Skip to main content

tv   U.S. House of Representatives  CSPAN  February 3, 2010 1:00pm-5:00pm EST

1:00 pm
these are modest but important changes that will help us do a better job of protecting our communications network and i'm pleased to join my fellow texan, mr. mccaul, as a co-sponsor, along with two of our key subcommittee ranking members, dr. ehlers of michigan and representative smith of nebraska. i also note by appreciation for what this bill doesn't do. it avoids calling for any activities that could amount to being regulatory in nature. i think this is important. the committee heard from multiple outside witnesses that heavy federal involvement in private sector cybersecurity processes would actually be counterproductive to security. i hope we can ensure this bill continues to restrain from such action as it moves through the legislative process. . this is a good bill and it represents a small but important step in the government's overall efforts to address cybersecurity issues. i want to thank our colleagues in the m closely with the republicans on
1:01 pm
this legislation and i look forward to continued cooperative efforts as we move forward. i reserve the balance of my time. the speaker pro tempore: the gentleman reserves. the gentleman from tennessee is recognized. mr. gordon: thank you, madam chairman. i yield to the gentleman from illinois, the sponsor, a primary sponsor, of this good bipartisan bill, dr. lipinski. he's just got back from home and a 78% victory in his primary last night. so congratulations and i yield to you for five minutes. the speaker pro tempore: the gentleman from illinois is recognized. for five minutes. mr. lipinski: madam speaker, i want to begin by chaing chairman gordon for all his work on this bill and on the cybersecurity issue in general. this is, as the chairman said, a good bipartisan bill, also i want to thank ranking member,
1:02 pm
mr. hall, for his work and dr. ehlers as we worked on the research and science, education subcommittee on this bill. almost a year ago president obama called for a comprehensive 60-day review of u.s. cyberspace policy. this call and the excellent recommendations contained in the resulting report led to a series of hearings in my research and science, education subcommittee, as well as the full science and technology committee. we heard in these hearings about the various aspects of cybersecurity r&d, including the state of research programs, partnerships with the private sector, the i. timplet work force and how they're responding to the review. h.r. 4051 is built upon what we learned in these hearings and some of the critical issues raised in a 60-day review. specifically it aims to build strong public-private partnerships, improve the
1:03 pm
transfer of cybersecurity technologies in the marketplace, train an i.t. work force for both the public and private sectors and coordinate and prioritize federal cybersecurity r&d. information technology is an integral part of all of our daily lives. computers, cell phones, internet have greatly increased our productivity and connectivity. unfortunately disconnectivity and independence of our critical infrastructure and information technology have increased our vulnerability to cyberattacks. one month ago we saw a coordinated foreign attack on google's website. last week we also saw an attack, an infiltration, on our house website. last year the pentagon reported more than 360 million attempts to break into its network. but it's not just the pentagon or house of representatives that
1:04 pm
needs to worry about cybersecurity. cybercrime is a problem for businesses large and small and for every single american. the f.t.c. estimates that identity theft costs consumers $50 billion annually and even more alarmingly, it's the fastest growing type of fraud in the united states. in these -- and these aren't just individual criminals. increasing globalization in the internet means a sophisticated organized crime groups can mine information, selling it both nationally and internationally. improving the security of cyberspace is of the utmost importance and will take the collective effort of the federal government, the private sector, our scientists and engineers in every -- and every american to succeed in this bill makes an important step forward in doing this. last fall as chairman gordon said under the leadership of congresswoman clarke we passed a resolution recognizing national
1:05 pm
cybersecurity awareness month. among other things, this resolution contributed to important education awareness campaign, a national effort to make people aware of the problem and to make them think about what i like to call practicing good computer hygiene. however, federal leadership is not only needed to increase public awareness, but also in research, education and demonstrating how to secure our systems. chairman gordon gave a very good summary of what is in this bill. i want to focus on one particular aspect a little bit. on education. and by that i mean educating individuals, educating companies and educating the next generation of i.t. professionals. h.r. 4061 addresses this by building our existing partnerships such as the sponsored center for system security and information
1:06 pm
assurance asthma recent valley community college in illinois in my district. this school in my district has trained more than 600 cybersecurity faculty since 2003. individuals are now teaching at community colleges in technical training programs nationwide. in order to realize the full benefits of information technology, we not only need a highly skilled i.t. work force but also advances in basic r&d. cyberthreats are constantly evolving and cybersecurity r&d must evolve in concert by long-term probablies that build a more secure foundation. and because people are perhaps the weakest link in many i.t. systems, our recent strategies need to include the social and behavioral sciences that can help us better understand how humans interact with technology. this is something that is often overlooked but it's contained in this bill. so in closing i just again want
1:07 pm
to thank chairman gordon for his work on this, very proud to be the author of this bill, and i want to urge its passage by the full house. i yield back. the speaker pro tempore: the gentleman's time has expired. the gentleman from texas is recognized. mr. hall: thank you, madam chair, and i yield myself as much time as i may consume. the speaker pro tempore: the gentleman is recognized. >> i rise in support of this bill. i want to thank ranking member hall and i want to thank my good friends across the other side of the aisle, mr. -- chairman gordon, mr. lipinski, for, as usual, working in a bipartisan way to get good things done for the security -- country. i think the american people deserve that and they want to see more of that -- of us up here in washington. i was trying to be the lead republican sponsor on this bill as well because this issue is so important. a lot of times when you talk about cybersecurity, people's eyes kind of glaze over and yet when we're talking about
1:08 pm
cybersecurity, we're really talking about national security. we held hearings both in the science and technology committee and on homeland security committee where we examined the vulnerabilities and the threats presented by a cyber-- by cyberattacks. and it's very frightening. when you talk to top military advisors to the president, they'll tell you one of the greatest threats we face as a nation is a cyberattack and that we are vulnerable. and when we had hearings on the issue, we heard that just about every federal agency, in fact, every one, including the pentagon, had been hacked into. and this institution had been hacked into and there had been major data dumps where information was stolen and from countries that we cannot speak of on the well of the floor right now, but foreign countries stealing information from the united states government.
1:09 pm
there are really several areas, there's criminal enterprises who use cyberattacks to steal intellectual property and then there's he ispy nadge where we have countries that go in and steal information from the united states government, intellectual property, secret it's within the government -- secrets within the government, data dumps the size of the library of congress. we had a classified program that was subsequently declassified that showed that through the click of a mouse power grids could be blown up. every critical infrastructure is tied to cybernetworks, whether it be our utilities, our power grids, our financial institutions, whether it be air traffic controllers, virtually every sector is tied to the networks to the internet and therefore is vulnerable. this bill, i think, is a good
1:10 pm
step forward in helping to protect our networks. certainly in the federal government. last year i joined with congressman jim langevin from rhode island, working with csis, who had worked on the iraq study group as well, to put together a team, a commission of experts across the nation of cyberexperts to make recommendations to the next president of the united states. we made those recommendations to president obama. i'm pleased that this bill actually fulfills one of the main recommendations in that report and that is to provide an improving federal cyberwork forces within the federal government. and this bill does a lot more than that, i think improving research and development, this bill establishes cybersecurity r&d grant programs that focus on
1:11 pm
technical and human behavioral aspects of cybersecurity. it improves our federal cyberwork force, creates a scholarship program at n.s.f. that can be repaid by federal service. and it improves coordination in the government. it gives us the authority to set security standards for federal computer systems and develop check lists for agencies to follow and i think this is a very, very important point because in our hearings when we ask the department of homeland security or representatives from the department of defense or the n.s.a. who's in charge of defending our networks, who is in charge? they couldn't answer that question. because there isn't one person in charge. one of our recommendations was to have someone at the white house level be put in charge to coordinate the various agencies. and because there is no one in charge, there's the lack of coordination. so the very entities that have
1:12 pm
the offensive capability for a cyberattack are not coordinating with the agencies that are tasked with defending the nation from a cyberattack. i think that giving us the authority to set these standards for the first time is going to go a long way in protecting our networks inside the federal government. it also reaches out to the private sector which i particularly like about this bill. it emphasizes the implementation of check lists by federal agencies that they should remain flexible and technology-neutral in working with the private sether. it improves coordination outside the government by creating a task force as the federal government and universities who know this issue very well and the private sector to coordinate the research and development. i think the idea of a public-private partnership rather than having bureaucrats in washington make all these decisions is vitally important to bring in the expertise of the
1:13 pm
private sector and the technology sector who know this issue very well. and as chairman gordon mentioned, this has been -- this has broad-based support from business groups outside in the private sector and from the technology sector particularly. so, with that i think this is a great first step towards protecting our federal networks. i'm again wanting to commend the great leadership on both sides of the aisle for making this happen today and with that i reserve the balance of my time. the speaker pro tempore: the gentleman reserves the balance of his time. the gentleman from tennessee is recognized. mr. gordon: thank you, madam chairman. first i want to thank my friend from texas for his both co-sponsorship of this bill but more importantly his constructive, productive bipartisan approach to bringing together this good bill. now i want to yield five minutes to the primary sponsor of the
1:14 pm
bill and chairman of our technology and innovation subcommittee, mr. wu. the speaker pro tempore: the gentleman is recognized. mr. wu: thank you, madam chair. i rise today in strong support of h.r. 4061, which will improve our nation's cybersecurity by supporting research, create usable technical standards and promote cybersecurity education. cybersecurity is critically important and i want to commend our chairman, chairman gordon, for bringing this legislation to the floor today and for his long-term leadership on this issue. the recent cyberattack perpetrated by china against google and numerous other american companies is a stark reminder of the vulnerabilities we face in an electronically interconnected world. more and more of our personal information is making its way online. everything from traffic control systems and air traffic control to manufacturing and banking depends on internet network systems. within the science committee,
1:15 pm
the technology and innovation subcommittee, i which i chair, has been exploring ways the national institute of standard and technologies expertise in information technology can be used to advance the administration's goal of securing cyberspace. 22 years ago the science and technology committee paved the way for federal cybersecurity efforts with the cybersecurity act of 1987, the first of 13 major laws related to cybersecurity. the 1987 bill charged nist with developing technical standards to protect nonclassified information in federal compute ever system -- computer systems. h.r. 4061 improves on these ongoing efforts by implementing recommendations made in the cyberspace policy review and in a hearing my subcommittee held last october. the cyberspace policy review and the hearing stressed
1:16 pm
importance of creation as the federal government works on international technical standards and education awareness campaign for all internet users and improved identity management systems. nist has a leadership role to play in all three of these critical areas. the u.s. government must better coordinate its efforts to develop international subse technical standards. these -- cybersecurity technical standards. this will assure u.s. representatives will operate with the overarching needs with our nation in mind when they negotiate. witnesses testified before the technology and innovations subcommittee that nist is suited for the role of policy coordinator because of extensive technical expertise, established relationships with international bodies and the fact that it is a nonregulatory body. experts also called for a
1:17 pm
cybersecurity awareness campaign. while nist can be a valuable resource for internet users by providing consumers the same guidance it gives the agencies, nist guidance is often too technical for the average internet user. the legislation before us today tasks nist with developing a plan to make its standards and best practices useable for those with less technical expertise. 70% to 90% of needed cybersecurity, take simple steps. don't back up data and have it in an opened, unlock car. it's like washing hands before a surgeon operates on a patient. commonsense steps, available methods and technology.
1:18 pm
simply put, good computer hygiene. we also know that sibes cannot be -- cybersecurity cannot be improved without first identifying management. this bill improves upon standards such as biometrics by tasking nist of the interoperability of these systems to encourage more widespread use. by focusing on the useability and the privacy aspects of identity management it will have greater confidence in the general public that the personal information will be secure. madam chair, securing cyberspace is a primary concern of each and every one of us. we cannot stand by and let the most powerful fool for connecting americans with each other and the world remain a techno logic wild -- technologic wild west. we need to make it available to the technological people of the
1:19 pm
future. i ask my colleagues to vote in favor of h.r. 4061. thank you. i yield back the balance of my time. the chair: the gentleman yields back the balance of his time. the gentleman from texas is recognized. >> thank you, madam chairman. i yield as much time as he may consume to the gentleman from georgia, mr. kingston. the chair: the gentleman from georgia is recognized. mr. kingston: i thank the gentleman for yielding. madam speaker, when i first came to congress in 1993 we had computers but we did not have internet. in fact if it wasn't for al gore maybe we still wouldn't have it, but we all -- i don't need to bring that up. you know, the reality of it, most of us, and my friend, mr. gordon will remember, had cell phones. there was a discussion that i had with one member, you know, i don't think it's fair for the taxpayers to pay for your cell phone. i think it's unnecessary. and i remember when i got a cell phone i wanted to have a
1:20 pm
912 area code because i didn't want folks back home that i went washington if i had the 202 area code. but now in essence everybody has a mobile phone as they do internet. i remember stacy hall, our receptionist, who is the i.t. person since she was the youngest in the office. she was probably 22, u.a.g. graduate, she got this thing called the internet and started planning weekends with her friends. there were about five other 21, 22-year-old kids on the hill who knew what email was. they started swapping. she told our scheduler, you know, maybe you could use this like to schedule the congressman. what a radical idea. and before you know it five or six years down the road everybody was addicted to it. and then i remember 9/11 not many of us had a blackber ear. it had an ability -- us had a
1:21 pm
blackberry. it had an ability to get out over the internet. i know mr. gordon and many of us here have seen all this grow but know this phenomenal piece of equipment can find maps anywhere in the world. you can talk to somebody on the phone. you can take pictures and instantly send it to somebody. you can download music although i have no idea how, and internet people can look up things, google online and binge, and can you imagine what this will be five years from now? it is -- online and bing, and can you imagine what this will be five years from now? we actually voted my freshman year not to allow calculators because the t -- the texas instrument, i think it was called an sr-10 -- can i get an amen over there? it was $179. we voted in my chemistry class at michigan state university not to allow calculators
1:22 pm
because most middle-class kids could not afford it and yet four, five years later you can get much better calculators that fit in your pocket for $10. technology has been at a rapid pace. it may be that some interested math genius with a twisted sense of humor in indonesia would hack into the department of defense computers just to see if he could. not really caring how many f-22's were in production but just he wanted to know. but then eventually the bad guys became more sophisticated, talked to each other. the way of hacking into the department of defense. the doe doe -- the department of energy, the centers for disease control, all kinds of government agencies with all kinds of sensitive information. but there's no need to stop
1:23 pm
there. wall street, financial information, other things you could get at a university, all of it is vulnerable. and so this bill today is relevant because it shows that congress is moving along with the technology to rise to the challenge. we need to have cybersecurity experts. so many of the cybersecurity experts that we have now come up through a law enforcement background and then they learn the computer training. what this bill does is seek -- reach out to that young, 17, 18, 19-year-old and identify them as being interested in this and merge all their talents and say, come on in the classroom because we need you as a line of defense. technology against technology has to have that wall in between them and wall that is a brilliant well-trained human being. that's what this bill seeks to do. in my own district, i have to brag a little bit, that
1:24 pm
armstrong atlantic university has a cybersecurity research institute. it's working to bridge the gap so that young people can have a viable career in cybersecurity. programmers who produce a more educated cybersecurity investigators with expertise in areas not only in technology but in law enforcement and law itself and policy itself and work with cyberforensics in order to produce the kind of professionals that we need to overcome the threat that we face as a nation. we cannot be passive about this topic. we have to be proactive. this bill shows one of the great bipartisan efforts of congress for us to come together and address something that is truly a national security threat. and so i'm proud to support it, and i yield back the balance of my time. and if you want any more information you can get it on my blackberry. i'll be glad to download it.
1:25 pm
the chair: the gentleman from tennessee is recognized. goornedgoorned thank you, madam speaker. i want -- mr. gordon: thank you, madam speaker. i want to thank my friend from savannah for the history lesson there and say that my 8-year-old daughter can help you with any of the downloading of music. mr. kingston: especially some of that good tennessee music. the chair: the gentleman from tennessee is recognized. mr. gordon: madam chairman, i yield 2 1/2 minutes to the gentleman from maryland, mr. rupers berger, a -- mr. ruppersburger, a member of the intelligence committee. the chair: the gentleman from maryland is recognized for 2 1/2 minutes. mr. ruppersburger: madam speaker, i want to thank chairman gordon, congressman wu, ranking member hall and congressman mccaul for your bipartisan effort. this is truly an example of working together on behalf of our citizens. we can only do this on other
1:26 pm
issues, health care and whatever, we'd be a lot better. thank you for this evident and let's continue this bipartisan effort. cybersecurity powers almost everything we do, from our computers, cell phones, ipods, to the electrical grid that allows us to turn on our lights. it has the classified and intelligence networks that keep us safe and provide critical data to our troops in combat. as a member of the intelligence committee and chairman of the technical and tactical subcommittee which oversees the technical aspects of cybersecurity, i know that protecting our cybernetworks is a top, top economic and national security priority. we are under attack each and every day. these attacks cost the u.s.a. $1 trillion last year and also put classified information in the hands of our enemies. cybersecurity is a tough challenge because the government does not own the internet. in fact, 85% of cyber is held privately. we have to get the public and private sectors on the same
1:27 pm
page, and this bill does that. this bill directs the national institute of standards and technology the measurement laboratory for our nation based in maryland to develop international cybersecurity technical standards. it also charges nist creating education campaigns for the public, a critical component to meeting this challenge. this bill also helps to ensure that we have the work force in place to meet the new demands by providing scholarships to students who agree to work as cybersecurity specialists after graduation. the bill also funds faculty and curriculum development as u.s. colleges and universities to help with the shortage of qualified cyberprofessors. the bill also helps to ensure that we have the work force in place to meet the new demands by providing scholarships to students who agree to work as cybersecurity specialists after graduation. the bill funds faculty and curriculum development at u.s.
1:28 pm
colleges to help with the shortage of qualified cyberprofessors. i support the amendment proposed by my maryland colleague, congressman frank kratovil, to establish a national center of excellence to consolidate our researchers into one cyberclearing-house. protecting our nation's network is not a democratic or republican initiative. it is u.s.a. first. let's pass h.r. -- the chair: the gentleman from tennessee is recognized. mr. gordon: i yield 20 seconds. the chair: the gentleman from maryland. mr. ruppersburger: let's pass h.r. 4061 and make sure our own cybernetworks don't become a new weapon in our enemies' arsenals. i yield back the balance of my time. the speaker pro tempore: the gentleman from texas is recognized. mr. mccaul: i reserve the balance of my time. the chair: the gentleman from tennessee is recognized. mr. gordon: madam chairman, i yield two minutes to the gentleman from rhode island, mr. langevin, who is the
1:29 pm
co-chair of the house cybersecurity caucus. the chair: the gentleman from rhode island will be recognized for two minutes. mr. langevin: -- mr. gordon: and he will be arriving shortly. madam chair, as i say, the gentleman from rhode island is the co-chair of the house cybersecurity caucus, and i yield to him two minutes. the chair: the gentleman from rhode island is recognized for two minutes. mr. langevin: i ask unanimous consent to revise and extend. the chair: without objection. mr. langevin: i thank the gentleman for yielding. madam speaker, i rise today in strong support of the cybersecurity enhancement act of 2009. i'd like to thank chairman
1:30 pm
lipinski and chairman gordon for bringing this important bill to the floor today. in today's interconnected world, the american people expect their government's networks to have the same level of access and efficiency as the private sector. further, building a more transparent and effective government requires leveraging new technologies to strengthen coordination between our federal agencies in addition to strengthening our communications with the citizens of our nation. to achieve these goals, it is absolutely critical that our federal networks and the systems are safe and secure. but despite the increased tension in recent years by the congress and administration on cybersecurity, our federal networks remain exceptionally vulnerable still to attack. now, securing them will require increased emphasis on coordination and technological advancement. i, of course, understand that the n.s.a. and the very talented and dedicated work force that work on cyber issues are the best in the world of what they do.
1:31 pm
but it will also require the united states to strengthen domestic cybersecurity talent and find new ways to leverage the expertise that exists in the private sector. this will be a true force multiplier for us. this bill takes significant steps toward achieving those goals by strengthening federal cybersecurity standards, evaluating how to improve our federal cybersecurity work force. so that being said, we as a nation cannot afford to fail in these efforts and i urge my colleagues to join me in supporting this very important piece of legislation. thank you and i yield back the balance of my time. the speaker pro tempore: the gentleman from texas is recognized. mr. mccaul: i reserve the balance of my time. the speaker pro tempore: the gentleman reserves his time. the gentleman from tennessee is recognized. mr. gordon: i inform my friends from texas that we have no further speakers. the speaker pro tempore: the gentleman from texas is recognized. mr. mccaul: thank you, madam chair. just in closing and i co-chaired the cybersecurity caucus with
1:32 pm
congressman langevin and i want to commend him for his great work on the csis commission and the caucus to try to raise awareness of this issue. it is a very, very important issue and i also want to thank chairman gordon who i know is going to retire and we're going to miss him, but just the bipartisan spirit in which he's conducted himself in this committee to allow us to work together with the majority, to get good legislation out of the congress. and as i said earlier, i think that's what the american people want, it's what they deserve and certainly there's no greater issue where republicans and democrats should come together than on issues impacting national security, which this bill does. we are americans first. and again this builds a -- goes
1:33 pm
a great step forward in securing and protecting our federal networks. i hope, as what happened with 9/11, we don't turn a blind eye and wait until there's a major denial attack before we start paying attention to this issue. i think this bill, which i anticipate will pass the house overwhelmingly, is a great statement by the congress that cybersecurity is important and that we can work together on this. i think as congressman wu talked about the attacks on google recently, last fourth of july we had a denial of service attack emanating that hit korea and the united states. the disturbing thing about that attack was it was not to fish or toto steal information or espionage, rather it was intended to do harm. that attack was intended to shut down our networks.
1:34 pm
it was relatively unsophisticated but as we exammed the attacks that we saw in estonia, the denial service attack in korea and the united states this last fourth of july, to me that is an eye opener, just like before 9/11, we saw signs prior to 9/11 that people needed to pay attention to. i think we have seen signs of that in the cyberrealm and i hope we can work together across the aisle to further enhance and strengthen our cybernetworks and in the private sector as well so that we can avoid a cyber-9/11 attack in the united states. so this is, again, a very important issue that when you talk to leaders in the military, they get it, they recognize it, they want to work with the congress to better improve our cybersecurity and, again, let me just give my thanks to chairman gordon for allowing this to come
1:35 pm
out of the committee and come to the house floor and urge my colleagues on both sides of the aisle to support this legislation and with that i yield back. thank you. the speaker pro tempore: the gentleman yields back the balance of his time. the gentleman from tennessee is recognized. mr. gordon: thank you, madam chairman. in closing, let me just suggest to my friend from texas that bipartisanship goes both ways and i want to thank him for his great input in this bill as well as dr. ehlers'. mr. hall, mr. wu and dr. lipinski, it was a good team effort and certainly our staffs were integral to having this be a successful bill and i agree with you, hopefully this will pass overwhelmingly and it will send a message to the bad guys that we're all alert and with that, madam speaker, i yield back the balance of my time. the speaker pro tempore: the gentleman yields back the balance of his time. all the time for general debate has expired. pursuant to the rule, the amendment in the nature of a substitute printed in the bill shall be considered as an original bill for the purpose of amendment under the five-minute rule and shall be considered as
1:36 pm
read. no amendment to the committee amendment is in order except those precipitationed in house report 111-410. each amendment may be offered only in the order printed in the report, by a member designated in the report, shall be considered read, shall be debated for the time specified in the report equally divided and controlled by the proponent and an opponent, shall not be subject to amendment and shall not be subject to a demand for division of the question. it is now in order to consider amendment number 1 printed in house report 111-410. for what purpose does the gentleman from florida rise? mr. hastings: madam chair, i have an amendment at the desk. the chair: the clerk will designated amendment. the clerk: amendment number 1 printed in house report 111-410 offered by mr. hastings of florida. the chair: pursuant to house resolution 1051, the gentleman from florida, mr. hastings, and a member in opposition will each
1:37 pm
control five minutes. the chair recognizes the gentleman from florida. mr. hastings: thank you very much, madam chairman. first let me thank bart gordon and this committee for their extraordinary work that they've done and even though all of us are going to get an opportunity to say to the chairperson our thanks for his efforts here in congress, i'd like to just personally thank him not only for the cybersecurity enhancement act of 2009 but for substantial and substantive legislation throughout the coarse of his career -- course of his career. i'm pleased to offer this amendment to address cybersecurity work force concerns and advance the development of technical standards. if we're going to do that we need to consider all of the different innovative opportunities out there. now, i was disappointed, though,
1:38 pm
to discover the significant gender and racial disparities in the cybersecurity industry. we know cyberspace touches practically everything and everyone and yet i find it mind boggling that we have -- we haven't made more of an effort to include everyone in protecting it. women now constitute 50.7% of the u.s. population as of 2008 and the u.s. census bureau found that only 14% of women pursue professional careers in science or technology. other under-represented groups mentioned in this amendment include african-americans, hispanics and native americans. all of these groups have historically been under-represented in scientific and epping nearing occupations. the u.s. census bureau recorded african-americans, hispanics and
1:39 pm
native americans as 28.2% of the u.s. population in 2008 and yet these groups only represent a mere 10% of the sipse and technology industry -- science and technology industry. in order to protect cyberspace, we need a strong vision and leadership, both will require changes in policy, technology, education and perhaps law. this bill will be recolluding the best and brightest and we must ensure these opportunities are available to all americans. this amendment will address existing and potential racial and gender disparities in the industry. the first part of the amendment deals with the section on the cybersecurity work force assessment. in this section, we'll require the president to transmit to congress a report analyzing the cybersecurity work force needs of the federal government.
1:40 pm
if we're going to take a look, a good look, at the sources and availability, excuse me, of cybersecurity talent in our own country, then we must also take an even more vigilant look at how we are including the talent of minorities. according to a 1995 report by the national research council, quote, limited access is the first hurdle faced by women seeking industrial jobs in science and engineering and while progress has been made in recent years, common recruitment in hiring practices that make extensive use of traditional networks often overlook the available pool of women. madam chair, it is truly embarrassing that 15 years later we find ourselves having made such little progress on this issue. the second part of the amendment adds a requirement to include
1:41 pm
representatives from minority-serving institutions on the cybersecurity university industry task force. in order to conduct a national dialogue on cybersecurity and develop more public awareness of the threat and risks, we need an integrated approach, one that includes a diverse industry that can tackle our vulnerabilities while also meeting our economic needs and national security requirements. madam chairman, the united states needs a comprehensive framework to ensure a coordinated response and recovery by the government. the private sector and our allies to a significant incident or threat. this amendment ensures that the process is accessible to our nation's diverse talent. in addition to thanking the committee and especially chairman gordon, i'd like to thank our colleague, congressman
1:42 pm
rodriguez of texas, for co-sponsoring this amendment and i urge my colleagues to support this effort. the chair: the gentleman from texas. mr. mccaul: madam speaker, i want to claim time in opposition although i do not intend to oppose this amendment. mr. hastings and my colleague from texas, mr. rodriguez, are making improvements to this bill to ensure that the strategic plan takes into consideration the talents of women and minority populations in the cybersecurity work force and that the university industry task force include representatives from minority-serving institutions. i therefore urge support for this amendment and i reserve the balance of my time. the chair: the gentleman reserves the balance of his time. the gentleman from florida. mr. hastings: madam speaker, i yield 30 seconds to the distinguished chairperson of the committee. the chair: the gentleman from tennessee is recognized. mr. gordon: first of all, let me thank my friend from florida for his very kind words but more importantly i want to thank him
1:43 pm
for introducing this important legislation. we can have the best technology in the world but we don't have the work force to go with it, then the bad guys win and this will go a long way to improving and expanding our work force and i thank the gentleman for this amendment. mr. hastings: thank you. madam chair, i yield back the balance of my time. the chair: the question is on the amendment offered -- the gentleman from texas. mr. mccaul: i yield back the balance of my time. the chair: yields back his time. thank you. the question on the amendment is offered by the gentleman from florida. those in favor say aye. those opposed, no. in the opinion of the chair, the ace have it. mr. hastings: madam speaker. the chair: for what purpose does the gentleman from florida rise? mr. hastings: madam speaker, i ask for the yeas and nays. the chair: does the gentleman ask for a recorded vote. mr. hastings: i ask for a recorded vote. the chair: pursuant to clause 6 of rule 18, further proceedings on the amendment offered by the gentleman from florida will be postponed.
1:44 pm
nows is the in order to consider amendment number 2 printed in house report 111-410. for what purpose does the gentleman from tennessee rise? mr. gordon: madam speaker, as the designee of the gentleman from colorado i rise to offer his amendment. the chair: the clerk will designate the amendment. the clerk: amendment number 2 printed in house report 111-410 offered by mr. gordon of tennessee. the chair: pursuant to house resolution 1051 the gentleman from tennessee, mr. gordon, and a member in opposition will each control five minutes. the chair recognizes the gentleman from tennessee. mr. gordon: madam chair, one of the best ways for cybersecurity professionals to improve their skills is through meaningful and diverse experiences. this amendment would allow scholarship recipients to seek out internship opportunities in the private sector and then begin those experiences, bring those experiences to their service in the federal
1:45 pm
government. i want to thank my friend, mr. polis, for this good amendment and i urge my colleagues to support it and i yield back the balance of my time. the chair: the gentleman yields back. the gentleman from tennessee is -- texas is recognized for what purpose? mr. mccaul: i thank you, madam chair. i rise to claim time in opposition although i do not intend to oppose this amendment. the chair: without objection, the gentleman is recognized. mr. mccaul: thank you, madam chair. as part of the scholarship for service program at n.s.f., scholarship awardees are to receive internships at federal agencies. this amendment simply gives the director the discretion of allowing them to intern in the private sether. so therefore i support this amendment and i yield back the balance of my time. the chair: the question is on the amendment offered by the gentleman from tennessee. those in favor say aye. those opposed, no. in the opinion of the chair, the ayes have it. the amendment is agreed to.
1:46 pm
it is now in order to consider amendment number 3 printed in house report 111-410. for what purpose does the gentleman from arizona rise? mr. flake: madam chair, amendment at the desk -- i have an amendment at the desk providing for consideration of the bill. the chair: the clerk will designate the amendment. the clerk: amendment number 3 printed in house report 111-410 offered by mr. flake of arizona. the chair: pursuant to house resolution -- excuse me -- pursuant to house resolution 1051, the gentleman from arizona, mr. flake, and a member in opposition will each control five minutes. the chair recognizes the gentleman from arizona. mr. flake: i thank the chair. this amendment i hope is noncontroversial in nature. section 105 of the bill would authorize appropriations for several national science foundation grant programs dealing with cybersecurity. for example, the bill authorizes $400 million through 2014 for computer and network security research grants.
1:47 pm
in addition, the bill would authorize such sums necessary related to research centers and capacity building, scientific and technology grants and traineeships and research fellowships. it would prohibit earmarking for the funds made available for the grants -- for the programs under this act. it appears that the grants were already intended to be awarded on a, quote, merit review competitive basis, but i think we still need this amendment because we've seen in the past time and time and time and time again that programs that were set up to be competitive, that is supposed to be competitive or merit reviewed is simply earmarked later. so if we have this language in it it will make it less likely that these counts are subject to earmarking. it's unfortunate that we have to take this step.
1:48 pm
i realize. but i think we should. i agree with the president when he said last week that we need to, quote, continue down the path of earmark reform and that, quote, restoring the public trust demands more. this is doing more. i think we have to go much further than this, but this is a good start. and i wish to yield the time to the ranking minority member for his comments. the chair: the gentleman from texas is recognized. mr. mccaul: thank you, madam chair. i rise in support of this amendment and i also support the gentleman's position on earmarks. this amendment would prohibit the earmarking of the n.s.f. and nist cybersecurity activities authorized in this bill. it is well understood that awarding grants through near based competitive processies is the best way. this inflation of political influences is an important reason why n.s.f. and nist has such a strong reputation
1:49 pm
overall within both of -- in and outside the federal government. mr. flake's amendment will help ensure that this model is being protected by incorporated within the statute. i yield back. mr. flake: i thank the gentleman. i mentioned that we had examples in the past. let me give you one where programs that were supposed to be competitively awarded were in fact earmarked. last year we established a grant program called the emergency operations centers. it was established by congress in f.y. 2008 in the homeland security bill. last year in the spending bill it showed that 60% of the funds in this grant program were earmarked. we simply can't allow that to happen here. this is a $400 million authorization for this grant program, and we can't have it earmarked. and i reserve the balance of my time. the chair: the gentleman from arizona reserves the balance of his time. the gentleman from tennessee is
1:50 pm
recognized for what purpose? mr. gordon: i claim time in opposition to the amendment even though i am not opposed to the amendment. the chair: without objection, the gentleman from tennessee is recognized. mr. gordon: madam chair, i want to thank my friend for introducing this amendment. it's certainly is accepted by the majority, and i want to assure him, as mr. mccaul can also, that this particular bill is a clean whistle. there are no earmarks in n.s.f., nist or anywhere else. i thank him for making sure we get it clarified. i yield the balance of my time to mr. polis, the gentleman from colorado. the chair: the gentleman from colorado is recognized. mr. polis: thank you, madam speaker. thank you, chairman fwoorned. i rise today in support of -- thank you, chairman gordon. i rise today in support of h.r. 4061. we worked well with chairman gordon and mr. lipinski on this bipartisan bill that will train the experts we need to tackle
1:51 pm
tomorrow's challenges and enable the united states and the world to stay competitive in cybersecurity. in a world of blogs and widgets, smart phones and email we are truly a global community growing ever closer and ever more connected. the average citizen cannot helped but feel part of a technology family. it has enhanced our work lives, regardless of our position. as someone who has run several small technology related business i can tell how it's improved my ability now in the political side to represent the people of colorado's second congressional district. it will provide internships available of the program to include placements in the private sector. i believe it will serve tomorrow's cybersecurity professionals to open up this program from the public and private sector. it can also provide the abundance of small, medium and large businesses and help our nation's economy with
1:52 pm
additional work force. my district is a great example of institutions and companies. we have a community of thriving startups and growing businesses. with the collaboration of cybersecurity professionals from the university of colorado at boulder, these programs can benefit and in turn build each student's portfolio of experience. i'm positive that their education in the private sector will help promote unique solutions, the daunting tasks during their time in the federal government. while it seemed like -- it can now serve as a useful tool of fending off cyberattacks from nation states or rogue individuals. the state of cybersecurity is fast becoming one of the greatest challenges of the 21st century. it's apparent that despite increased spending on research and development, this is vulnerable. and china's hacking into google
1:53 pm
should serve as a call to both the private sector and federal government. president obama's cyberspace policy review highlighted the importance of developing partnerships between the federal government and the private sector. our plans needs to address the issues that will prop up. the internet can make people fall prey to people. we need to boost our training capabilities for helping ensure a safe and free internet experience. this amendment makes sure we address the long-term challenges inherent to cybersecurity, it will cultivate a work force for the future. madam speaker, this amendment and this bill are critical to protecting our nation's sensitive information and ensuring our cybersecurity. i'd like to ask unanimous consent to revise and extend my remarks. the chair: without objection. mr. polis: and i appreciate the committee on the whole for accepting this amendment and
1:54 pm
commend chairman for accepting it. i yield back. the chair: the gentleman from arizona is recognized. mr. flake: i appreciate the majority's willingness to accept the amendment. i appreciate the fact that there are no earmarks in this authorization. what we're seeking to do here is when money is appropriated for these programs that are authorized here that none of that money can be earmarked like we've seep in many, many, many bills before. and with that i yield back. the chair: the gentleman from tennessee is recognized. mr. gordon: and i yield back the balance of my time. the chair: the question is on the amendment offered by the gentleman from arizona. those in favor say aye. those opposed, no. in the opinion of the chair, the ayes have it. and the amendment is agreed to. mr. gordon: madam chair, i'd like to ask for a recorded vote. the chair: a recorded vote has been requested. pursuant to clause 6 of rule
1:55 pm
18, further proceedings on the amendment offered by the gentleman from arizona will be postponed. it is now in order to consider amendment number 4 printed in house report 111-410. for what purpose does the gentleman from utah rise? mr. matheson: i have an amendment at the desk. the chair: the clerk will designate the amendment. the clerk: amendment number 4 printed in house report 111-410 offered by mr. matheson of utah. the chair: pursuant to house resolution 1051, the gentleman from utah, mr. matheson, and a member opposed, will each control five minutes. the chair recognizes the gentleman from utah. mr. matheson: thank you, madam speaker. i will be very brief. you know, right now this legislation in terms of cybersecurity authorizes the national science foundation to assist in doing research that
1:56 pm
will help law enforcement look for issues related to intellectual property. i thought it would be helpful that we include enhancement of law enforcement to prosecute cybercrimes that involve crimes against children and organized crime. and so simply stated, that is the substance of this amendment. i think any of us who are parents of children right now have concerns about when kids are using the internet and the amount of inappropriate material that's on it right now and the number of folks who are targeting children on the internet. i thought that would be a helpful amendment to this bill. i urge my colleagues to support the amendment. i reserve the balance of my time. the chair: the gentleman reserves the balance of his time. the gentleman from texas rises fors for -- for what purpose? mr. mccaul: i rise in opposition to the bill although i do not oppose it. the chair: without objection, the gentleman is recognized. mr. mccaul: this is to enhance security including the ability
1:57 pm
for law enforcement to detect and investigate and prosecute cybercrimes. this amendment merely highlights crimes against children and organized crimes such as cybercrimes where these investments should be made. so i fully support this good amendment and yield back the balance of my time. the chair: the gentleman yields back the balance of his time. the gentleman from utah. mr. matheson: i yield back. the chair: all time having been yielded back, the question is on the aimed offered by the gentleman from utah -- amendment offered by the gentleman from utah. those in favor say aye. those opposed, no. 2/3 having responded in the affirmative, the amendment is agreed to. it is now in order to consider amendment number 5 printed in house report 111-410. for what purpose does the gentleman from illinois rise? mr. roskam: madam chair, i have an amendment at the desk. the chair: the clerk will designate the amendment. the clerk: amendment number 5 printed in house report 111-410
1:58 pm
offered by mr. roskam of illinois. mr. roskam: i ask unanimous consent that the amendment be considered read. the chair: without objection. mr. roskam: i yield myself such time as i may consume. thank you for -- to the majority for putting this amendment in order and to mr. lipinski who was instrumental in putting this together. the amendment is very straightforward and very, very simple. it inserts the word or phrase community college at four different points in the bill. and what it's trying to do is to expand the pool of people that we're reaching out to to bring into this idea of taking on this great challenge of cybersecurity. in a nutshell, i'd like to read just a quick paragraph from a community college in my district, the college of due page located in -- of du page located in illinois. talented students and the state-of-the-art facility that the college of du page and institutions like it to put in
1:59 pm
place systems to protect our country. and similarly, the amendment is supported by the american association of community colleges. but i think putting this into a larger context, it's important because if you look at where we're going as a nation and notwithstanding all the turmoil that we've seen regarding our economy and where we're attempting to go and we're struggling with great unemployment rates and so forth, without question if the technology sector of our -- it's the technology sector of our economy that's going to lead the way. and without question we are going to need an underlying system that's secure. and so i think casting a wider net, including folks in the community college system who have proven themselves time and time again to ultimately invite them into this solution i think is the way to go. it's a fairly straightforward amendment, and it says that technology is important for our nation and ultimately technology and cybersecurity are important for our nation. i'd like to yield to the
2:00 pm
gentleman from texas, mr. mccaul, for such time as he might consume. the chair: the gentleman is recognized. mr. mccaul: thank you to my good friend from illinois for yielding the time. i strongly support this amendment. our nation's community colleges have played a crucial role in our technology and educational work force. this amendment makes sure they are able to make recommendations and give advice to the federal government on the strategic plan. it emphasizes their eligibility as a potential institutional partner under the scholarship for service program and really puts them at the table at the university industry task force. so with that i strongly urge support. i thank my good friend from illinois, and i yield back to the gentleman. mr. roskam: i thank the gentleman for his kind words. i reserve the balance of my time. the chair: the time is reserved by the gentleman from illinois. is there any members to claim time in opposition? the chair recognizes the
2:01 pm
gentleman from illinois. mr. roskam: i yield back. . the chair: the question is on the amendment offered by gentleman from illinois. so many as are in favor say aye. those opposed, no. in the opinion of the chair, the ayes have it and the amendment is agreed to. it is now in order to consider amendment number 6 printed in house report number 111-410. for what purpose does the gentlewoman from maryland rise? ms. edwards: i have an amendment at the desk. the chair: the clerk will designate the amendment. the clerk: amendment number 6, printed in house report number 111-410, offered by ms. edwards of maryland. the chair: pursuant to house resolution 1051, the gentlewoman from maryland, ms. edwards, and a member opposed, shall each control five minutes. the chair recognizes the gentlewoman from maryland. mission edwards: thank you, madam -- ms. edwards: thank you, madam chair. i want to take this moment to thank chairman gordon and
2:02 pm
ranking member hall for consideration of this amendment. i probably like lots of americans have faced a circumstance even in this last month and a half, private information compromised first at a bank then a federal agency and then at a retail establishment. all within the span of a month and a half. such as identity theft, denial of service, viruses, loss of sensitive information, and other malicious activity are part of the ever evolving cybersecurity threat to our country. it's important that we act exclusively to prepare our nation for these threats and anticipate the threats that will help in the years to come. it's not an easy task and we operate on a system of databases throughout this country that interact at the federal, state, and local level and commercial sector. this bipartisan bill really accomplishes all of these goals. and further the amendment that i'm offering really encourages
2:03 pm
the national institutes of standards and technology to work with other federal government entities, state governments, and the private sector partners to develop a framework that states may find as they strengthen their ibe cybersecurity standards. one of the weaknesses identified as we marked up this legislation is a lack of cooperation between the firms concerned with cybersecurity. the bill takes major steps to address this but i believe my amendment strengthens these measures and will lead to states many times on the frontlines to make major progress towards keeping their networks and information safe. of course that does trickle down to the local level and the commercial sector. in my home state of maryland we just made a major commitment to cybersecurity, as many states have across this country, with varying standards of operation and security around the country. this amendment will ensure that states use their resources much more efficiently. security requirements and priorities are unique to each state and oftentimes unique
2:04 pm
among government entits in the same state. my amendment recognizes this and allows states and standards to adapt with the changing threats and needs. madam chair, i urge my colleagues to support this amendment because we must encourage the collaboration and innovation as we aim to address the multiple threats to our cybersecurity. with that i reserve the balance of my time. the chair: the gentlewoman reserves. the gentleman from texas rise in opposition? >> thank you, mr. chairman. i rise to claim time in opposition to this amendment although i am not opposed to it. the chair: without objection. mr. mccaul: this amendment directs nist to work with federal, state, and private sector partners to develop a framework states may use to improve their cybersecurity posture. developing such a framework for use is certainly consist tent with nist expertise and capabilities. there is clearly a need for this expertise at the state level. i should note in working with the states that we should
2:05 pm
expect that the role remains limited to the development of guidance that states may use if they choose, avoiding any activities that are mandatory or binding in nature. with that i would like to yield to the gentlelady from maryland to say if that's a correct statement. that is my understanding of this amendment. ms. edwards: that is correct. mr. mccaul: reclaiming my time. i'm comfortable with the language in this amendment as written and very much support its passage. with that i yield back. the chair: the gentleman yields back the balance of his time. the gentlewoman from maryland. ms. edwards: mr. chair, i would like to yield 30 seconds to the chairman, the gentleman from tennessee. the chair: the gentleman from tennessee. mr. gordon: i thank my friend from maryland. i want to thank her more importantly for introducing this commonsense, constructive amendment that's going to provide additional tools for the states as they fight this
2:06 pm
issue, this very difficult day to day battle with cybersecurity. i yield back the balance of my time. the chair: the gentleman yields back the balance of his time. does the the gentlewoman from maryland wish to conclude? ms. edwards: i would conclude by saying it's really important we get this right at every level because of increasing threats to our cybersecurity both internationally and here domestically. i urge again my colleagues for careful consideration and approval of this amendment and with that i yield the balance of my time. the chair: the gentlelady yield back. the question is on the amendment offered by the gentlewoman from maryland. so many as are in favor say aye. those opposed, no. in the opinion of the chair, the ayes have it. the amendment is agreed to. it is now in order to consider amendment number 7 printed in house report 111-410. for what purpose does the
2:07 pm
gentleman from minnesota rise? mr. paulsen: mr. speaker, i have an amendment at the desk. the chair: the clerk will designate the designate the amendment. the clerk: amendment number 7, printed in house report number 111-410, offered by mr. paulsen of minnesota. the chair: pursuant to house resolution 1051, the gentleman from minnesota, mr. paulsen, and a member opposed, each will control five minutes. the chair recognizes the gentleman from minnesota. mr. paulsen: i yield myself such time as i may consume. the chair: the gentleman is recognized. mr. paulsen: mr. speaker, i rise today to offer an amendment that would declare that the cybersecurity strategic research and development plan to also include how we can work with international partners to make our technology infrastructure even safer. throughout most of our nation's history, our security concerns have evolved around our national security of military security, intelligence, and protection of our borders. over the past few decades our technological advances and our ever-increasing relines on that
2:08 pm
technology are increasingly important and have drastically expanded. this naturally makes our technology a likely target for attack by those that would like to harm the united states. furthermore, as minnesota's chief information officer says, cybersecurity is not just a federal issue, it is also a national policy issue with huge global ramifications. he is absolutely correct, mr. speaker. we must view the issue of cybersecurity from both a domestic and foreign perspective. mutually assured survival in cyberspace which i intend to offer in the record outlines the critical importance of our nation's cybersecurity infrastructure. as was stated, a cybersecurity attack on our most vulnerable assets, the data and information that power our productivity and support the united states and global economies, would be utterly devastating. an attack would not overwhelm affect us here at home but it would have a very adverse impact on our trading partners
2:09 pm
in the flow of commerce every day. today's technology driven economy makes cybersecurity an essential national security issue. one with ramifications that stretch across our nation and far beyond our borders. we must remember this as we look at ways to strengthen cybersecurity. we need to think about our alliances abroad in the general context of new geopolitical realities of the digital cyberworld in which we live and operate today. this amendment recognizes those realities. with that i would like to yield to my colleague from texas. the chair: the gentleman from texas is recognized. mr. mccaul: i rise in strong support of this amendment. the gentleman is absolutely correct. the internet knows no boundaries. this is not just an issue for the united states but a global issue. this amendment simply states that the interagency plan required by the legislation outline how the united states can work strategicly -- strategicically with international partners. cybersecurity issues are certainly global in nature.
2:10 pm
am of our closest allies face the same threats and vulnerabilities we do, thus it makes sense we should work to cooperate more closely with our international partners and that is what this amendment will do. therefore i strongly urge support and i yield back the balance of my time. the chair: the gentleman from minnesota. mr. paulsen: i reserve the balance of my time. the chair: the gentleman reserves. the gentleman from tennessee. mr. gordon: i claim time in opposition even though i am not opposed to the amendment. the chair: without objection. mr. gordon: mr. chairman, i concur with mr. mccaul in saying that cyberthreats know no boundaries. this is a good commonsense amendment and i thank the gentleman from minnesota for introducing it. we support the amendment. i yield back the balance of my time. the chair: the gentleman yields back the balance of his time. the gentleman from minnesota. mr. paulsen: mr. speaker, in closing i know by working together on a sken approach i thank the gentleman and look forward to support of this amendment. i yield back the balance of my time. the chair: the gentleman yeelt back. the question is on the amendment offered by the gentleman from minnesota.
2:11 pm
so many as are in favor say aye. those opposed, no. in the opinion of the chair, the ayes have it. the amendment is agreed to. it is now in order to consider amendment number 8 printed in house report number 111-410. for what purpose does the gentlewoman from pennsylvania rise? mrs. dahlkemper: i have an amendment at the desk. the chair: the clerk will designate the amendment. the clerk: amendment number 8, printed in house report number 111-410, offered by mrs. dahlkemper of pennsylvania. the chair: pursuant to house resolution 1051, the gentlewoman from pennsylvania, mrs. dahlkemper, and a member opposed will each control five minutes. the chair now recognizes the gentlewoman from pennsylvania. mrs. dahlkemper: mr. speaker, my amendment to h.r. 4061 expands computer and network security capacity building grants to allow for collaboration between community colleges, universities, and manufacturing extension partnership centers. as we all know cybersecurity is
2:12 pm
an issue that affects both our national security and our economic prosperity. and it posings a particular problem for our small businesses. small and medium sized businesses often cannot shoulder the cost of developing and maintaining the mechanisms needed to protect themselves from cybersecurity threats. individually the security of these firms may seem like a minor affair compared to larger economic and government entities. however the 27 million small and medium sized businesses across the country account for 95% of our nation's business. clb budget reconciliations will benefit all paragraph -- collaborations will benefit all participants. to work force training and better more cost efficient security measures for manufacturing extension partnership centers and their industry partners. i want to thank representative gordon, ranking member hall, and representative lipinski for
2:13 pm
their leadership on this bill. i urge my colleagues on both sides of the aisle to support the cybersecurity enhancement act of 2009 and my amendment that will help small businesses starting with our manufacturers better confront the serious challenges of cyberspace security. i reserve the balance of my time. the chair: the gentlelady reserves the balance of her time. the gentleman from texas. mr. mccaul: thank you, mr. chairman. i rise to claim time in opposition to this amendment although i am not opposed to it. the chair: without objection, the gentleman is recognized. mr. mccaul: this amendment simply provides an establishing or enhancing cybersecurity collaboration between community colleges, universities, and nist manufacturing extension partnership centers is among the most eligible activities that may be supported by n.s.s. cybersecurity research grants. this collaboration between researchers and those that provide technical support regarding cybersecurity's best practices is beneficial and should be encouraged. so therefore i support the
2:14 pm
gentlelady from pennsylvania's amendment and i yield back the balance of my time. the chair: the gentleman yields back the balance of his time. the gentlelady from pennsylvania. mrs. dahlkemper: i yield as much time to the gentleman from tennessee. the chair: the gentleman from tennessee. mr. gordon: thank you, mr. chairman. thank you, my friend from pennsylvania. this is a very important amendment to this -- to our committee's work. community colleges have such -- so much potential to offer us. i think by bringing this to the table we are going to bring a whole other sector of people to get involved. once again this goes back to work force issues. we can have the best technology in the world, but if we don't have the work force to go with it, we won't be successful. i thank the gentlelady for this exleapt amendment. the chair: the gentleman yields back the balance of his time. the gentlelady from pennsylvania. mrs. dahlkemper: i thank the chairman and i yield back the remainder of my time. the chair: the gentlelady yield back. the question is on the amendment offered by the gentlelady from pennsylvania. so many as are in favor say aye. those opposed, no.
2:15 pm
in the opinion of the chair, the ayes have it. the amendment is agreed to. a recorded vote is requested. pursuant to clause 6 of rule 18 , further proceedings on the amendment offered by the gentlewoman from pennsylvania will be postponed. it is now in order to consider amendment number 9 printed in house report 111-410. for what purpose does the gentleman from california rise? >> for the purposes of offering an amendment. the chair: the clerk will designate the amendment. the clerk: amendment number 9, printed in house report number 111-410, offered by mr. gera menda of california. the chair: pursuant to house resolution 1051, the gentleman from california, mr. garamendi, and a member opposed, each will control five minutes. the chair recognizes the gentleman from california. mr. garamendi: thank you, mr. speaker. i yield myself such time as i may consume. . the chair: the gentleman is recognized. mr. garamendi: i learned as a
2:16 pm
boy scout you need to be prepared. this amendment is about knowledge and information for the public. about 70% of californians are linked to the internet, but that internet brings great problems. a new infected webpage is discovered every second. a new spam-related webpage is discovered every 20 seconds. additionally, there are some 2,500 email messages that contain infected information. so we best be prepared. in order to do that we need knowledge. and that's what this amendment's all about. it provides the opportunity for the institute to carry out the cybersecurity awareness and education program by conducting workshops around the nation. with that workshop available, the information can be disseminated and made available to individuals.
2:17 pm
that's the amendment and i seek an aye vote. the chair: does the gentleman reserve his time? mr. garamendi: yes, i reserve the balance of my time. the chair: the gentleman reserves the balance of his time. the gentleman from texas is recognized. mr. mccaul: thank you, mr. chairman. i rise too claim time in opposition to this amendment although i am not opposed to it. the chair: without objection, the gentleman is recognized. mr. mccaul: this amendment specifies that as part of its outreach and education efforts, nist may host regional workshops on cybersecurity for businesses, states and local governments and educational institutions. i think this is a good thing. although i do not oppose it, i'd like to note that nist has a very modest budget for cybersecurity activities. of which outreach and education is a small fraction. accordingly, in carrying out the section of this bill is my expectation that nist should work to leverage this funding to benefit the largest number of entities and individuals that it can. i recognize that workshops can also serve as a useful outreach
2:18 pm
tool and should be an option. so with that point in mind, i do object to this amendment, and i reserve the balance of my time. the chair: the gentleman yields. the gentleman reserves. mr. mccaul: i'll yield back. the chair: the gentleman yields. the gentleman from california. mr. garamendi: the gentleman points out some very good points that there are issues about the budget. i'm sure the institute will find the very best way to carry out this particular task. i yield the remaining time to the chair. the chair: the gentleman from tennessee is recognized. mr. gordon: first, let me thank my friend from california for the good amendment. i want to extend my condolences to judy. she was the printer for the science of committee and technology. she passed away this week. because she worked from home i did not know judy as well as i do other members of the staff. she was a quiet stalwart of the
2:19 pm
committee. most staff members never questioned how the documents who are the record of our work get produced and it's a testament to judy that they never had to. judy just took care of it. when i first became chairman i had no idea that a committee -- what a committee printer did. i kept asking who the printer was, what did she do, where was her office? s toldhat w t stmoing arerson that we could ever have on our staff and that she was good at whatever she did. and that i needed to have no concerns on that front. everyone was right. judy's quiet presence and good work will be missed by all on our committee. and i yield back the balance of my time. the chair: the gentleman yields back. the question is now on the amendment offered by the gentleman from california. those in favor say aye. those opposed, no. in the opinion of the chair, the ayes have it. the amendment is agreed to.
2:20 pm
it is now in order to consider amendment number 10 printed in house report 111-410. for what purpose does the gentlewoman from new york rise? mr. mccarthy: i have an amendment at the desk. the chair: the clerk will designate the amendment. the clerk: amendment number 10 printed in house report 111-410 offered by mrs. mccarthy of new york. the chair: pursuant to house resolution 1051, the gentlewoman from new york, mrs. mccarthy, and a member opposed, will each control five minutes. the chair now recognizes the gentlewoman from new york. mrs. mccarthy: thank you, mr. chair. and thank you, chairman gordon and ranking member mccaul for bringing this bill to the floor. this will continue to bring new and exciting opportunities. while these opportunities, however, have new challenges
2:21 pm
for all of us, h.r. 4061, the cybersecurity enhancement act of 2009 is an important bill that will foster safer and more productive use internationally. i'm so proud that the president, his administration, as well as my colleagues in this congress, have all made internet innovation and security a priority. i'm even more proud of the educational provisions of h.r. 4061 that in my opinion are vital to the successful growth and sustainability of the internet and its many real-world applications. computer literacy may be something that some of us take for granted, but there are significant portions of our community that the computer can have on us. our daily lives are becoming increasingly reliant on the internet, and over the years congress has made substantial investments in its growth. it is only natural that congress complements the technology investment with the
2:22 pm
educational initiatives as well. i'm proud to offer, along with my esteemed colleague, mr. kratovil of maryland, an amendment to h.r. 4061 that will ensure that proper cybersecurity education efforts focus on those who need them the most, namely new computer users, ullederly, low-income populations, as well as those in the areas of planned internet explangs and deploit. my -- expansion and deployment. this is part of a public awareness campaign for cybersecurity. according to the prue research center, only a third of the elderly community are internet users. the research center finds that household incomes play a significant contributor to cybersecurity. we hear those taken advantage of or ignores the dangers of the internet. we can educate on careness web
2:23 pm
surfing. we need to make sure that those less experienced computer users are given the opportunity to pro active -- to be proactive members of the internet community. with that i reserve the balance of my time. the chair: the gentlelady reserves. for what purpose does the gentleman from texas rise? mr. mccaul: i rise in opposition to the amendment though i do not intend to oppose it. the chair: without objection, the gentleman is recognized. mr. mccaul: this simply states that nigs help make the technical standards and best practices -- nist help make the technical standards and best practices more user friendly. the elderly, those who may not have broadband quite yet, such as rural areas. therefore, i do not oppose this amendment. i'd like to join chairman gordon at this point in time to offer my sincere condolences as well to the friends and family of judy. judy served as a committee printer for the science and
2:24 pm
technology committee since 2001 under both republicans and democrat leadership. day in and day out, judy carried out her job with style and grace and never did she allow her struggles with diabetes to diminish her presence nor her performance. judy worked from home, but during her visits to our offices each week she took time to look in on staff and inquiring about our families and challenges. always leaving a smile on the faces of those she came in contact with. the time of transforming the permanent records is the life of our committee and judy did it to perfection. she is irreplaceable. judy's suffering has ended and we will miss her very deeply and god be with her. with that i yield back. the chair: the gentleman yields back the balance of his time. the gentlelady from new york. mrs. mccarthy: i'd like to yield as much time as he may consume. the chair: the gentleman from illinois is recognized.
2:25 pm
mr. lipinski: thank you. every year hundreds of thousands of people fall victim to internet fraud. so it's really clear that we need to improve our cybersecurity awareness and education. there are some who are especially vulnerable to -- who have fallen victims to this fraud. i think this amendment by mrs. mccarthy and mr. kratovil is a very good amendment. i know that certainly i have seen, had experience with especially those who are elderly falling victim and come to my office who have had problems about that and trying to clear that up. so i think this is an especially good amendment. i urge my colleagues to support it, and i yield back. the chair: the gentlelady from new york. mrs. mccarthy: i urge all my colleagues to support this amendment and i yield back the balance of my time. the chair: the gentlelady yields back. the question is on the amendment offered by the gentlelady from new york. those in favor say aye.
2:26 pm
those opposed, no. in the opinion of the chair, the ayes have it. and the amendment is agreed to. it is now in order to consider amendment number 11 printed in house report 111-410. for what purpose does the gentlelady from california rise? >> mr. chairman, as the designee of mr. smith from washington, i rise to offer the amendment. the chair: the clerk will designate the amendment. the clerk: amendment number 1 printed in house report 111-410 -- number 11 printed in house report 111-410 offered by ms. loretta sanchez of california. the chair: pursuant to house resolution 1051, the gentlewoman from california, ms. loretta sanchez, and a member opposed, will each control five minutes. the chair recognizes the gentlewoman from california. ms. sanchez: thank you, mr. chairman. i yield myself such time as i may consume. i rise in support of this amendment which i am pleased to offer today on behalf of my colleague, mr. smith of
2:27 pm
washington, who was unable to be with us today due to a health issue. i thank the gentleman for offering this amendment which will strengthen our cybersecurity work force, in turn, protecting the security of our nation. our country faces numerous cyberattacks each day, and as a result we must ensure that our cyberwork force not only possesses the knowledge and the skills necessary to defend our network but also the ability to collaborate with the numerous departments and agencies within the federal government who lead the effort to combat these threats. information technology professionals at our civilian agencies who may not deal with classified information on a daley basis should be able to provide their expertise and have the ability to work with and discuss cyber-related issues with the department of defense and our intelligence community. to that end, this amendment would modify section 107 of the bill which calls for the
2:28 pm
president to submit a report to congress addressing the cybersecurity work force needs of the federal government. it would examine the current security clearance and jobs suitability requirements that may serve as a deterrent for hiring an adequately trained cyberwork force. again, i wish to -- i want to wish congressman smith a speedy recovery and encourage my colleagues to support the amendment. thank you, mr. chairman, and i reserve the balance of my time. the chair: the gentlelady reserves her time. the gentleman from texas. mr. mccaul: thank you, mr. chairman. i rise to claim time in opposition. the chair: the gentleman is recognized in opposition. mr. mccaul: although i am not opposed to this amendment. this amendment would include some additional factors that would be considered in the assessment of the cybersecurity cybersecurity work force and barriers in entry to that work force. job security clearance and suitability requirements are important to consider in this assessment and, therefore, i
2:29 pm
thank the gentlelady for a constructive amendment. and i yield back the balance of my time. the chair: the gentleman yields back the balance of his time. the gentlelady from california is recognized. ms. sanchez: mr. chairman, i have no other speakers. and i would just ask to move this and for my colleagues to vote on it. and i yield back the rest of my time. the chair: the gentlelady yields back. the question son the amendment offered by the gentlelady from california. those in favor say aye. those opposed, no. in the opinion of the chair, the ayes have it. the amendment is agreed to. it is now in order to consider amendment number 12 printed in house report 111-410. for what purpose does the gentleman from rhode island rise? mr. langevin: i have an amendment at the desk. the chair: the clerk will designate the amendment. the clerk: amendment number 12 printed in house report 111-410 offered by mr. langevin of rhode island. the chair: pursuant to house resolution 1051, the gentleman from rhode island, mr. langevin, and a member opposed, each will control five minutes.
2:30 pm
the chair now recognizes the gentleman from rhode island. mr. langevin: thank you, mr. chairman. i rise to offer an amendment to h.r. 4061 that would expand private sector involvement in our cybersecurity efforts. by now we should all recognize the real danger our government faces from increasingly sophisticated cyberattacks with threats ranging from mischievous hacking, highly sophisticated penetration from neighbor states. while the men and women of our federal government are incredibly talented and dedicated, who work tirelessly to leverage the resources available to them to defend our government networks, the broad challenges inherent in cybersecurity and throughout it the procurement process mean that they may not always have the specific expertise or capabilities or technology necessary to keep up with current threats. this should be -- this is very sobering in light of the fact
2:31 pm
that we know that technology itself squares every 18 months. particularly on the human capital side, the private sector can offer greater flexibility and a wider range of specialists as well as agility. current law does not allow surprisingly for security efforts to share their cybersecurity expertise and knowledge with the men and women charged with defending our nation's critical networks and data. so my amendment directs the presidential cybersecurity work force assessment provided in the bill before us today to study the responsibility of private sector cybersecurity professionals to federal agencies. now, these assignments would offer important opportunity for the federal government to tap into a wider talent pool and improve private sector involvement in cooperation in protecting our federal networks. by creating easier access to that expertise to temporary
2:32 pm
assignments in the federal government we can dramatically improve our ability to protect the private -- public and private cyberinfrastructure. i think this really amounts to being a force multiplier and a benefit to our nation as a whole. i ask my colleagues to support this noncontroversial and commonens amendment -- commonsense amendment. i reserve the balance of my time. the chair: the gentleman from texas. mr. mccaul: i rise to claim time in opposition to the amendment although i am not opposed to it. the chair: without objection. mr. mccaul: let me take a personal privilege to commend the gentleman from rhode island for all of his great work in this particular area and how much i've enjoyed working with you co-chairing the c.s.i. commission and co-chairing the cybersecurity caucus. so thank you. . this would require the president to transmit a
2:33 pm
cybersecurity work force to the congress. specifically for the president's review consider the potential for of temporary assignment of a cybersecurity professional as a means to meet federal work force needs. these types of mechanisms such as intergovernmental personnel agreements have long been used by federal agencies in various capacities. they provide a flexible means through which to address work force needs expeditiously. accordingly it makes sense for the president's work force assessment to consider and report on these mechanisms. therefore i support the gentleman's amendment and i yield back the balance of my time. the chair: the gentleman yields back the balance of his time. the question is on the amendment offered by the gentleman from rhode island -- does the gentleman wish to be recognized further? mr. langevin: i would just again reiterate the fact that we have some credibly talented and dedicated men and women who
2:34 pm
work within the federal government already that workday in and day out to protect what is a critical national asset. that is our cyberasset as the president has clearly identified as a critical national asset. very important to our nation's security as well as to our economy. yet we face the incredible challenge of staying one step ahead of the bad guys, if you will, which is becoming increasingly difficult. this amendment would basically allow us to determine a way to allow private sector involvement to a greater degree, allowing detailees, if you will, or temporary assignment from the private sector to federal government agencies that would allow us to utilize their talents, again acting as a force multiplier to make sure we have the best and brightest at being able to use the best talent available to us to make sure we have robust cybersecurity.
2:35 pm
with that i yield back and move the previous question. the chair: the gentleman yields back the balance of his time. the question is on the amendment offered by the gentleman from rhode island. so many as are in favor say aye. those opposed, no. in the opinion of the chair, the ayes have it. the amendment is agreed to. it is now in order to consider amendment number 13 printed in house report number 111-410. for what purpose does the gentlewoman from california rise. ms. sanchez: mr. chairman, i have an amendment at the desk. the chair: the clerk will designate the amendment. the clerk: amendment number 13, printed in house report number 111-410, offered by ms. loretta sanchez of california. the chair: pursuant to house resolution 111-140. the gentlewoman from california, miss loretta sanchez, and a member opposed each will control five minutes. the chair now recognizes the gentlewoman from california. ms. sanchez: thank you, mr. chairman. i yield myself such time as i may consume. mr. chairman, the challenge of
2:36 pm
defending our nation on a consequence tanly expanding cyberfront continues to grow. as vice chair of the house homeland security committee and chairwoman of the armed services subcommittee that oversees the department of defense cybermission, i have constantly tried to improve how we address the need for the next generation technology and personnel to defend our country against this 21st dren -- 21st century cyberthreat. the underlying legislation i believe is an important step towards enhancing our nation's cybersecurity laws. and i have been a strong supporter of engaging the private sector in cybersecurity issues, especially when it comes to securing critical cyberinfrastructure. to this end the amendment that i am offering today would strengthen two existing provisions in the bill to further enhance the cybersecurity dialogue between the public and the private sector. my amendment would add language
2:37 pm
to help facilitate access to realistic threats and vulnerabilities so our academic researchers during the development of the strategic plans that is in section 103 of the bill. in addition the amendment will strengthen section 108 by ensuring that the university industry task force will propose guidelines for the private sector to provide feedback to the public sector on the effectiveness of the new technology. this sharing of lessons learned will help us to improve critical cybersecurity technologies and i urge my colleagues to support this amendment and the underlying legislation. thank you, mr. chairman. i reserve the balance of my time. the chair: the gentlelady reserves the balance of her time. for what purpose does the gentleman from texas rise? mr. mccaul: mr. chairman, i rise to claim time in opposition to the amendment although i am not opposed to it. the chair: without objection, the gentleman is recognized. mr. mccaul: thank you. let me say first i commend the gentlelady from california for the emphasis on the private sector.
2:38 pm
i think too often we deal with this issue we focus mainly on the government and not enough on the private sector where the majority of the critical infrastructures are in this contry. let me commend the gentlelady for bringing this forward. this amendment makes two changes to the bill which i believe are good changes. first it requires that cybersecurity r&d strategic plan described how an interagency efforts will facilitate efforts to realistic threat and vulnerability data by academic researchers. secondly, it casts the university industry r&d task force created by the bill to consider how best the public and private sectors can share lessons learned on the effectiveness of new technologies. both of these provisions make changes to the underlying bill that i believe improve the bill and therefore i fully support passage. with that i yield back. the chair: the gentleman yields back. the gentlelady from california. ms. sanchez: mr. chairman, i would like to yield my time to mr. lipinski of illinois. the chair: gentleman from
2:39 pm
illinois is recognized. mr. lipinski: thank you, mr. chairman. i want to commend ms. sanchez for her work on this amendment and also on cybersecurity in general and homeland security committee. from my time as a university professor i understand the importance first of all of the cooperation between the private sector and universities. it's something i feel very strongly about that we need to improve that and certainly cybersecurity is especially important. the other thing that i understand is the need to have information. the more information sharing that we can have, the better we can do with cybersecurity. this amendment helps accomplish both those things so i strongly support, urge my colleagues to support and vote for this amendment. i yield back to ms. sanchez. the chair: the gentlelady from california. ms. sanchez: thank you, mr.
2:40 pm
speaker. i believe i have no further speakers, therefore i urge my colleagues to support my amendment and the underlying bill. i yield back my time. the chair: the gentlelady yield back. the question is on the amendment offered by the gentlelady from california. so many as are in favor say aye. those opposed, no. in the opinion of the chair, the ayes have it. the amendment is agreed to. it is now in order to consider house amendment number 14 printed in house report number 111-410. for what purpose does the gentleman from texas rise? mr. cuellar: i have an amendment at the desk. the chair: the clerk will designate the amendment. the clerk: amendment number 14, printed in house report number 111-410, offered by mr. cuellar of texas. the chair: pursuant to house resolution 1051 the gentleman from texas, mr. cuellar, and a member opposed each will control five minutes. the chair now recognizes the gentleman from texas. mr. cuellar: thank you, mr. chairman. i yield myself such time as i may consume. first ever all, mr. chairman, i
2:41 pm
want to rise in support of this particular amendment of the cybersecurity enhancement act. i want to thank mr. lipinski for all the leadership he's provided on this bill and the staff that worked so hard. i want to thank my good friend from texas also, mr. mccaul, who has worked very hard on this issue, especially in the homeland security. we aprooshate your work on that, mr. -- appreciate your work on that, mr. mccaul. this will improve the cybersecurity in both the private and public sector. any business will tell you we live in a highly interconnected, highly technological 21st century. as a member of the homeland security, i know we are under attack from cyberthreats every single day. tentative security and intelligence information passed through the internet 24 hours a day, seven days a week. more than a trillion dollars was spent last year fighting to keep this information safe. the more we rely on i.t. systems, the more we need to
2:42 pm
make the necessary investment. to reduce cyberrisk and vulnerability. my amendment today is simple. as we you improve cybersecurity, we must help put americans back to work. my amendment requires that the advisory committee, the producers of cybersecurity strategic research and development plans to determine how we ought to strengthen all levels of cybersecurity education and training programs to develop a well trained work force that meets our nation's cybersecurity needs. we must work to enlist our nation's high schools, trade schools, colleges, and universities to bring more young people into the industry. we can also use the cybersecurity education to harness technology -- technological powers of our young people to keep our nation and our nation's businesses safe. we have an opportunity to strengthen the i.t. infrastructure and our work force by getting together in a part zahn with our nation's schools.
2:43 pm
my home town, home state of texas we are leaders in the cybersecurity operation. as mr. mccaul understands, texas invests in people productive technology both in public, private, academic sectors. in san antonio, for example, we have the national center for excellence for cybersecurity. which has increased jobs numbers in the cybersecurity and information assurance industry in texas. we can also replicate this particular model. mr. chairman, as you know, we want to make sure we repair our economy and help put people back to work. this is why we must strengthen our cyberinfrastructure both in business, education, and government alike. we can focus on this goal, that is how can we secure the i.t. future and how do we put people back to work? i urge all of my colleagues to support this amendment and i reserve the balance of my time. the chair: for what purpose
2:44 pm
does the gentleman from texas, mr. mccaul, rise? mr. mccaul: i rise to claim time in opposition to this amendment. however the good news, mr. cuellar, i do not intend to oppose it. the chair: without objection, the gentleman is recognized. mr. mccaul: let me first say, commend the gentleman from texas, my good, dear friend and colleague, mr. cuellar, on the outstanding work he's done in this area and on the homeland security committee. and also his work with the septre for excellence in san antonio for cybersecurity. it's great for our great state of texas. this amendment requires a strategic plan to describe how the program will strengthen cybersecurity education and training efforts in order to ensure an adequate well trained work force. the bill has in place for the best work force assessment requirements, but the robustness of our future cybersecurity work force i believe is important enough to re-emphasize it. with that i do not oppose this amendment. i strongly support it. i yield back the balance of my
2:45 pm
time. the chair: the gentleman yields back. for what purpose does the gentleman from texas rise? mr. cuellar: i want to echo mr. mccaul's words on this. we need to make sure that we support our business both public and private, and i think this amendment will accomplish that. especially working with our education. again to the chairman, thank you very much. to the staff that worked so hard on this, i ask members to support this particular amendment. . the chair: does the gentleman yield back? mr. cuellar: yes. the chair: those in favor say aye. those opposed, no. in the opinion of the chair, the ayes have it. the amendment is agreed to. mr. cuellar: can i ask for the yeas and nays? the chair: pursuant to clause 6 of rule 18, further proceedings on the amendment offered by the gentleman from texas, who asked for a recorded vote, will be postponed. it is now in order to consider amendment number 15 printed in
2:46 pm
house report 111-410. for what purpose does the gentlewoman from new hampshire rise? ms. shea-porter: i have an amendment at the desk. the chair: the clerk will designate the amendment. the clerk: amendment number 15 printed in house report 111-410 offered by ms. shea-porter of new hampshire. the chair: pursuant to house resolution 1051, the gentlewoman from new hampshire, ms. shea-porter, and a member opposed, each will control five minutes. the chair recognizes the gentlewoman from new hampshire. ms. shea-porter: thank you, mr. chair. i yield myself such time as i may consume. the chair: the gentlelady is recognized. ms. shea-porter: i'd like to thank chairman gordon for his hard work on this bill. as a member of the house armed services committee i know how important it is we focus on cybersecurity and combating the threats that we face. it is an incredibly important area and i commend him for his work. mr. chair, as cyberattacks become increasingly common and alarming, the government needs more expert cybersecurity personnel to protect us. the scholarship for services program is an poornt means to
2:47 pm
recruit such expert personnel. however, i believe that considering the highle value of the education and -- high value of the education and security clearance which is provided at government's expense, the current obligation is insufficient to recover the significant federal investment we are making. my amendment extends the service obligations for recipients of cybersecurity scholarships or fellowships on a sliding scale depending on the degree program. those in bachelor degree programs will see nair service requirement extended by one year to three years. those in a masters degree from two years to four years. and those in the ph.d. program from three years to five or six years, depending on the program. graduate students in cybersecurity programs need to have security clearances, and most students will need a clearance before fwinging work in the field for the federal government. the cost of a clearance, which is a price of $15,000, is an investment by the taxpayers and
2:48 pm
should be recovered by the federal government through an extension of service. extending the work requirement will also help slow the revolving door from government to industry and promote retention of valuable employees. because these employees will have a security clearance, which is generally good for 10 years, they may be attempted to take their expertise within the private sector to make higher salaries. this amendment will prevent this valuable program from being used solely as a bridge to private industry. a graduate degree with a clearance is far more valuable than an undergraduate degree with a clearance. the longer the educational investment the longer the service requirements should be. a ph.d. graduate should serve longer than a masters graduate who should serve longer than a bachelors graduate. it allows us to retain both a government expense for a longer time leading to a positive impact on retention and on our
2:49 pm
cybersecurity. my amendment will increase retention of a valuable person -- of our valuable personnel who is trained at our taxpayers' expense. it's a good deal for the government and represents a good use of taxpayer funds. i ask my colleagues to support this amendment and i reserve the balance of my time. the chair: the gentlelady reserves. for what purpose does the gentleman from texas rise? mr. mccaul: mr. chairman, i rise to claim time in opposition to the amendment although i am not opposed to it. the chair: without objection, the gentleman is recognized. mr. mccaul: the gentlelady from new hampshire's amendment is one that our side favored during the drafting of this legislation and one that we think makes the scholarship for service program at n.s.f. even stronger. so i thank the lady for bringing this amendment. the intent of the program is to educate the federal government's future cybersecurity work force. this amendment increases the amount of employment service a graduate will owe the federal government upon the completion of her or his education. ensuring a greater return on
2:50 pm
our initial investment. so, therefore, i support this amendment. i encourage my colleagues to do so and i yield back. the speaker pro tempore: the gentleman yields back. the gentlelady from new hampshire. ms. shea-porter: and i yield to the chairman. so much time as he may consume. the chair: the gentleman from illinois is recognized. mr. lipinski: i want to thank the gentlelady from new hampshire for her amendment. it ensures that we retain individuals who are trained at government expense making sure the scholarship for service program provides the best value for taxpayers and certainly also good value for those who are receiving their education. it's a good, commonsense amendment. i urge my colleagues to support it. i yield back to the gentlelady from new hampshire. the chair: the gentleman yields to the gentlelady from new hampshire. ms. shea-porter: thank you, mr. chair. i thank the chairman and his staff for their work on this bill. i urge my colleagues to support this amendment and the underlying bill and i yield back. the chair: the gentlelady yields back.
2:51 pm
the question is on the amendment offered by the gentlewoman from new hampshire. those in favor say aye. those opposed, no. in the opinion of the chair, the ayes have it. and the amendment is agreed to. it's now in order to consider amendment number 16 printed in house report 111-410. for what purpose does the gentlewoman from new york rise? ms. clarke: to address the floor on my amendment. the chair: the clerk will designate the amendment. the clerk: amendment number 16 printed in house report 111-410 offered by ms. clarke of new york. the chair: pursuant to house resolution 1051, the gentlewoman from new york, ms. clarke, and a member opposed, each will control five minutes. and the chair recognizes the gentlewoman from new york. ms. clarke: thank you, mr. chairman. today, i rise to offer my amendment to h.r. 4061 and request that it be supported along with the underlying legislation. i first want to commend chairman gordon, ranking member hall, and representative
2:52 pm
lipinski, as well as representative mccaul for their leadership in bringing this important bipartisan bill to the floor today and for supporting this amendment. the federal government currently relice heavily on contract employees -- relies heavily on contract employees for cybersecurity function. for instance, according to the department of homeland security's inspector general, contractors accounted for 83% of the total staff of the department's office of the chief information officer. a july, 2009, boost-allen-hamilton assessment of the cyberwork force titled "cyber in security: strengthening the cybersecurity work force" concluded that the federal government needs more employees who can effectively manage the blended cybersecurity work force of contractors and in-house employees. clearly, any assessment of the cybersecurity work force should include an analysis of contract
2:53 pm
employees who perform cybersecurity functions for the government. my amendment to h.r. 4061, the cybersecurity enhancement act of 2009, will do just that. amending section 107 of the bill to include an analysis of the extent to which federal agencies rely on contractors to support the federal cybersecurity work force as well as each agency's capacity to manage these contractors. the amendment is not intended to judge whether the federal cybersecurity function should be performed by government or contractor employees. it simply requires that these considerations be included in the work force study. i hope that you will join me in supporting this amendment. i just like to add that as chair of the subcommittee on emerging threats, cybersecurity and science and technology, i have become aware of the cybersecurity challenges we face in the 21st century. i initially offered several other amendments which address a wide variety of challenges we
2:54 pm
face and will work to address these issues through my subcommittee. and, mr. chairman, i reserve the balance of my time. the chair: the gentlelady reserves. for what purpose does the gentleman from texas rise? mr. mccaul: mr. chairman, i rise to claim time in opposition to the amendment but i am not opposed to it. the chair: without objection, the gentleman is recognized for five minutes. mr. mccaul: let me commend ms. clarke for this amendment and also your great work on the homeland security committee as the chairwoman of the cybersecurity subcommittee. this amendment simply requires the present cybersecurity work force assessment report include an analysis of the capacity of the overall agency work force to manage contractors providing cybersecurity support to federal agencies. contractors are a significant component of our cybersecurity efforts, and assessing the role and agencies' capacity to manage them is very, very appropriate. therefore, i support this amendment, and with the time i do have remaining, mr. chairman, i'd like to yield to
2:55 pm
the gentlelady from texas, ms. sheel. -- ms. sheila jackson lee. the chair: the gentlelady from texas is recognized. ms. jackson lee: i want to thank the gentleman for his position on the cybersecurity committee. and i thank the chairwoman of the cybersecurity committee. and i thank her for this amendment of which i rise to support. i am the chairwoman of the subcommittee on transportation and security and infrastructure protection. there's a great deal of overlap. so i thank mr. lipinski, mr. ehlers, mr. wu, mr. smith and mr. hall. we have been fortunate as to not have a major catastrophic incident with cybersecurity. but this bill will help ensure a strateemingic plan for cybersecurity research and development, strengthen public-private partnerships in cybersecurity and help train the next generation of cybersecurity professionals and improve cybersecurity technical standards. ms. clarke's amendment is a very vital amendment for it will help subject to the assessment of the president's
2:56 pm
committee the same assessment on employees. this will assess the contractors who are dealing with cybersecurity, including minority women and small contractors of which we hope will increase. while we have been fortunate so far in avoiding a catastrophic cyberattack, last year the pentagon reported that more than 360 million attempts to break into its networks, a 2009 consumer report study found that one in five online consumers had been a victim of cybercrime. in 2008, the department of homeland security logged 5,499 such cyberattack incidents, a 40% increase over the previous year. a 2007 government accountability office report estimates the total u.s. business losses due to cyberattacks exceeded $117.5 billion a year. it will put under scrutiny those contractors who are working in cybersecurity for the federal government along with those employees. we have to be diligent in, one, making sure that this is a --
2:57 pm
if you will, securer technology that is being used around the country and around the world. but we must also be diligent in increasing r&d and make sure contractors are adhering to the rules and guidelines that is equal to excellence. let me ask my colleagues to support the underlying bill and this amendment and as well to be reminded that this is part of the nation's homeland security. with that i'll yield back to the distinguished gentleman. the chair: the gentleman from texas. mr. mccaul: thank you, mr. chairman. with that i yield back the balance of my time. the chair: the gentleman yields back. the gentlelady from new york. ms. clarke: yes, i'd like to yield my time to the gentleman from illinois, mr. lipinski. the chair: the gentleman from illinois is recognized. mr. lipinski: it's a very good and thoughtful amendment. i thank ms. clarke for helping to ensure that the federal work force assessment that we require in our report is complete and thorough in its
2:58 pm
analysis. i'd like to also thank ms. clarke and her staff for working with the committee on this language. and i strongly support this amendment. i urge my colleagues to vote for it. i yield back to the gentlelady from new york. the chair: the gentleman yields. the gentlelady from new york. ms. clarke: mr. chairman, i yield back the balance of my time. the chair: the question then is on the amendment offered by the gentlelady from new york. those in favor say aye. those opposed, no. in the opinion of the chair, the ayes have it and the amendment is agreed to. it is now in order to consider amendment number 17 printed in house report 111-410. for what purpose does the gentleman from alabama rise? mr. bright: thank you, mr. chairman. i have an amendment at the desk. the chair: the clerk will designate the amendment. the clerk: amendment number 17 printed in house report 111-410 offered by mr. bright of alabama. the chair: pursuant to house resolution 1051, the gentleman from alabama, mr. bright, and a member opposed, each will control five minutes.
2:59 pm
the chair recognizes the gentleman from alabama. mr. bright: thank you, mr. chairman. i yield myself such time as i may consume. mr. chairman -- the chair: the gentleman is recognized. mr. bright: mr. speaker, i rise in support of my amendment to the cybersecurity enhancement act, house resolution 4061. put simply, this amendment would require the national academy of sciences to study the role on community colleges in cybersecurity education. it would also identify best practices related to cybersecurity education between community colleges and four-year educational institutions. by now we all recognize the need for the underlying legislation. it was made even more evident following the state of the union last week when numerous congressional websites, including mine, were hacked by foreign actors. without a doubt, we need to improve our national cybersecurity infrastructure. as the united states transitions into a future which addresses such cybersecurity issues, it will become increasingly important that we
3:00 pm
adopt advanced job skills and technological savvy. unfortunately, a high school diploma is often not enough to qualify for the jobs of tomorrow. recognizing the need for additional education, workers often return to technical schools and community colleges to obtain advanced training. my amendment will serve to strengthen the community colleges that have already played an important role in many of our districts. as demand for skills cybersecurity work force continues to rise, we must be ready to supply it. this amendment will ensure that community colleges will play a role in providing these personnel that will be needed in the future. this amendment is also consistent with the president's vision for promoting post-secondary education. in his state of the union address to congress last week, president obama called for every american to commit to at least one year or more of higher education or career training. and some of that training will happen in the community college classrooms.
3:01 pm
this amendment could expand the options available in those classrooms across the country and make it easier for our constituents to commit to our shared goal of increased higher education. as i worked my way through college when i was growing up i began at a local enterprise state community college which is located in my district, so i understand the value of two-year institutions. my district alone is home to seven different community and technical colleges and many members of congress are committed to preserving and strengthening their role in our educational system. as we transition into the 21st century jobs, it is important that we also provide the resources to our community colleges that would allow them to change with the times. the amendment achieves that goal. mr. chairman, this amendment is simple and straight forward, it ensures a level playing field for community colleges wishing to offer educational opportunities in the
3:02 pm
cybersecurity field and improves information sharing between two-year and four-year colleges. i urge its passage today and i reserve the balance of my time. the chair: the gentleman reserves the balance of his time. for what purpose does the gentleman from texas rise this? mr. mccaul: mr. chairman, i rise to claim time in opposition to this amendment although i am not opposed to it. this amendment would require a national academy of sciences study on the role of community colleges in cybersecurity education. with the name toward identifying best practices related to improving cybersecurity education through better linkages between community colleges and four-year colleges and universities. it's important not to overlook the contributions of community colleges as the gentleman stated. to our overall technical work force, including those involved in computer and network security. this amendment is intended to help address that issue and i strongly urge my colleagues to support it and with that i yield back. the chair: the gentleman yields back. the gentleman from alabama. mr. bright: thank you, mr. chairman. in closing, i would like to
3:03 pm
thank chairman gordon and his staff on the science and technology committee for their attention to this issue and for working with my staff to draft this amendment. i would also like to thank chairwoman slaughter and the rules committee for allowing -- for helping my staff put this together and allowing me to offer this amendment today on the floor and again i urge all my colleagues today to support my amendment and i yield back the balance of my time. the chair: the gentleman yields back. the question then is on the amendment offered by the gentleman from alabama. those in favor say aye. those opposed, no. in the opinion of the chair, the ace have it and the amendment is agreed to. it is now in order to consider amendment number 18 printed in house report 111-410. for what purpose does the gentleman from virginia rise? mr. connelly: mr. chairman, i have an amendment at the desk. the chair: the clerk will designate that amendment. the clerk: amendment number 18 printed in house report 111-410 offered by mr. connelly of
3:04 pm
virginia. the chair: pursuant to house resolution 1051, the gentleman from virginia, mr. connelly, and a member opposed each will control five minutes. the chair now recognizes the gentleman from virginia. mr. connelly: i thank the chair and i yield myself such time as i may consume. the chair: the gentleman is recognized for up to five minutes. mr. connelly: first of all, let me thank, mr. chairman, the leadership of chairman gordon and ranking member hall and the floor managers, mr. lipinski and mr. mccaul of texas, i appreciate very much their leadership. cybersecurity, mr. chairman, has been a growing concern and recent events like the attack on google and the hacking of websites maintained by members of this house highlight the urgency of today's action. the bill would expand research and development work in the field of cybersecurity to provide for increased higher education opportunities and to launch a much-needed public awareness campaign on the importance of making our electronic communications in commerce as secure as possible in today's digital age.
3:05 pm
my amendment, mr. chairman, would clarify that children and young adults should be an important target audience of that public awareness campaign and must be included. children and young adults are by far among the largest consumers of new media and technology, yet in many cases they're also the most naive. when it comes to taking basic safety precautions when using this technology and these innovations which makes it all the more important that we reach out to them specifically. while children and young adult -- adults are among the most savvy users of technology, i fear they do not fully grasp the permanence of their actions when it's blogging, facebooking, tweeting or posting videos on youtube. the use and portability of information technology has exploded in the past decade. more than 80% of households, for example, in my district have internet access. technology's become a vital part of our everyday lives. particularly for the younger generation. according to the center for
3:06 pm
education statistics, 67% of preschool children have used a computer and 23% of preschool children have used the internet. those figures, of course, jump exponentially higher once children reach school age as technology becomes integrated into the classroom curriculum. by the time young people reach high school, 97% of them are using computers and 80% are online regularly. which for parents of teenagers like myself, that may sound like a conservative figure. i cannot emphasize enough, mr. chairman, how important it is for us to reach children at a young age, in the classroom, to develop a healthy sense of caution as we instruct them about the wonders of technology. that's particularly true in our science, technology, engineering and math-focused schools. that's why in my district, thomas jefferson high school, ranked the number-one high school in the united states three years in a row, are
3:07 pm
turning out the innovators of tomorrow. i look forward to opportunities in this community and urge my colleagues to support this legislation and i reserve the balance of my time. the chair: the gentleman reserves. the gentleman from texas. for what purpose does the gentleman rise? mr. mccaul: i rise to claim time in opposition to this amendment although i am not opposed to it. the chair: the gentleman is recognized. mr. mccaul: first let me say how great this legislation is. i've encountered crimes against children and also as deputy attorney general for the state of texas we formed an internet crimes against children task force. the threat to children, both child pornography and online predators, as the gentleman knows, is very real and while the internet's a great tool for our youth, it also does prevent a vulnerability and a threat to them and that's why i'm so glad to see this amendment. it simply clarifies that we're promoting and educating people on the importance of cybersecurity, we must include
3:08 pm
children and young adults along with the other targeted audiences. so let me again thank the gentleman for bringing this. i strongly support it and encourage my colleagues to do so and i yield back. the chair: the gentleman yields back. the gentleman from virginia. mr. connelly: i yield to the distinguished floor manager. the chair: the gentleman from illinois. mr. lipinski: thank you. i want to commend the gentleman from virginia for his amendment. obviously as the gentleman had talked about, the internet is great for children, young adults, it provides so many opportunities but we need to be very careful because we all know the dark side, the down side, and so much more can be done, should be done, to protect children, young adults and mr. connelly's amendment does that. so i want to urge my colleagues to support the amendment. and i yield back. the chair: the gentleman from virginia. mr. connelly: i thank my distinguished colleagues, mr. chairman, and i yield back my time. the chair: the gentleman yields back. the question then is on the amendment offered by the gentleman from virginia.
3:09 pm
those in favor say aye. those opposed, no. in the opinion of the chair, the ace have it and the amendment is is agreed to. mr. connelly: mr. chairman, on that i ask for a recorded vote. the chair: pursuant to clause 6 of rule 18, further proceedings on the amendment offered by the gentleman from virginia will be postponed. in order to consider amendment number 19 printed in house report 111-410, for what purpose does the gentlelady from illinois rise? mrs. halvorson: i have an amendment at the desk. the clerk: amendment number 19 printed in house report 111-410 offered by mrs. halvorson of illinois. the chair: the gentlewoman from illinois, mrs. halvorson, and a member opposed each will control five minutes. the chair recognizes the gentlewoman from illinois for up to five minutes. mrs. halvorson: thank you, mr. chairman. i yield myself as much time as i may consume. the chair: the gentleman is recognized. mrs. halvorson: i rise to urge my colleagues to support my
3:10 pm
amendment to h.r. 4061, the cybersecurity enhancement act of 2009. this amendment is simple, necessary and beneficial to veterans. it will add veteran stad us as an additional item of consideration when selecting individuals for the cyberscholarship for service program. in light of recent attacks on both government and commercial technology infrastructure, it is critical that america be on the forefront of cybersecurity. our veterans and service members have a proven track record of successfully protecting american interests at home and abroad. the experiences and skills that our veterans have gained through their service and what we need to improve. my amendment helps veterans continue their service to our country by increasing the likelihood that a veteran or service member will be selected for this competitive
3:11 pm
scholarship. the scholarship program will provide funding to individuals seeking b.a.'s, m.a.'s and ph.d.'s in the field of cybersecurity. this amendment will allow our veterans and service members to afford a better education and continue to serve their country. additionally, many veterans and service members have already received cybersecurity and other relevant training during their service in the military. they're uniquely qualified to defend our nation from cybersecurity threats we face. furthermore, upon successful completion of their degree, scholarship recipients will be eligible for federal employment in the field of cybersecurity. with thousands of veterans returning from service in iraq and afghanistan and more than 20% of veterans under the age of 24 unemployed, it is critical that they are given every opportunity to continue serving their country. our veterans and service members have sacrificed to protect our country and our freedom.
3:12 pm
we owe them all the assistance we can give them in helping them to better education and job opportunities in their civilian lives. i would like to thank the committee and the chairman for working with my colleague from new hampshire and me to introduce this amendment. once again i rise in strong support of the amendment and i urge my colleagues to vote in support of it. thank you, mr. chairman, and with that i reserve the balance of my time. the chair: the gentlelady reserves the balance of her time. for what purpose does the gentleman from texas rise? mr. mccaul: mr. chairman, i rise to claim time in opposition that amendment although i'm not opposed to it. the chair: without objection, the gentleman is recognized. mr. mccaul: let me thank the gentlelady for bringing this amendment. my home state of texas is the home to probably more active duty and service and veterans probably than any other state in the country. i think this is a great idea. including an air force base which provides a cybersecurity command. it's very straight forward, it adds veteran status as an additional item for consideration by n.s.t.f. when
3:13 pm
it selects individuals for scholarships under its cybersecurity scholarships for service program. therefore i strongly support the gentlelady's amendment and i urge its passage and with that i yield back. the chair: the gentleman yields back. the gentlelady from illinois. mrs. halvorson: thank you, mr. chairman. with that i yield one minute to my colleague from new hampshire, mrs. shea-porter. the chair: the gentlelady is recognized for one minute. ms. shea-porter: thank you, mr. chairman. i was proud to work with my colleague on this amendment. it is critical that we ensure every opportunity for our veterans who have served our country so admirably. this commonsense amendment makes sure that their service is taken into consideration when being selected for the federal cyberscholarship for service. as a member of the armed services committee, i understand how critical it is that we defend against cyberattacks. that means that we need a work force dedicated to protecting our country. our men and women who have volunteered in our armed services have shown exceptional courage and dedication. that service should always be
3:14 pm
met with our gratitude and our support. this amendment ensures that when someone has served our country, we give that service due consideration when they ask to serve again. i thank my colleague for offering this amendment and i urge my colleagues to pour -- support it. thank you, i yield back. the chair: the gentlelady from illinois. mrs. halvorson: with that i reserve the balance of my time. the chair: the gentleman has yielded back. does the gentlelady wish to yield back? mrs. halvorson: i'd like to yield the remaining time to the gentleman from illinois, mr. lipinski. the chair: the gentleman from illinois is recognized. mr. lipinski: thank you. i'd like to thank mrs. halvorson and mrs. shay port -- ms. shea-porter for their amendment and the work they do on behalf of our veterans and certainly it is an issue of great importance. last night i had a father come to me and tell me that his son had come back from iraq and was having trouble finding a job and was actually faced with
3:15 pm
reenlisting because of his struggles in trying to find something. this amendment will certainly help there. many veterans have technical backgrounds already. some additional training they're well positioned to continue serving their country by joining our federal cybersecurity work force, including at civilian agencies. so i want to again commend mrs. halvorson for her amendment and strongly urge my colleagues to support it. i yield back to the gentlelady from illinois. the chair: the gentlelady from illinois. mrs. halvorson: in closing i just urge my colleagues to vote and, mr. chairman, i ask for a recorded vote. the chair: the gentlelady yields back the balance of her time so the question is then on the amendment offered by the gentlelady from illinois. those in favor say aye. those opposed, no. in the opinion of the chair -- mrs. halvorson: mr. chair, i ask for a recorded vote. the chair: all right. in the opinion of the chair,
3:16 pm
the ayes have it. the amendment is agreed to. pursuant to clause 6 of rule 18 prix --, further proceedings on the amendment offered by the gentlelady from illinois will be postponed. it is now in order to consider amendment number 20 printed in house report 111-410. for what purpose does the gentlelady from ohio rise? ms. kilroy: mr. speaker, i have an amendment at the desk. the chair: the clerk will designate the amendment. the clerk: amendment number 20 printed in house report 111-410 offered by ms. kilroy of ohio. the chair: pursuant to house resolution 1051, the gentlewoman from ohio, ms. kilroy, and a member opposed, each will control five minutes. the chair recognizes the gentlewoman from ohio. ms. kilroy: thank you, mr. chairman. i yield myself such time as i may consume. i rise today in support of my amendment to h.r. 4061, the cybersecurity enhancement act of 2009. this extends outreach to high school and community colleges
3:17 pm
and information technology work force. one of the most important things about the cybersecurity enhancement act is the establishment for the scholarship for service program currently administered by the national science foundation. the program would operate with the goal of recruiting and training our nation's future cybersecurity professionals through scholarships for undergraduate and graduate students in cybersecurity fields. government internship opportunities for scholarship recipients and competitive merit-based grants for faculty development, institution of partnerships and the development of cybersecurity courses at institutions of higher learning. my amendment would expand the scholarship for service program by making merit-based grants available for outreach to high schools and community colleges. reaching out to high schools will help raise awareness of this program, steering students at an earlier age towards academic and professional careers in information technology and cybersecurity
3:18 pm
that they might not otherwise have considered. you know, young people are way ahead of us in terms of information technology and the use of computers, but they still need the encouragement and guidance to pursue a cybersecurity career path. and that can be made possible through these kind of competitive grants. my amendment also will expand outreach to community colleges. cybercriminals are increasingly targeting small businesses, schools, state and local institutions that lack the capabilities to adequately defend themselves against sophisticated cyberattacks. encouraging students at community colleges to consider degrees in cybersecurity related fields will help ensure we have the work force capable of defending our nation's computer systems and networks is he state, local and national level. as a member of the homeland security subcommittee on emerging threats, cybersecurity, science and technology, i strongly support the efforts of h.r. 4061 to
3:19 pm
build our nation's cybersecurity work force, develop the strategic research plan for cybersecurity, and secure our information and technology infrastructure. thank you, mr. chairman. i reserve the balance of my time. the chair: the gentlelady reserves. for what purpose does the gentleman from texas wish to be recognized? mr. mccaul: mr. chairman, i wish to claim time in opposition to this amendment although i will not oppose it. the chair: without objection, the gentleman is recognized for five minutes. mr. mccaul: i know the gentlelady probably knows more about computers than anyone in this chamber. this amendment is component to the characteristic to the scholarship for program -- for service program. i support this amendment. i urge my colleagues to do so and yield back. the chair: the gentleman yields back. the gentlelady from ohio. ms. kilroy: i thank my colleague from texas. also services with me on the homeland security committee. i want to commend chairman
3:20 pm
gordon, ranking member hall, subcommittee chair lipinski, sponsor of this legislation, and the committee on science and technology for their hard work on h.r. 4061, to help build a strong cybersecurity work force, to help and protect our communications and i.t. infrastructure. i look forward to continue working with my colleagues to make sure that the infrastructure is protected. i ask my colleagues to expand this to high school and community colleges. i yield back. the chair: the gentlelady yields back. the question is on the amendment offered by the gentlelady from ohio. those in favor say aye. those opposed, no. in the opinion of the chair, the ayes have it. the amendment is agreed to. ms. kilroy: i ask for a recorded vote. the chair: a recorded vote being requested, pursuant to clause 6 of rule 18, further proceedings on the amendment offered by the gentlelady from ohio will be postponed. it is now in order to consider
3:21 pm
amendment number 21 printed in house report 111-410. for what purpose does the gentleman from north carolina rise? mr. kissell: mr. chairman, i have an amendment at the desk. the chair: the clerk will designate the amendment. the clerk: amendment number 21 printed in house report 111-410 offered by mr. kissell of north carolina. the chair: pursuant to house resolution 1051, the gentleman from north carolina, mr. kissell, and a member opposed, each will control five minutes. the chair now recognizes the gentleman from north carolina. mr. kissell: mr. chairman, i yield myself such time as i may consume. the chair: the gentleman is recognized for up to five minutes. mr. kissell: mr. chairman, this is a simple amendment. it highlights the importance of curriculum in designing to secure software. i would like to start out also by commending the chairman and ranking member for bringing this very timely, important piece of legislation to our attention. in north carolina we have many institutions that are dependent on secure software and
3:22 pm
informing our networks that are used in such a vital part in performing business in a day-to-day basis. whether it's in our part of the world, in the military, banking giants or corporations or business in general, whatever, we're dependent upon networks and software for once again our day-to-day operations. however, mr. chairman, all too often we find that these networks are not as secure as they need to be. in a recent study done by dr. william chu who is the department chair at university of north carolina in charlotte, which is a leading institution upon secure software issues, dr. chu found that 97% -- and did he this on a random basis. they looked at corporate websites. and on a random basis they looked and see if the security of those networks were sufficient to keep them from being compromised and they found that they weren't. 97% of the time they weren't
3:23 pm
sufficiently secured to prevent this ability for hackers to compromise. this is a wake-up call for us. as so much of these amendments address and this bill addresses, we have issues here. one of the ways we can address this issue and it is in broad agreement that we need to improve the curriculum of our secure software. now, we would think this would be easily done in our colleges and universities but unfortunately we find that this curriculum is not taught that consistently to a large degree to allow the programmers of tomorrow to learn how to secure software. so this amendment is very simple. it directs the -- instructs the director of n.s.f. to put into language, into the mission statement of computer and network security capacity building grants the language that would highlight the importance of curriculum and design and secure software. and i reserve my time.
3:24 pm
the chair: the gentleman reserves. for what purpose does the gentleman from texas wish to be recognized? mr. mccaul: mr. chairman, i rise to claim time in opposition to the amendment but i do not intend to oppose it. the chair: without objection, the gentleman is recognized for five minutes. mr. mccaul: i thank the chair. this amendment simply clarifies that n.s.f. curriculum development at universities includes curriculum on the principles and techniques of designing secure software. it's a good amendment that codifies and clarifies in s.f.'s role in support of computer security curriculum development. i support this amendment. i urge my colleagues to do so and i yield back. the chair: the gentleman yields back. the gentleman from north carolina. mr. kissell: mr. chair, this is a first step towards allowing our universities and colleges to be able to produce once again programmers of tomorrow to understand the importance of securing the software and the network that are so important to us in so many ways. it's a first step. it's not the last step, but i
3:25 pm
do encourage my colleagues to support this and vote yes for this amendment. the chair: does the gentleman yield back? mr. kissell: the gentleman yields back. the chair: the gentleman yields back. the question is on the amendment offered by the gentleman from north carolina. those in favor say aye. those opposed, no. in the opinion of the chair, the ayes have it. mr. kissell: mr. chair, i ask for a recorded vote on this, please. the chair: the amendment was agreed to. the gentleman asks for a recorded vote so pursuant to clause 6 of rule 18, further proceedings on the amendment offered by the gentleman from nrk will be postponed. -- north carolina will be postponed. it is now in order to consider amendment number 22 printed in house report 111-410. for what purpose does the gentleman from maryland rise? mr. kratovil: i have an amendment at the desk. the chair: the clerk will designate the amendment. the clerk: amendment number 22 printed in house report 111-410 offered by mr. kratovil of maryland. the chair: pursuant to house resolution 1051, the gentleman from maryland, mr. kratovil, and a member opposed, each will control five minutes. the chair recognizes the gentleman from maryland.
3:26 pm
mr. kratovil: thank you, mr. chairman. i reserve myself such time as i may consume. the chair: so ordered. the gentleman is recognized for five minutes. mr. kratovil: mr. chairman, let me again by thanking mr. gordon, the chairman, and the ranking member, for bringing the legislation to the floor. i rise in support of my amendment to the cybersecurity enhancement act of 2009. information technology has improved everything from the way we pay our bills to the way we communicate with our friends and neighbors. we are increasingly becoming a digital nation where the strength and vitality of our economy, infrastructure, public safety and national security are becoming more and more reliant on cyberspace. of course, with that reliance on technology, as many have mentioned here today, come real concerns about the security of information traveling through cyberspace. it's time we make every effort to secure and protect the privacy, finances and resources of americans who utilize information technology, and i believe the underlying bill does much to accomplish this. mr. chairman, i'm sure it won't
3:27 pm
surprise you but i do believe my amendment will enhance this bill by enhancing communication, collaboration and cooperation between the public and private sectors. the amendment does so by requiring the director of national science foundation to establish a national center of excellence for cybersecurity. this center would be awarded on a merit-based comprehensive bay sainsd would support the initiatives put forward by the underlying legislation to ensure the safety of our digital communications infrastructure. this national center would be a partnership model involving government, private corporations and academic institutions that will consolidate and coordinate our national cybersecurity resources. as a the -- as the cybersecurity industry grows, there is an increase need of workers to fill these jobs. the center will not only be a clearing-house but train individuals in the skills needed to protect the economy,
3:28 pm
bolster our national security and protect americans from cybercriminals. mr. chairman, i want to take a brief moment also to express my support for an amendment that was heard previously offered by representative mccarthy that would emphasize education and awareness programs in cybersecurity for populations in areas of planned broadband expansion or deployment, such as areas like my district in maryland's eastern shore. mr. chairman, i ask my colleagues to support both amendments, the underlying bill and i reserve the balance of my time. the chair: the gentleman reserves. for what purpose does the gentleman from texas rise? mr. mccaul: mr. chairman, i rise to claim time in opposition to this amendment although i am not opposed. the chair: the gentleman is recognized for five minutes. mr. mccaul: thank you. while the statute that we are amending today already authorizes the director of n.s.f. to provide grants for computer and network security research centers, i believe that the establishment of a national center of excellence dedicated solely to cybersecurity can only increase our defensive capabilities.
3:29 pm
provided that any funding that does go to the national center does not come at the expense of other centers of excellence, of course. and with that i urge support of this amendment and my colleagues and i yield back the balance of my time. the chair: the gentleman yields back. the gentleman from maryland. mr. kratovil: mr. chairman, i'll yield as much time as he may consume to the gentleman from illinois. the chair: the gentleman from illinois is recognized. mr. lipinski: thank you. i want to first off commend mr. kratovil for his amendment. we have certainly seen centers for excellence do some very good work, not only on the scientific technology field, i also know in the transportation field we have also seen that. i think this amendment that would establish merit-based, a competitive base center for excellence for cybersecurity would be a great addition to our i.t. research in this
3:30 pm
country. i think this could be a very good enhancement to this bill. and so i strongly support this amendment. i urge my colleagues to vote for this amendment, and i yield back to the gentleman from maryland. the chair: the gentleman from maryland. mr. kratovil: i want to thank the gentleman from texas for his support and also the gentleman from illinois. and with that i i yield to yeel. the chair: the gentleman yields back. the question then is on the amendment offered by the gentleman from maryland. those in favor say aye. those opposed, no. in the opinion of the chair, the ayes have it and the the ayes have it and the amendment is agreed to. the chair: for what purpose does -- >> i rise to offer the amendment. the chair: the gentleman will suspend. it is now in order to consider amendment number 23 printed in
3:31 pm
house report 111-410. for what purpose does the gentleman from illinois rise? mr. lipinski: i rise to offer the amendment. the chair: the clerk will designate that amendment. the clerk: amendment number 23 printed in house report 111-410 offered by mr. lipinski of illinois. the chair: purr suents to house resolution 1051, the gentleman from illinois, mr. lipinski, and a member opposed each will control five minutes. the chair now recognizes the gentleman from illinois. mr. lipinski: thank you, mr. chairman. mr. nie's amendment calls -- mr. nye's amendment calls for the recommendations on how the federal government should address the weaknesses. this amendment -- i'm calling on the g.a.o. will help to find those areas that are especially insecure. we certainly have heard enough
3:32 pm
times of where we have seen attacks and attacks come from many different places and there are attacks on many different cybersecurity systems. so i want to thank mr. nye for this amendment and i urge my colleagues to support it and i reserve the balance of my time. the chair: the gentleman reserves. for what purpose does the gentleman from texas rise? mr. mccaul: mr. chairman, i rise to claim time in opposition to this amendment although i am not opposed to it. the chair: without objection, the gentleman will be recognized for up to five minutes. mr. mccaul: thank you, mr. chairman. this amendment would simply ask the general accounting office to examine the current cybersecurity infrastructure and report to congress with recommendations on how to address any failings or weaknesses within the infrastructure and the technology available to do so. therefore i support this amendment and i urge my colleagues to do so and i yield back. the chair: the gentleman yields back. the gentleman from illinois -- does the gentleman from illinois wish to be recognized?
3:33 pm
mr. lipinski: mr. chairman, i yield the balance of my time to the gentleman from virginia, mr. nye. the chair: the gentleman from virginia will be recognized for the balance of the time. nienie i'd like to thank my -- mr. nye: i'd like to thank my colleague for yielding. first i'd like to cha chairman gordon and ranking member hall for their work work on this bill, to improve the cybersecurity and strengthen the partnerships between the federal government and the private sector. cybersecurity is an issue of national security and as we work to defend against the next generation of cyberthreats, the only way to make sure we're getting it right is to find out what we're doing wrong. that's why i've introduced an amendment to require the g.a.o. to conduct a study examining key weaknesses within the current cybersecurity infrastructure along with recommendations on how to address such weaknesses in the future and on the technology that is needed to do so. not only will this benefit federal and private sector efforts to strengthen cybersecurity, it will also help local cities and counties learn
3:34 pm
how to defend themselves against attacks on their networks and infrastructure. in my district in virginia, in the city of hampton, we are doing exactly that. we are creating a regional center of excellence to help local communities improve their cybersecurity. this bill will help that effort and the g.a.o. report called for in my amendment will make it even stronger. i'd like to thank my colleagues for their support, urge the rest of my colleagues to join me in supporting this amendment and in passing this bill and i yield back the balance of my time. thank you. the chair: the gentleman yields back. the question then is on the amendment offered by the gentleman from illinois. those in favor say aye. those opposed, no. in the opinion of the chair, the ayes have interest -- have it and the amendment is agreed to. it is now in order to consider amendment number 24 printed in house report 111-410. for what purpose does the gentleman from -- the chair
3:35 pm
recognizes -- the chair is waiting for the gentleman from new york to seize the microphone. the gentleman from new york is now recognized. wednesday wednesday i have an amendment -- mr. owens: i have an amendment at the desk. the clerk: amendment number 24 offered by mr. owens of new york. the chair: pursuant to house resolution 1051, the gentleman from new york, mr. owens, and a member owe he is -- opposed each will control five minutes. the chair now recognizes the gentleman from new york for up to five minutes. mr. owens: thank you, mr. speaker. i yield myself such time as i may consume. mr. chairman, i first would like to thank chairman gordon and the committee for their work on this important bipartisan legislation. my amendment would expand the cybersecurity strategic r&d plan created under h.r. 4061 by adding a component to address information sharing between federal agencies. information technology has advanced rapidly in the last two decades, benefiting nearly every
3:36 pm
sector of our -- ever sect -- every sector in our economy. h.r. 4061 will help address our vulnerabilities by creating an overall vision for the federal cybersecurity r&d portfolio. improving the coordination of cybersecurity research and development activities is the first step in prehe venting a catastrophic attack -- preventing a catastrophic attack on our i.t. infrastructure. my amendment would improve the strategic r&d plan by including a component. our nation's security is at risk without protections in place to safeguard the flow of information within the federal government. i believe the amendment i'm offering today gets to the heart of addressing this problem and i urge its adoption. with that i reserve the balance of my time. the chair: the gentleman reserves the balance of his time. for what purpose does the gentleman from texas rise wish to be recognized? mr. mccaul: i rise to claim time in opposition to this amendment
3:37 pm
although i am not opposed to it. the chair: the gentleman is recognized for up to five minutes. mr. mccaul: i thank you, mr. chairman. this amendment simply states that technologies to secure sensitive information among federal agencies shall be among the technologies addressed in the interagency cybersecurity r&d plan required by the bill. as i understand it, the gentleman's amendment is referring to information controlled by the federal government that is not classified but is still sensitive and particularly important to protect. this class of information is very substantial in numerous federal agencies including our research and development agencies and i believe it's reasonable and appropriate to consider how best to pursue technologies that may assist in better protecting it without classifying the information outright. so therefore i support the gentleman's amendment. i urge my colleagues to do so and i yield back. the chair: the gentleman yields back. the gentleman from new york. mr. owens: in closing, i want to again thank the chairman, the ranking member and the committee for their work.
3:38 pm
i urge support for my amendment and for the underlying bill and i yield back. the chair: the gentleman yields back. the question then is on the amendment from the gentleman from new york. those in favor say aye. those opposed, no. in the opinion of the chair, the ace have it and the amendment is agreed to. mr. owens: mr. speaker, i request that the yeas and nays be counted. the chair: does the gentleman ask for a recorded vote? mr. owens: yes. the chair: pursuant to clause 6 of rule 18 further proceedings on the amendment then offered by the gentleman from new york will be postponed. it is now in order to consider amendment number 25 printed in house report 111-410. for what purpose does the gentleman from new mexico rise? mr. henrich: i have an amendment at the desk. the chair: the clerk will designate that amendment. the clerk: amendment number 25, printed in house report 111-410 offered by mr. henrich of new mexico. the chair: pursuant to house resolution 1051, the gentleman
3:39 pm
from new mexico and a member opposed each will control five minutes. the chair now recognizes the gentleman from new mexico. mr. mchenry: mr. chairman, -- mr. -- mr. henrich: i want to thank representive dan lipinski and chairman bart gordon for their leadership. we have made some incredible advancements in the use of technology in the 26th century and with much of our nation's public and private commerce taking place on the internet, defending our cyberspace from cybercriminals and cyberterrorism has never been more vital to our national security. in central new mexico there's national laboratories dedicated nearly $20 million to this very cause. it has also created a program to train our future work force by working directly alongside researchers to secure systems and examine attack modes. the national labs is a leader in
3:40 pm
defensive cybersecurity research and development for our nation's intelligence community and has been home to countless high level security advancements. for decades national laboratories across the nation have worked to protect their own data and networks from intrusion. of necessity they have developed expertise in cripping to are aify and sophisticated techniques to thwart cyberattack. this amendment simply includes our national labs as contributing stakeholders to the strategic management plan for cybersecurity research. including our national labs and utilizing their cybersecurity expertise, it's critical to keeping our nation's cyberspace secure and i would urge my colleagues to support this amendment. i reserve the balance of my time. the chair: the gentleman reserves the balance of his time. for what purpose does the gentleman from texas rise? mr. mccaul: mr. chairman, i rise to claim time in opposition to this amendment although i'm not opposed to it.
3:41 pm
the chair: without objection, the gentleman from texas is recognized for up to five minutes. mr. mccaul: let me say, mr. chairman, i believe this is our last amendment and i want to commend the chairman for his perseverance through 25 amendments here today. this amendment simply adds national laboratories to the list of stakeholders that the administration should engage in developing its strategic plan for r&d. i think it's a good idea and i urge support and urge my colleagues to support it and with that i yield back the balance of my time. the chair: the chair applauds the perseverance of the gentleman from texas. the gentleman yields back. the gentleman from new mexico. heenheen i yield to -- mr. heinrich: i yield to my colleague from illinois. the chair: the gentleman from illinois. mr. lipinski: thank you. i'd like to na mr. heinrich for working on this amendment language. we have great work going on in my own backyard at argon national lab on cybersecurity. a lot of great work going on in all of our labs and contributing
3:42 pm
so much behind the scenes and things that we don't see. so i want to thank mr. heinrich for his amendments. i urge my colleagues to support it. but in closing on our last amendment here, i also would like to thank mr. mccaul for all his work. this is the way the amendment people want to see us work -- this is the way the american people want to see us work, work together, democrats and republicans, we work very well together on the science and technology committee. it's an important issue that impacts people in their everyday lives, the amount of time that all of us spend on the internet, the vulnerabilities that are out there, hopefully through this work i know that we can really make things better, make our -- the internet more secure so we have fewer problems with attacks not just on government but on individuals. so, again, i'd like to thank mr.
3:43 pm
mccaul and everyone who's worked together and chairman gordon on this and i would yield to the gentleman from texas. the chair: the gentleman from texas. mr. mccaul: i thank you, mr. chairman, and i want to personally commend you for the authorship of this bill. i was proud to be a lead sponsor of the bill. when it comes to security matters and a lot of science and technology matters we work in a very bipartisan way and, again, i think that's what the american people really want and deserve out of this congress. so i'm glad we saw a little bit of that bipartisanship here today on the house floor and thank you for your leadership. i yield back. the chair: the gentleman from illinois. mr. lipinski: thank you, mr. mccaul, and i urge my colleagues to support this amendment and support the bill and i yield back. the chair: the gentleman yields back. the question is then on the amendment offered by the gentleman from new mexico. those in favor say aye. those opposed, no. in the opinion of the chair, the ace have it and the amendment is agreed to.
3:44 pm
pursuant to clause 6 of rule 18, proceedings will now resume on those amendments printed in house report 111-410 on which further proceedings were postponed in the following order. amendment number 1 by mr. hastings of florida, amendment number 3 by mr. flake of arizona, amendment number 8 by mrs. dahlkemper of pennsylvania, amendment number 14 by mr. cuellar of texas, amendment number 18 by mr. connelly of virginia. the chair will reduce to five minutes the time for any electronic vote after the first vote in this series. the unfinished business is now the request for a recorded vote on amendment number 1 printed in house report 111-410 by the gentleman from florida, mr. hastings on which further proceedings rt -- hastings, on which further proceedings were postponed and on which the ayes very veiled by voice vote.
3:45 pm
the clerk: amendment number 1 offered by mr. hastings of florida. the chair: a recorded vote has been requested. those in support of the request for a recorded vote will rise and be counted. a sufficient number having arisen, a recorded vote is ordered. members will record their votes by electronic device. this will be a 15-minute vote. [captioning made possible by the national captioning institute, inc., in cooperation with the united states house of representatives. any use of the closed-captioned coverage of the house proceedings for political or commercial purposes is expressly prohibited by the u.s. house of representatives.]
3:46 pm
3:47 pm
3:48 pm
3:49 pm
3:50 pm
3:51 pm
3:52 pm
3:53 pm
3:54 pm
3:55 pm
3:56 pm
3:57 pm
3:58 pm
3:59 pm
4:00 pm
4:01 pm
4:02 pm
4:03 pm
4:04 pm
4:05 pm
4:06 pm
4:07 pm
4:08 pm
4:09 pm
4:10 pm
4:11 pm
the speaker pro tempore: on this vote, the yeas are 417, and the nays are five. the amendment is adopted. the unfinished business is the request for a recorded vote on amendment number three printed in house report 111-410 by the gentleman from arizona, mr. flake, on which further proceedings were postponed and on which the ayes prevailed by voice vote. the clerk will redesignate the amendment. the clerk: amendment number three printed in house report 111-410 offered by mr. flake of arizona.
4:12 pm
the speaker pro tempore: a recorded vote has been -- the chair: a recorded vote has been requested. those in support of the request for a recorded vote will rise and be counted. a sufficient number having risen, a recorded vote is ordered. members will record their votes by electronic device. this is a five-minute vote. [captioning made possible by the national captioning institute, inc., in cooperation with the united states house of representatives. any use of the closed-captioned coverage of the house proceedings for political or commercial purposes is expressly prohibited by the u.s. house of representatives.]
4:13 pm
4:14 pm
4:15 pm
4:16 pm
4:17 pm
4:18 pm
4:19 pm
4:20 pm
the chair: on this vote, the yeas are 399 and the nays are --
4:21 pm
the chair: on this vote, the yeas are --
4:22 pm
the chair: on this vote, the yeas are 396 and the nays are 31. the amendment is adopted. the unfinished siness is the request for a recorded vote on amendment number 8 printed in house report 111-210 by the
4:23 pm
gentlewoman from pennsylvania, mrs. dahlkemper, on which further proceedings were postponed and on which the yeas prevailed by voice vote. the clerk will redesignate the amendment. the clerk: amendment number 8 printed in house report 111-410, offered by mrs. dahlkemper of pennsylvania. the chair: a recorded vote has been requested. those in support of the request for a recorded vote will rise and be counted. a sufficient number having arisen, a recorded vote is ordered. members will record their votes by electronic device. this is a five-minute vote. [captioning made possible by the national captioning institute, inc., in cooperation with the united states house of representatives. any use of the closed-captioned coverage of the house proceedings for political or commercial purposes is expressly prohibited by the u.s. house of representatives.]
4:24 pm
4:25 pm
4:26 pm
4:27 pm
4:28 pm
4:29 pm
4:30 pm
4:31 pm
the chair: on this vote, the yeas are 419 and the nays are three. the amendment is adopted. the unfinished business is the request for a recorded vote on amendment number 14, printed in house report 111-410 by the gentleman from texas, mr. cuellar, on which further proceedings were postponed and on which the ayes prevailed by voice vote. the clerk will redesignate the amendment. the clerk: amendment number 14 printed in house report 111-410, offered by mr. cuellar of texas. the chair: a recorded vote has been requested. those in support of a request for a recorded vote will rise and be counted. a sufficient number having risen, the recorded vote is ordered. members will record their votes by electronic device. this will be a five-minute vote.
4:32 pm
[captioning made possible by the national captioning institute, inc., in cooperation with the united states house of representatives. any use of the closed-captioned coverage of the house proceedings for political or commercial purposes is expressly prohibited by the u.s. house of representatives.]
4:33 pm
4:34 pm
4:35 pm
4:36 pm
4:37 pm
4:38 pm
the chair: on this vote, the yeas are 416 and the nays are four. the amendment is adopted. the unfinished business is the request for a recorded vote on amendment number 18 printed in house report 111-410 by the gentleman from virginia, mr. connolly, on which further proceedings were postponed and on which the ayes prevailed by voice vote. the clerk will redesignate the amendment. the clerk: amendment number 18, printed in house report 111-410, offered by mr. connolly of virginia. the chair: a recorded vote has been requested. those in support of the request for a recorded vote will rise and be counted. a sufficient number having risen, the recorded vote is
4:39 pm
ordered. members will record their votes by electronic device. this will be a five-minute vote. [captioning made possible by the national captioning institute, inc., in cooperation with the united states house of representatives. any use of the closed-captioned coverage of the house proceedings for political or commercial purposes is expressly prohibited by the u.s. house of representatives.]
4:40 pm
4:41 pm
4:42 pm
4:43 pm
4:44 pm
4:45 pm
4:46 pm
the chair: on this vote, the yeas are 417d the nays are four. the amendment is adopted. for what purpose does the gentleman from massachusetts rise? >> mr. speaker, i move that the committee do now rise. the chair: the question is on the motion that the committee rise. those in favor say aye. those opposed, no. the aste have it. the motion is adopted. accordingly, the committee rises. the speaker pro tempore: the chair of the committee of the whole house on the state of the union reports that the committee
4:47 pm
has had under consideration h.r. 4061 and has come to know resolution thereon. for what purpose does the gentleman from massachusetts rise? mr. mcgovern: mr. speaker, i send to the desk a privileged report from the committee on rules for filing under the rule. the speaker pro tempore: the clerk will report the title. the clerk: report to accompany house resolution 1065 providing for consideration of the senate resolution house joint resolution 45 and increasing the statutory limit on the public debt. the speaker pro tempore: referred to the house calendar and ordered printed.
4:48 pm
the speaker pro tempore: the house will come to order. all conversations be taken from the well, please. remove all conversations from the chamber, please. come to order. remove all conversations, please. please come to order. for what purpose does the
4:49 pm
gentlelady from arizona rise? ms. giffords: address the house for one minute. ms. giffords: i rise today to commemorate the legacy of a former member of congress congressman jim kolbe. we honor him with the passage of h.r. 4495 to rename his hometown post office at 100 north lane in patagonia, arizona. he began as a page for senator barry goldwater. this experience would have a lasting impact on his appreciation of the virtue of public service resulting in a long and distinguished career to cultivate a better arizona and a better nation. he spent his life in service in the united states navy, arizona state legislature and united states congress and arizona 5th and 8th congressional district. as our hometown newspaper noted upon his retirement in december
4:50 pm
of 2006, he earned a reputation as a moderate in a partisan world, a voice working from the center. congressman kolbe did not work from a predetermined list of party positions and worked to unite his colleagues and find solutions from increased economic opportunity through trade to environmental conservation. the speaker pro tempore: wot -- would the lady yield, please. remove all conversations from the house chamber. the gentlelady may proceed. ms. giffords: mr. speaker, i ask my colleagues to join with me in honoring this great figure, a man who served our community in arizona, who served our nation, congressman jim kolbe, a true statesman and a beloved public figure. thank you. the speaker pro tempore: does the majority leader wish to
4:51 pm
address the house? mr. hoyer: i ask unanimous consent to speak out of order for one minute. i know this is unusual because we are in one-minutes. i tell the gentlelady from arizona, ms. giffords, i had not heard of the death of my friend and colleague -- you are naming a post office -- i withdraw my request. the speaker pro tempore: for what purpose does the gentlelady from florida rise? ms. ros-lehtinen: revise and extend my remarks. the speaker pro tempore: remove all conversations, please. we need order. the gentlelady from florida, please resume. ms. ros-lehtinen: i rise today to applaud the outstanding work and selfless commitment of mr.
4:52 pm
bonnis, field office director in port-au-prince for u.s. immigration services and has gone above and beyond the call of duty in the weeks since the horrific earthquake that devastated haiti on january 12, working around the clock, he has helped the process hundreds of adoption cases, helping to unite american families with their haitian children in the aftermath of this tragic disaster, he is a hero. because of his tireless efforts and compassion, many of the most vulnerable children in haiti are able to look toward a much brighter future. i'm inspired by the selfless dedication and again mr. bonnis and the employees of the u.s. citizenship and immigration services for their extraordinary service in helping haitian children. thank you, mr. speaker.
4:53 pm
the speaker pro tempore: for what purpose does gentleman rise? >> permission to address the house for one minute. the speaker pro tempore: without objection. >> mr. speaker, they say only the good die young. i don't know if only the good die young, but i do know one of my constituents was a very good man and antonio died much too young. everyone knows everyone and no one who lives there. some people have an impact on the community that is our size and makes absence of greater significance. antonio absence is felt as an officer of public safety and someone involved with youth and adult sports most of all he was
4:54 pm
there to give a hand to friends and neighbors in need. antonio, mr. speaker, he was a good man and died too young and we all will miss him. thank you, mr. speaker. i yield back. the speaker pro tempore: are there further requests for one-minutes? for what purpose does the gentleman from ohio rise? >> address the house for one minute. the speaker pro tempore: without objection. >> i rise today in recognition of the three million young americans who courageously fight juvenile diabetes every day. i met three brave children from my district, andrew butterworth, megan jordan and gitano and each day 40 children are diagnosed with diabetes in the united states. the price to maintain treatment can cost thousands of dollars
4:55 pm
per year while insulin doesn't keep that person alive and doesn't prevent blipedness and heart attacks. megan gave me a notebook with pictures and descriptions of enjoying her life to the fullest in spite of her condition and she writes, having diabetes is emotionally hard. i check my blood sugars five times a day and give myself four shots a day. i miss my grandfather who passed away. remember me and help us find a cure. we owe it to them to fight hard to make sure that juvenile diabetes and other tremendous diseases that affect our children are looked at, fought and make sure we end them in a timely fashion. thank you, mr. speaker, i yield back my time. the speaker pro tempore: for what purpose does the gentleman from texas rise? mr. poe: mr. speaker, i ask unanimous consent that today following legislative business
4:56 pm
and any special orders heretofore entered into, the following members may be permitted to address this house, revise and extend their remarks and include extraneous materials. mr. reichert for today. myself, mr. poe for february 10, mr. jones for february 10. mr. gingrey for today. mr. cassidy for february 9. ms. ros-lehtinen and mr. gohmert today, mr. broun, mr. moran, mr. baum man today. mr. shimkus february 9. the speaker pro tempore: without objection. for what purpose does the gentleman from illinois rise? mr. quigley: i ask unanimous consent that today following legislative business and any special orders heretofore entered into the following members may be permitted to address the house for five minutes revise and extend their remarks and include therein extraneous material, ms. woolsey, mr. defazio, mr. sestak, mr. kaptur and of
4:57 pm
course, mr. quigley. the speaker pro tempore: without objection. under the speaker's announced policy of january 6, 2009 and under a previous order of the house, the following members are recognized for five minutes each. ms. woolsey from california. mr. deal from georgia. mr. defazio from oregon. mr. poe from texas. the gentleman is recognized for five minutes. mr. poe: thank you, mr. speaker. they called it the war to end all wars. four million 700,000 americans
4:58 pm
went over there to europe in the great world war i. 116,000 of them never came home. many more when they arrived back in the united states in 1918, thousands of them died from the flu that they had contracted in france. they called them dough boys because of the look of their uniform and one such person was an individual by the name of frank buckles. frank buckles lied to get into the united states army. he was 16. and he went from recruiter to recruiter to recruiter and finally convinced somebody he was 21. got into the united states army. went over there with the dough boys to end the war to end all wars, he drove an ambulance and rescued other americans. he said, we were typical cocky americans. no one wanted us roovend until the french and british needed
4:59 pm
some help winning that war. and 19 months after the first yanks arrived, the guns fell silent. yes, that war ended on november 11, 1918. but that wasn't all for frank buckles. after he was discharged from the united states army in 1918, he found himself in a place called the fill peens on december -- phillip evens and frank buckles was captured by the japanese and next 39 months he was held as a prisoner of war in a japanese concentration camp and finally freed on february 23, 1945, the day the japanese had the house will be in order.ed his execution. frank buckles is the last surviving dough boy from world war i. monday, he was 109 years old. he lives not far from here. until he was 10

162 Views

info Stream Only

Uploaded by TV Archive on