
administer a contract or other agreement entered into
pursuant to subsection (c)(2) or as part of another contract
with the Secretary.
``(2) Limitation on liability.--No cause of action shall
lie in any court against a private entity for assistance
provided to the Secretary in accordance with this section and
any contract or agreement entered into pursuant to subsection
(c)(2).
``(3) Rule of construction.--Nothing in paragraph (2) shall
be construed to authorize an Internet service provider to
break a user agreement with a customer without the consent of
the customer.
``(e) Attorney General Review.--Not later than 1 year after
the date of enactment of this section, the Attorney General
shall review the policies and guidelines for the program
carried out under this section to ensure that the policies
and guidelines are consistent with applicable law governing
the acquisition, interception, retention, use, and disclosure
of communications.''.
(b) Prioritizing Advanced Security Tools.--The Director and
the Secretary, in consultation with appropriate agencies,
shall--
(1) review and update governmentwide policies and programs
to ensure appropriate prioritization and use of network
security monitoring tools within agency networks; and
(2) brief appropriate congressional committees on such
prioritization and use.
(c) Agency Responsibilities.--
(1) In general.--Except as provided in paragraph (2)--
(A) not later than 1 year after the date of enactment of
this Act or 2 months after the date on which the Secretary
makes available the intrusion detection and prevention
capabilities under section 230(b)(1) of the Homeland Security
Act of 2002, as added by subsection (a), whichever is later,
the head of each agency shall apply and continue to utilize
the capabilities to all information traveling between an
agency information system and any information system other
than an agency information system; and
(B) not later than 6 months after the date on which the
Secretary makes available improvements to the intrusion
detection and prevention capabilities pursuant to section
230(b)(2) of the Homeland Security Act of 2002, as added by
subsection (a), the head of each agency shall apply and
continue to utilize the improved intrusion detection and
prevention capabilities.
(2) Exception.--The requirements under paragraph (1) shall
not apply to the Department of Defense, a national security
system, or an element of the intelligence community.
(3) Definition.--In this subsection only, the term ``agency
information system'' means an information system owned or
operated by an agency.
(4) Rule of construction.--Nothing in this subsection shall
be construed to limit an agency from applying the intrusion
detection and prevention capabilities under section 230(b)(1)
of the Homeland Security Act of 2002, as added by subsection
(a), at the discretion of the head of the agency or as
provided in relevant policies, directives, and guidelines.
(d) Table of Contents Amendment.--The table of contents in
section 1(b) of the Homeland Security Act of 2002 (6 U.S.C.
101 note) is amended by striking the items relating to the
first section designated as section 226, the second section
designated as section 226 (relating to the national
cybersecurity and communications integration center), section
227, and section 228 and inserting the following:
``Sec. 226. Cybersecurity recruitment and retention.
``Sec. 227. National cybersecurity and communications integration
center.
[[Page S7529]]
``Sec. 228. Cybersecurity plans.
``Sec. 229. Clearances.
``Sec. 230. Federal intrusion detection and prevention system.''.
SEC. 204. ADVANCED INTERNAL DEFENSES.
(a) Advanced Network Security Tools.--
(1) In general.--The Secretary shall include in the
Continuous Diagnostics and Mitigation Program advanced
network security tools to improve visibility of network
activity, including through the use of commercial and free or
open source tools, to detect and mitigate intrusions and
anomalous activity.
(2) Development of plan.--The Director shall develop and
implement a plan to ensure that each agency utilizes advanced
network security tools, including those described in
paragraph (1), to detect and mitigate intrusions and
anomalous activity.
(b) Improved Metrics.--The Secretary, in collaboration with
the Director, shall review and update the metrics used to
measure security under section 3554 of title 44, United
States Code, to include measures of intrusion and incident
detection and response times.
(c) Transparency and Accountability.--The Director, in
consultation with the Secretary, shall increase transparency
to the public on agency cybersecurity posture, including by
increasing the number of metrics available on Federal
Government performance websites and, to the greatest extent
practicable, displaying metrics for department components,
small agencies, and micro agencies.
(d) Maintenance of Technologies.--Section 3553(b)(6)(B) of
title 44, United States Code, is amended by inserting ``,
operating, and maintaining'' after ``deploying''.
(e) Exception.--The requirements under this section shall
not apply to the Department of Defense, a national security
system, or an element of the intelligence community.
SEC. 205. FEDERAL CYBERSECURITY REQUIREMENTS.
(a) Implementation of Federal Cybersecurity Standards.--
Consistent with section 3553 of title 44, United States Code,
the Secretary, in consultation with the Director, shall
exercise the authority to issue binding operational
directives to assist the Director in ensuring timely agency
adoption of and compliance with policies and standards
promulgated under section 11331 of title 40, United States
Code, for securing agency information systems.
(b) Cybersecurity Requirements at Agencies.--
(1) In general.--Consistent with policies, standards,
guidelines, and directives on information security under
subchapter II of chapter 35 of title 44, United States Code,
and the standards and guidelines promulgated under section
11331 of title 40, United States Code, and except as provided
in paragraph (2), not later than 1 year after the date of the
enactment of this Act, the head of each agency shall--
(A) identify sensitive and mission critical data stored by
the agency consistent with the inventory required under the
first subsection (c) (relating to the inventory of major
information systems) and the second subsection (c) (relating
to the inventory of information systems) of section 3505 of
title 44, United States Code;
(B) assess access controls to the data described in
subparagraph (A), the need for readily accessible storage of
the data, and individuals' need to access the data;
(C) encrypt or otherwise render indecipherable to
unauthorized users the data described in subparagraph (A)
that is stored on or transiting agency information systems;
(D) implement a single sign-on trusted identity platform
for individuals accessing each public website of the agency
that requires user authentication, as developed by the
Administrator of General Services in collaboration with the
Secretary; and
(E) implement identity management consistent with section
504 of the Cybersecurity Enhancement Act of 2014 (Public Law
113-274; 15 U.S.C. 7464), including multi-factor
authentication, for--
(i) remote access to an agency information system; and
(ii) each user account with elevated privileges on an
agency information system.
(2) Exception.--The requirements under paragraph (1) shall
not apply to an agency information system for which--
(A) the head of the agency has personally certified to the
Director with particularity that--
(i) operational requirements articulated in the
certification and related to the agency information system
would make it excessively burdensome to implement the
cybersecurity requirement;
(ii) the cybersecurity requirement is not necessary to
secure the agency information system or agency information
stored on or transiting it; and
(iii) the agency has taken all necessary steps to secure
the agency information system and agency information stored
on or transiting it; and
(B) the head of the agency or the designee of the head of
the agency has submitted the certification described in
subparagraph (A) to the appropriate congressional committees
and the agency's authorizing committees.
(3) Construction.--Nothing in this section shall be
construed to alter the authority of the Secretary, the
Director, or the Director of the National Institute of
Standards and Technology in implementing subchapter II of
chapter 35 of title 44, United States Code. Nothing in this
section shall be construed to affect the National Institute
of Standards and Technology standards process or the
requirement under section 3553(a)(4) of such title or to
discourage continued improvements and advancements in the
technology, standards, policies, and guidelines used to
promote Federal information security.
(c) Exception.--The requirements under this section shall
not apply to the Department of Defense, a national security
system, or an element of the intelligence community.
SEC. 206. ASSESSMENT; REPORTS.
(a) Definitions.--In this section--
(1) the term ``intrusion assessments'' means actions taken
under the intrusion assessment plan to identify and remove
intruders in agency information systems;
(2) the term ``intrusion assessment plan'' means the plan
required under section 228(b)(1) of the Homeland Security Act
of 2002, as added by section 203(a) of this Act; and
(3) the term ``intrusion detection and prevention
capabilities'' means the capabilities required under section
230(b) of the Homeland Security Act of 2002, as added by
section 203(a) of this Act.
(b) Third Party Assessment.--Not later than 3 years after
the date of enactment of this Act, the Government
Accountability Office shall conduct a study and publish a
report on the effectiveness of the approach and strategy of
the Federal Government to securing agency information
systems, including the intrusion detection and prevention
capabilities and the intrusion assessment plan.
(c) Reports to Congress.--
(1) Intrusion detection and prevention capabilities.--
(A) Secretary of homeland security report.--Not later than
6 months after the date of enactment of this Act, and
annually thereafter, the Secretary shall submit to the
appropriate congressional committees a report on the status
of implementation of the intrusion detection and prevention
capabilities, including--
(i) a description of privacy controls;
(ii) a description of the technologies and capabilities
utilized to detect cybersecurity risks in network traffic,
including the extent to which those technologies and
capabilities include existing commercial and non-commercial
technologies;
(iii) a description of the technologies and capabilities
utilized to prevent network traffic associated with
cybersecurity risks from transiting or traveling to or from
agency information systems, including the extent to which
those technologies and capabilities include existing
commercial and non-commercial technologies;
(iv) a list of the types of indicators or other identifiers
or techniques used to detect cybersecurity risks in network
traffic transiting or traveling to or from agency information
systems on each iteration of the intrusion detection and
prevention capabilities and the number of each such type of
indicator, identifier, and technique;
(v) the number of instances in which the intrusion
detection and prevention capabilities detected a
cybersecurity risk in network traffic transiting or traveling
to or from agency information systems and the number of times
the intrusion detection and prevention capabilities blocked
network traffic associated with cybersecurity risk; and
(vi) a description of the pilot established under section
230(c)(5) of the Homeland Security Act of 2002, as added by
section 203(a) of this Act, including the number of new
technologies tested and the number of participating agencies.
(B) OMB report.--Not later than 18 months after the date of
enactment of this Act, and annually thereafter, the Director
shall submit to Congress, as part of the report required
under section 3553(c) of title 44, United States Code, an
analysis of agency application of the intrusion detection and
prevention capabilities, including--
(i) a list of each agency and the degree to which each
agency has applied the intrusion detection and prevention
capabilities to an agency information system; and
(ii) a list by agency of--
(I) the number of instances in which the intrusion
detection and prevention capabilities detected a
cybersecurity risk in network traffic transiting or traveling
to or from an agency information system and the types of
indicators, identifiers, and techniques used to detect such
cybersecurity risks; and
(II) the number of instances in which the intrusion
detection and prevention capabilities prevented network
traffic associated with a cybersecurity risk from transiting
or traveling to or from an agency information system and the
types of indicators, identifiers, and techniques used to
detect such agency information systems.
(2) OMB report on development and implementation of
intrusion assessment plan, advanced internal defenses, and
federal cybersecurity best practices.--The Director shall--
(A) not later than 6 months after the date of enactment of
this Act, and 30 days after any update thereto, submit the
intrusion assessment plan to the appropriate congressional
committees;
(B) not later than 1 year after the date of enactment of
this Act, and annually thereafter, submit to Congress, as
part of the report required under section 3553(c) of title
44, United States Code--
[[Page S7530]]
(i) a description of the implementation of the intrusion
assessment plan;
(ii) the findings of the intrusion assessments conducted
pursuant to the intrusion assessment plan;
(iii) advanced network security tools included in the
Continuous Diagnostics and Mitigation Program pursuant to
section 204(a)(1);
(iv) the results of the assessment of the Secretary of best
practices for Federal cybersecurity pursuant to section
205(a); and
(v) a list by agency of compliance with the requirements of
section 205(b); and
(C) not later than 1 year after the date of enactment of
this Act, submit to the appropriate congressional
committees--
(i) a copy of the plan developed pursuant to section
204(a)(2); and
(ii) the improved metrics developed pursuant to section
204(b).
SEC. 207. TERMINATION.
(a) In General.--The authority provided under section 230
of the Homeland Security Act of 2002, as added by section
203(a) of this Act, and the reporting requirements under
section 206(c) shall terminate on the date that is 7 years
after the date of enactment of this Act.
(b) Rule of Construction.--Nothing in subsection (a) shall
be construed to affect the limitation of liability of a
private entity for assistance provided to the Secretary under
section 230(d)(2) of the Homeland Security Act of 2002, as
added by section 203(a) of this Act, if such assistance was
rendered before the termination date under subsection (a) or
otherwise during a period in which the assistance was
authorized.
SEC. 208. IDENTIFICATION OF INFORMATION SYSTEMS RELATING TO
NATIONAL SECURITY.
(a) In General.--Except as provided in subsection (c), not
later than 180 days after the date of enactment of this Act--
(1) the Director of National Intelligence and the Director
of the Office of Management and Budget, in coordination with
the heads of other agencies, shall--
(A) identify all unclassified information systems that
provide access to information that may provide an adversary
with the ability to derive information that would otherwise
be considered classified;
(B) assess the risks that would result from the breach of
each unclassified information system identified in
subparagraph (A); and
(C) assess the cost and impact on the mission carried out
by each agency that owns an unclassified information system
identified in subparagraph (A) if the system were to be
subsequently designated as a national security system; and
(2) the Director of National Intelligence and the Director
of the Office of Management and Budget shall submit to the
appropriate congressional committees, the Select Committee on
Intelligence of the Senate, and the Permanent Select
Committee on Intelligence of the House of Representatives a
report that includes the findings under paragraph (1).
(b) Form.--The report submitted under subsection (a)(2)
shall be in unclassified form, and shall include a classified
annex.
(c) Exception.--The requirements under subsection (a)(1)
shall not apply to the Department of Defense, a national
security system, or an element of the intelligence community.
(d) Rule of Construction.--Nothing in this section shall be
construed to designate an information system as a national
security system.
SEC. 209. DIRECTION TO AGENCIES.
(a) In General.--Section 3553 of title 44, United States
Code, is amended by adding at the end the following:
``(h) Direction to Agencies.--
``(1) Authority.--
``(A) In general.--Subject to subparagraph (B), in response
to a known or reasonably suspected information security
threat, vulnerability, or incident that represents a
substantial threat to the information security of an agency,
the Secretary may issue an emergency directive to the head of
an agency to take any lawful action with respect to the
operation of the information system, including such systems
used or operated by another entity on behalf of an agency,
that collects, processes, stores, transmits, disseminates, or
otherwise maintains agency information, for the purpose of
protecting the information system from, or mitigating, an
information security threat.
``(B) Exception.--The authorities of the Secretary under
this subsection shall not apply to a system described
subsection (d) or to a system described in paragraph (2) or
(3) of subsection (e).
``(2) Procedures for use of authority.--The Secretary
shall--
``(A) in coordination with the Director, establish
procedures governing the circumstances under which a
directive may be issued under this subsection, which shall
include--
``(i) thresholds and other criteria;
``(ii) privacy and civil liberties protections; and
``(iii) providing notice to potentially affected third
parties;
``(B) specify the reasons for the required action and the
duration of the directive;
``(C) minimize the impact of a directive under this
subsection by--
``(i) adopting the least intrusive means possible under the
circumstances to secure the agency information systems; and
``(ii) limiting directives to the shortest period
practicable;
``(D) notify the Director and the head of any affected
agency immediately upon the issuance of a directive under
this subsection;
``(E) consult with the Director of the National Institute
of Standards and Technology regarding any directive under
this subsection that implements standards and guidelines
developed by the National Institute of Standards and
Technology;
``(F) ensure that directives issued under this subsection
do not conflict with the standards and guidelines issued
under section 11331 of title 40;
``(G) consider any applicable standards or guidelines
developed by the National Institute of Standards and issued
by the Secretary of Commerce under section 11331 of title 40;
and
``(H) not later than February 1 of each year, submit to the
appropriate congressional committees a report regarding the
specific actions the Secretary has taken pursuant to
paragraph (1)(A).
``(3) Imminent threats.--
``(A) In general.--Notwithstanding section 3554, the
Secretary may authorize the intrusion detection and
prevention capabilities under section 230(b)(1) of the
Homeland Security Act of 2002 for the purpose of ensuring the
security of agency information systems, if--
``(i) the Secretary determines there is an imminent threat
to agency information systems;
``(ii) the Secretary determines a directive under
subsection (b)(2)(C) or paragraph (1)(A) is not reasonably
likely to result in a timely response to the threat;
``(iii) the Secretary determines the risk posed by the
imminent threat outweighs any adverse consequences reasonably
expected to result from the use of protective capabilities
under the control of the Secretary;
``(iv) the Secretary provides prior notice to the Director,
and the head and chief information officer (or equivalent
official) of each agency to which specific actions will be
taken pursuant to subparagraph (A), and notifies the
appropriate congressional committees and authorizing
committees of each such agencies within seven days of taking
an action under this subsection of--
``(I) any action taken under this subsection; and
``(II) the reasons for and duration and nature of the
action;
``(v) the action of the Secretary is consistent with
applicable law; and
``(vi) the Secretary authorizes the use of protective
capabilities in accordance with the advance procedures
established under subparagraph (C).
``(B) Limitation on delegation.--The authority under this
subsection may not be delegated by the Secretary.
``(C) Advance procedures.--The Secretary shall, in
coordination with the Director, and in consultation with the
heads of Federal agencies, establish procedures governing the
circumstances under which the Secretary may authorize the use
of protective capabilities subparagraph (A). The Secretary
shall submit the procedures to Congress.
``(4) Limitation.--The Secretary may direct or authorize
lawful action or protective capability under this subsection
only to--
``(A) protect agency information from unauthorized access,
use, disclosure, disruption, modification, or destruction; or
``(B) require the remediation of or protect against
identified information security risks with respect to--
``(i) information collected or maintained by or on behalf
of an agency; or
``(ii) that portion of an information system used or
operated by an agency or by a contractor of an agency or
other organization on behalf of an agency.
``(i) Annual Report to Congress.--Not later than February 1
of each year, the Director shall submit to the appropriate
congressional committees a report regarding the specific
actions the Director has taken pursuant to subsection (a)(5),
including any actions taken pursuant to section 11303(b)(5)
of title 40.
``(j) Appropriate Congressional Committees Defined.--In
this section, the term `appropriate congressional committees'
means--
``(1) the Committee on Appropriations and the Committee on
Homeland Security and Governmental Affairs of the Senate; and
``(2) the Committee on Appropriations, the Committee on
Homeland Security, the Committee on Oversight and Government
Reform, and the Committee on Science, Space, and Technology
of the House of Representatives.''.
(b) Conforming Amendment.--Section 3554(a)(1)(B) of title
44, United States Code, is amended--
(1) in clause (iii), by striking ``and'' at the end; and
(2) by adding at the end the following:
``(v) emergency directives issued by the Secretary under
section 3553(h); and''.
TITLE III--FEDERAL CYBERSECURITY WORKFORCE ASSESSMENT
SEC. 301. SHORT TITLE.
This title may be cited as the ``Federal Cybersecurity
Workforce Assessment Act of 2015''.
SEC. 302. DEFINITIONS.
In this title:
(1) Appropriate congressional committees.--The term
``appropriate congressional committees'' means--
(A) the Committee on Armed Services of the Senate;
[[Page S7531]]
(B) the Committee on Homeland Security and Governmental
Affairs of the Senate;
(C) the Select Committee on Intelligence of the Senate;
(D) the Committee on Commerce, Science, and Transportation
of the Senate;
(E) the Committee on Armed Services in the House of
Representatives;
(F) the Committee on Homeland Security of the House of
Representatives;
(G) the Committee on Oversight and Government Reform of the
House of Representatives; and
(H) the Permanent Select Committee on Intelligence of the
House of Representatives.
(2) Director.--The term ``Director'' means the Director of
the Office of Personnel Management.
(3) Roles.--The term ``roles'' has the meaning given the
term in the National Initiative for Cybersecurity Education's
Cybersecurity Workforce Framework.
SEC. 303. NATIONAL CYBERSECURITY WORKFORCE MEASUREMENT
INITIATIVE.
(a) In General.--The head of each Federal agency shall--
(1) identify all positions within the agency that require
the performance of cybersecurity or other cyber-related
functions; and
(2) assign the corresponding employment code, which shall
be added to the National Initiative for Cybersecurity
Education's National Cybersecurity Workforce Framework, in
accordance with subsection (b).
(b) Employment Codes.--
(1) Procedures.--
(A) Coding structure.--Not later than 180 days after the
date of the enactment of this Act, the Secretary of Commerce,
acting through the National Institute of Standards and
Technology, shall update the National Initiative for
Cybersecurity Education's Cybersecurity Workforce Framework
to include a corresponding coding structure.
(B) Identification of civilian cyber personnel.--Not later
than 9 months after the date of enactment of this Act, the
Director, in coordination with the Director of the National
Institute of Standards and Technology and the Director of
National Intelligence, shall establish procedures to
implement the National Initiative for Cybersecurity
Education's coding structure to identify all Federal civilian
positions that require the performance of information
technology, cybersecurity, or other cyber-related functions.
(C) Identification of noncivilian cyber personnel.--Not
later than 18 months after the date of enactment of this Act,
the Secretary of Defense shall establish procedures to
implement the National Initiative for Cybersecurity
Education's coding structure to identify all Federal
noncivilian positions that require the performance of
information technology, cybersecurity, or other cyber-related
functions.
(D) Baseline assessment of existing cybersecurity
workforce.--Not later than 3 months after the date on which
the procedures are developed under subparagraphs (B) and (C),
respectively, the head of each Federal agency shall submit to
the appropriate congressional committees of jurisdiction a
report that identifies--
(i) the percentage of personnel with information
technology, cybersecurity, or other cyber-related job
functions who currently hold the appropriate industry-
recognized certifications as identified in the National
Initiative for Cybersecurity Education's Cybersecurity
Workforce Framework;
(ii) the level of preparedness of other civilian and
noncivilian cyber personnel without existing credentials to
take certification exams; and
(iii) a strategy for mitigating any gaps identified in
clause (i) or (ii) with the appropriate training and
certification for existing personnel.
(E) Procedures for assigning codes.--Not later than 3
months after the date on which the procedures are developed
under subparagraphs (B) and (C), respectively, the head of
each Federal agency shall establish procedures--
(i) to identify all encumbered and vacant positions with
information technology, cybersecurity, or other cyber-related
functions (as defined in the National Initiative for
Cybersecurity Education's coding structure); and
(ii) to assign the appropriate employment code to each such
position, using agreed standards and definitions.
(2) Code assignments.--Not later than 1 year after the date
after the procedures are established under paragraph (1)(E),
the head of each Federal agency shall complete assignment of
the appropriate employment code to each position within the
agency with information technology, cybersecurity, or other
cyber-related functions.
(c) Progress Report.--Not later than 180 days after the
date of enactment of this Act, the Director shall submit a
progress report on the implementation of this section to the
appropriate congressional committees.
SEC. 304. IDENTIFICATION OF CYBER-RELATED ROLES OF CRITICAL
NEED.
(a) In General.--Beginning not later than 1 year after the
date on which the employment codes are assigned to employees
pursuant to section 203(b)(2), and annually through 2022, the
head of each Federal agency, in consultation with the
Director, the Director of the National Institute of Standards
and Technology, and the Secretary of Homeland Security,
shall--
(1) identify information technology, cybersecurity, or
other cyber-related roles of critical need in the agency's
workforce; and
(2) submit a report to the Director that--
(A) describes the information technology, cybersecurity, or
other cyber-related roles identified under paragraph (1); and
(B) substantiates the critical need designations.
(b) Guidance.--The Director shall provide Federal agencies
with timely guidance for identifying information technology,
cybersecurity, or other cyber-related roles of critical need,
including--
(1) current information technology, cybersecurity, and
other cyber-related roles with acute skill shortages; and
(2) information technology, cybersecurity, or other cyber-
related roles with emerging skill shortages.
(c) Cybersecurity Needs Report.--Not later than 2 years
after the date of the enactment of this Act, the Director, in
consultation with the Secretary of Homeland Security, shall--
(1) identify critical needs for information technology,
cybersecurity, or other cyber-related workforce across all
Federal agencies; and
(2) submit a progress report on the implementation of this
section to the appropriate congressional committees.
SEC. 305. GOVERNMENT ACCOUNTABILITY OFFICE STATUS REPORTS.
The Comptroller General of the United States shall--
(1) analyze and monitor the implementation of sections 303
and 304; and
(2) not later than 3 years after the date of the enactment
of this Act, submit a report to the appropriate congressional
committees that describes the status of such implementation.
TITLE IV--OTHER CYBER MATTERS
SEC. 401. STUDY ON MOBILE DEVICE SECURITY.
(a) In General.--Not later than 1 year after the date of
the enactment of this Act, the Secretary of Homeland
Security, in consultation with the Director of the National
Institute of Standards and Technology, shall--
(1) complete a study on threats relating to the security of
the mobile devices of the Federal Government; and
(2) submit an unclassified report to Congress, with a
classified annex if necessary, that contains the findings of
such study, the recommendations developed under paragraph (3)
of subsection (b), the deficiencies, if any, identified under
(4) of such subsection, and the plan developed under
paragraph (5) of such subsection.
(b) Matters Studied.--In carrying out the study under
subsection (a)(1), the Secretary, in consultation with the
Director of the National Institute of Standards and
Technology, shall--
(1) assess the evolution of mobile security techniques from
a desktop-centric approach, and whether such techniques are
adequate to meet current mobile security challenges;
(2) assess the effect such threats may have on the
cybersecurity of the information systems and networks of the
Federal Government (except for national security systems or
the information systems and networks of the Department of
Defense and the intelligence community);
(3) develop recommendations for addressing such threats
based on industry standards and best practices;
(4) identify any deficiencies in the current authorities of
the Secretary that may inhibit the ability of the Secretary
to address mobile device security throughout the Federal
Government (except for national security systems and the
information systems and networks of the Department of Defense
and intelligence community); and
(5) develop a plan for accelerated adoption of secure
mobile device technology by the Department of Homeland
Security.
(c) Intelligence Community Defined.--In this section, the
term ``intelligence community'' has the meaning given such
term in section 3 of the National Security Act of 1947 (50
U.S.C. 3003).
SEC. 402. DEPARTMENT OF STATE INTERNATIONAL CYBERSPACE POLICY
STRATEGY.
(a) In General.--Not later than 90 days after the date of
the enactment of this Act, the Secretary of State shall
produce a comprehensive strategy relating to United States
international policy with regard to cyberspace.
(b) Elements.--The strategy required by subsection (a)
shall include the following:
(1) A review of actions and activities undertaken by the
Secretary of State to date to support the goal of the
President's International Strategy for Cyberspace, released
in May 2011, to ``work internationally to promote an open,
interoperable, secure, and reliable information and
communications infrastructure that supports international
trade and commerce, strengthens international security, and
fosters free expression and innovation.''.
(2) A plan of action to guide the diplomacy of the
Secretary of State, with regard to foreign countries,
including conducting bilateral and multilateral activities to
develop the norms of responsible international behavior in
cyberspace, and status review of existing discussions in
multilateral fora to obtain agreements on international norms
in cyberspace.
(3) A review of the alternative concepts with regard to
international norms in cyberspace offered by foreign
countries that are prominent actors, including China, Russia,
Brazil, and India.
[[Page S7532]]
(4) A detailed description of threats to United States
national security in cyberspace from foreign countries,
state-sponsored actors, and private actors to Federal and
private sector infrastructure of the United States,
intellectual property in the United States, and the privacy
of citizens of the United States.
(5) A review of policy tools available to the President to
deter foreign countries, state-sponsored actors, and private
actors, including those outlined in Executive Order 13694,
released on April 1, 2015.
(6) A review of resources required by the Secretary,
including the Office of the Coordinator for Cyber Issues, to
conduct activities to build responsible norms of
international cyber behavior.
(c) Consultation.--In preparing the strategy required by
subsection (a), the Secretary of State shall consult, as
appropriate, with other agencies and departments of the
United States and the private sector and nongovernmental
organizations in the United States with recognized
credentials and expertise in foreign policy, national
security, and cybersecurity.
(d) Form of Strategy.--The strategy required by subsection
(a) shall be in unclassified form, but may include a
classified annex.
(e) Availability of Information.--The Secretary of State
shall--
(1) make the strategy required in subsection (a) available
the public; and
(2) brief the Committee on Foreign Relations of the Senate
and the Committee on Foreign Affairs of the House of
Representatives on the strategy, including any material
contained in a classified annex.
SEC. 403. APPREHENSION AND PROSECUTION OF INTERNATIONAL CYBER
CRIMINALS.
(a) International Cyber Criminal Defined.--In this section,
the term ``international cyber criminal'' means an
individual--
(1) who is believed to have committed a cybercrime or
intellectual property crime against the interests of the
United States or the citizens of the United States; and
(2) for whom--
(A) an arrest warrant has been issued by a judge in the
United States; or
(B) an international wanted notice (commonly referred to as
a ``Red Notice'') has been circulated by Interpol.
(b) Consultations for Noncooperation.--The Secretary of
State, or designee, shall consult with the appropriate
government official of each country from which extradition is
not likely due to the lack of an extradition treaty with the
United States or other reasons, in which one or more
international cyber criminals are physically present, to
determine what actions the government of such country has
taken--
(1) to apprehend and prosecute such criminals; and
(2) to prevent such criminals from carrying out cybercrimes
or intellectual property crimes against the interests of the
United States or its citizens.
(c) Annual Report.--
(1) In general.--The Secretary of State shall submit to the
appropriate congressional committees an annual report that
includes--
(A) the number of international cyber criminals located in
other countries, disaggregated by country, and indicating
from which countries extradition is not likely due to the
lack of an extradition treaty with the United States or other
reasons;
(B) the nature and number of significant discussions by an
official of the Department of State on ways to thwart or
prosecute international cyber criminals with an official of
another country, including the name of each such country; and
(C) for each international cyber criminal who was
extradited to the United States during the most recently
completed calendar year--
(i) his or her name;
(ii) the crimes for which he or she was charged;
(iii) his or her previous country of residence; and
(iv) the country from which he or she was extradited into
the United States.
(2) Form.--The report required by this subsection shall be
in unclassified form to the maximum extent possible, but may
include a classified annex.
(3) Appropriate congressional committees.--For purposes of
this subsection, the term ``appropriate congressional
committees'' means--
(A) the Committee on Foreign Relations, the Committee on
Appropriations, the Committee on Homeland Security and
Governmental Affairs, the Committee on Banking, Housing, and
Urban Affairs, the Select Committee on Intelligence, and the
Committee on the Judiciary of the Senate; and
(B) the Committee on Foreign Affairs, the Committee on
Appropriations, the Committee on Homeland Security, the
Committee on Financial Services, the Permanent Select
Committee on Intelligence, and the Committee on the Judiciary
of the House of Representatives.
SEC. 404. ENHANCEMENT OF EMERGENCY SERVICES.
(a) Collection of Data.--Not later than 90 days after the
date of enactment of this Act, the Secretary of Homeland
Security, acting through the National Cybersecurity and
Communications Integration Center, in coordination with
appropriate Federal entities and the Director for Emergency
Communications, shall establish a process by which a
Statewide Interoperability Coordinator may report data on any
cybersecurity risk or incident involving any information
system or network used by emergency response providers (as
defined in section 2 of the Homeland Security Act of 2002 (6
U.S.C. 101)) within the State.
(b) Analysis of Data.--Not later than 1 year after the date
of enactment of this Act, the Secretary of Homeland Security,
acting through the Director of the National Cybersecurity and
Communications Integration Center, in coordination with
appropriate entities and the Director for Emergency
Communications, and in consultation with the Director of the
National Institute of Standards and Technology, shall conduct
integration and analysis of the data reported under
subsection (a) to develop information and recommendations on
security and resilience measures for any information system
or network used by State emergency response providers.
(c) Best Practices.--
(1) In general.--Using the results of the integration and
analysis conducted under subsection (b), and any other
relevant information, the Director of the National Institute
of Standards and Technology shall, on an ongoing basis,
facilitate and support the development of methods for
reducing cybersecurity risks to emergency response providers
using the process described in section 2(e) of the National
Institute of Standards and Technology Act (15 U.S.C. 272(e)).
(2) Report.--The Director of the National Institute of
Standards and Technology shall submit a report to Congress on
the methods developed under paragraph (1) and shall make such
report publically available on the website of the National
Institute of Standards and Technology.
(d) Rule of Construction.--Nothing in this section shall be
construed to--
(1) require a State to report data under subsection (a); or
(2) require an entity to--
(A) adopt a recommended measure developed under subsection
(b); or
(B) follow the best practices developed under subsection
(c).
SEC. 405. IMPROVING CYBERSECURITY IN THE HEALTH CARE
INDUSTRY.
(a) Definitions.--In this section:
(1) Business associate.--The term ``business associate''
has the meaning given such term in section 160.103 of title
45, Code of Federal Regulations.
(2) Covered entity.--The term ``covered entity'' has the
meaning given such term in section 160.103 of title 45, Code
of Federal Regulations.
(3) Health care clearinghouse; health care provider; health
plan.--The terms ``health care clearinghouse'', ``health care
provider'', and ``health plan'' have the meanings given the
terms in section 160.103 of title 45, Code of Federal
Regulations.
(4) Health care industry stakeholder.--The term ``health
care industry stakeholder'' means any--
(A) health plan, health care clearinghouse, or health care
provider;
(B) patient advocate;
(C) pharmacist;
(D) developer of health information technology;
(E) laboratory;
(F) pharmaceutical or medical device manufacturer; or
(G) additional stakeholder the Secretary determines
necessary for purposes of subsection (d)(1), (d)(3), or (e).
(5) Secretary.--The term ``Secretary'' means the Secretary
of Health and Human Services.
(b) Report.--Not later than 1 year after the date of
enactment of this Act, the Secretary shall submit, to the
Committee on Health, Education, Labor, and Pensions of the
Senate and the Committee on Energy and Commerce of the House
of Representatives, a report on the preparedness of the
health care industry in responding to cybersecurity threats.
(c) Contents of Report.--With respect to the internal
response of the Department of Health and Human Services to
emerging cybersecurity threats, the report shall include--
(1) a clear statement of the official within the Department
of Health and Human Services to be responsible for leading
and coordinating efforts of the Department regarding
cybersecurity threats in the health care industry; and
(2) a plan from each relevant operating division and
subdivision of the Department of Health and Human Services on
how such division or subdivision will address cybersecurity
threats in the health care industry, including a clear
delineation of how each such division or subdivision will
divide responsibility among the personnel of such division or
subdivision and communicate with other such divisions and
subdivisions regarding efforts to address such threats.
(d) Health Care Industry Cybersecurity Task Force.--
(1) In general.--Not later than 60 days after the date of
enactment of this Act, the Secretary, in consultation with
the Director of the National Institute of Standards and
Technology and the Secretary of Homeland Security, shall
convene health care industry stakeholders, cybersecurity
experts, and any Federal agencies or entities the Secretary
determines appropriate to establish a task force to--
(A) analyze how industries, other than the health care
industry, have implemented strategies and safeguards for
addressing cybersecurity threats within their respective
industries;
[[Page S7533]]
(B) analyze challenges and barriers private entities
(notwithstanding section 102(15)(B), excluding any State,
tribal, or local government) in the health care industry face
securing themselves against cyber attacks;
(C) review challenges that covered entities and business
associates face in securing networked medical devices and
other software or systems that connect to an electronic
health record;
(D) provide the Secretary with information to disseminate
to health care industry stakeholders for purposes of
improving their preparedness for, and response to,
cybersecurity threats affecting the health care industry;
(E) establish a plan for creating a single system for the
Federal Government to share information on actionable
intelligence regarding cybersecurity threats to the health
care industry in near real time, requiring no fee to the
recipients of such information, including which Federal
agency or other entity may be best suited to be the central
conduit to facilitate the sharing of such information; and
(F) report to Congress on the findings and recommendations
of the task force regarding carrying out subparagraphs (A)
through (E).
(2) Termination.--The task force established under this
subsection shall terminate on the date that is 1 year after
the date of enactment of this Act.
(3) Dissemination.--Not later than 60 days after the
termination of the task force established under this
subsection, the Secretary shall disseminate the information
described in paragraph (1)(D) to health care industry
stakeholders in accordance with such paragraph.
(4) Rule of construction.--Nothing in this subsection shall
be construed to limit the antitrust exemption under section
104(e) or the protection from liability under section 106.
(e) Cybersecurity Framework.--
(1) In general.--The Secretary shall establish, through a
collaborative process with the Secretary of Homeland
Security, health care industry stakeholders, the National
Institute of Standards and Technology, and any Federal agency
or entity the Secretary determines appropriate, a single,
voluntary, national health-specific cybersecurity framework
that--
(A) establishes a common set of voluntary, consensus-based,
and industry-led standards, security practices, guidelines,
methodologies, procedures, and processes that serve as a
resource for cost-effectively reducing cybersecurity risks
for a range of health care organizations;
(B) supports voluntary adoption and implementation efforts
to improve safeguards to address cybersecurity threats;
(C) is consistent with the security and privacy regulations
promulgated under section 264(c) of the Health Insurance
Portability and Accountability Act of 1996 (42 U.S.C. 1320d-2
note) and with the Health Information Technology for Economic
and Clinical Health Act (title XIII of division A, and title
IV of division B, of Public Law 111-5), and the amendments
made by such Act; and
(D) is updated on a regular basis and applicable to the
range of health care organizations described in subparagraph
(A).
(2) Limitation.--Nothing in this subsection shall be
interpreted as granting the Secretary authority to--
(A) provide for audits to ensure that health care
organizations are in compliance with the voluntary framework
under this subsection; or
(B) mandate, direct, or condition the award of any Federal
grant, contract, or purchase on compliance with such
voluntary framework.
(3) No liability for nonparticipation.--Nothing in this
title shall be construed to subject a health care
organization to liability for choosing not to engage in the
voluntary activities authorized under this subsection.
SEC. 406. FEDERAL COMPUTER SECURITY.
(a) Definitions.--In this section:
(1) Covered system.--The term ``covered system'' shall mean
a national security system as defined in section 11103 of
title 40, United States Code, or a Federal computer system
that provides access to personally identifiable information.
(2) Covered agency.--The term ``covered agency'' means an
agency that operates a covered system.
(3) Logical access control.--The term ``logical access
control'' means a process of granting or denying specific
requests to obtain and use information and related
information processing services.
(4) Multi-factor logical access controls.--The term
``multi-factor logical access controls'' means a set of not
less than 2 of the following logical access controls:
(A) Information that is known to the user, such as a
password or personal identification number.
(B) An access device that is provided to the user, such as
a cryptographic identification device or token.
(C) A unique biometric characteristic of the user.
(5) Privileged user.--The term ``privileged user'' means a
user who, by virtue of function or seniority, has been
allocated powers within a covered system, which are
significantly greater than those available to the majority of
users.
(b) Inspector General Reports on Covered Systems.--
(1) In general.--Not later than 240 days after the date of
enactment of this Act, the Inspector General of each covered
agency shall submit to the appropriate committees of
jurisdiction in the Senate and the House of Representatives a
report, which shall include information collected from the
covered agency for the contents described in paragraph (2)
regarding the Federal computer systems of the covered agency.
(2) Contents.--The report submitted by each Inspector
General of a covered agency under paragraph (1) shall
include, with respect to the covered agency, the following:
(A) A description of the logical access standards used by
the covered agency to access a covered system, including--
(i) in aggregate, a list and description of logical access
controls used to access such a covered system; and
(ii) whether the covered agency is using multi-factor
logical access controls to access such a covered system.
(B) A description of the logical access controls used by
the covered agency to govern access to covered systems by
privileged users.
(C) If the covered agency does not use logical access
controls or multi-factor logical access controls to access a
covered system, a description of the reasons for not using
such logical access controls or multi-factor logical access
controls.
(D) A description of the following data security management
practices used by the covered agency:
(i) The policies and procedures followed to conduct
inventories of the software present on the covered systems of
the covered agency and the licenses associated with such
software.
(ii) What capabilities the covered agency utilizes to
monitor and detect exfiltration and other threats,
including--
(I) data loss prevention capabilities; or
(II) digital rights management capabilities.
(iii) A description of how the covered agency is using the
capabilities described in clause (ii).
(iv) If the covered agency is not utilizing capabilities
described in clause (ii), a description of the reasons for
not utilizing such capabilities.
(E) A description of the policies and procedures of the
covered agency with respect to ensuring that entities,
including contractors, that provide services to the covered
agency are implementing the data security management
practices described in subparagraph (D).
(3) Existing review.--The reports required under this
subsection may be based in whole or in part on an audit,
evaluation, or report relating to programs or practices of
the covered agency, and may be submitted as part of another
report, including the report required under section 3555 of
title 44, United States Code.
(4) Classified information.--Reports submitted under this
subsection shall be in unclassified form, but may include a
classified annex.
SEC. 407. STRATEGY TO PROTECT CRITICAL INFRASTRUCTURE AT
GREATEST RISK.
(a) Definitions.--In this section:
(1) Appropriate agency.--The term ``appropriate agency''
means, with respect to a covered entity--
(A) except as provided in subparagraph (B), the applicable
sector-specific agency; or
(B) in the case of a covered entity that is regulated by a
Federal entity, such Federal entity.
(2) Appropriate agency head.--The term ``appropriate agency
head'' means, with respect to a covered entity, the head of
the appropriate agency.
(3) Covered entity.--The term ``covered entity'' means an
entity identified pursuant to section 9(a) of Executive Order
13636 of February 12, 2013 (78 Fed. Reg. 11742), relating to
identification of critical infrastructure where a
cybersecurity incident could reasonably result in
catastrophic regional or national effects on public health or
safety, economic security, or national security.
(4) Appropriate congressional committees.--The term
``appropriate congressional committees'' means--
(A) the Select Committee on Intelligence of the Senate;
(B) the Permanent Select Committee on Intelligence of the
House of Representatives;
(C) the Committee on Homeland Security and Governmental
Affairs of the Senate;
(D) the Committee on Homeland Security of the House of
Representatives;
(E) the Committee on Energy and Natural Resources of the
Senate;
(F) the Committee on Energy and Commerce of the House of
Representatives; and
(G) the Committee on Commerce, Science, and Transportation
of the Senate.
(5) Secretary.--The term ``Secretary'' means the Secretary
of the Department of Homeland Security.
(b) Status of Existing Cyber Incident Reporting.--
(1) In general.--No later than 120 days after the date of
the enactment of this Act, the Secretary, in conjunction with
the appropriate agency head (as the case may be), shall
submit to the appropriate congressional committees describing
the extent to which each covered entity reports significant
intrusions of information systems essential to the operation
of critical infrastructure to the Department of Homeland
Security or the appropriate agency head in a timely manner.
(2) Form.--The report submitted under paragraph (1) may
include a classified annex.
[[Page S7534]]
(c) Mitigation Strategy Required for Critical
Infrastructure at Greatest Risk.--
(1) In general.--No later than 180 days after the date of
the enactment of this Act, the Secretary, in conjunction with
the appropriate agency head (as the case may be), shall
conduct an assessment and develop a strategy that addresses
each of the covered entities, to ensure that, to the greatest
extent feasible, a cyber security incident affecting such
entity would no longer reasonably result in catastrophic
regional or national effects on public health or safety,
economic security, or national security.
(2) Elements.--The strategy submitted by the Secretary with
respect to a covered entity shall include the following:
(A) An assessment of whether each entity should be required
to report cyber security incidents.
(B) A description of any identified security gaps that must
be addressed.
(C) Additional statutory authority necessary to reduce the
likelihood that a cyber incident could cause catastrophic
regional or national effects on public health or safety,
economic security, or national security.
(3) Submittal.--The Secretary shall submit to the
appropriate congressional committees the assessment and
strategy required by paragraph (1).
(4) Form.--The assessment and strategy submitted under
paragraph (3) may each include a classified annex.
SEC. 408. STOPPING THE FRAUDULENT SALE OF FINANCIAL
INFORMATION OF PEOPLE OF THE UNITED STATES.
Section 1029(h) of title 18, United States Code, is amended
by striking ``title if--'' and all that follows through
``therefrom.'' and inserting ``title if the offense involves
an access device issued, owned, managed, or controlled by a
financial institution, account issuer, credit card system
member, or other entity organized under the laws of the
United States, or any State, the District of Columbia, or
other Territory of the United States.''.
SEC. 409. EFFECTIVE PERIOD.
(a) In General.--Except as provided in subsection (b), this
Act and the amendments made by this Act shall be in effect
during the 10-year period beginning on the date of the
enactment of this Act.
(b) Exception.--With respect to any action authorized by
this Act or information obtained pursuant to an action
authorized by this Act, which occurred before the date on
which the provisions referred to in subsection (a) cease to
have effect, the provisions of this Act shall continue in
effect.
The PRESIDING OFFICER. The majority leader.
____________________