Skip to main content

tv   House Session  CSPAN  April 23, 2015 9:00am-12:01pm EDT

9:00 am
immigrants i think it is making sure that if you come into this country as an immigrant, you can prove that you are working hard, you are going to pay taxes the way you do, and you also will become an american citizen host: i want to thank the congressman for joining us. we are going to take our viewers live to the house floor with a house is about to gavel in for the day. that confirmation vote on loretta lynch could take place as early as 2:00 p.m. this afternoon. even watch all of the action on that confirmation -- you can watch all the action on the confirmation on c-span 2. [captioning made possible by the national captioning institute, inc., in cooperation with the united states house of representatives. any use of the closed-captioned coverage of the house proceedings for political or commercial purposes is expressly prohibited by the u.s. house of representatives.]
9:01 am
the speaker pro tempore: the house will be in order. the chair lays before the house a communication from the speaker. the clerk: the speaker's room, washington, d.c., april 23 2015. i hereby appoint the honorable rob woodall to act as speaker pro tempore on this day. signed, john a. bane he shall, speaker of the house of representatives. -- boehner, speaker of the house of representatives. the speaker pro tempore: the prayer will be offered by the guest chaplain, reverend ribble, dunmar pennsylvania. the chaplain: we come today knowing that you are worthy of all worship. we declare that you are the creator and sustainer of all things and the one who provides the means of forgiveness of mankind. we, your created beings are your stewards. father, we thank you that you allow us to live into a nation that is able to worship you. give them the ability to
9:02 am
discern the times in which we see and to see the consequences of their actions. guide them in making decisions that is best. bring new spiritual awakening. father, cause your face to shine upon our nation and give us peace. in jesus name we pray, amen. the speaker pro tempore: the chair has examined the journal of the last day's proceedings and announces to the house his approval thereof. pursuant to clause 1 of rule 1 the journal stands approved. the prayer this morning will be led by the gentlewoman from florida, ms. wasserman schultz. ms. wasserman schultz: i pledge allegiance to the flag of the united states of america and to the republic for which it stands, one nation under god, indivisible, with liberty and justice for all. the speaker pro tempore: without objection, the gentleman from wisconsin is recognized for one minute. >> thank you mr. speaker.
9:03 am
it's my honor this morning to welcome as our guest chaplain, my brother pastor terry ribble. it's no surprise to find terry in the full-time ministry. mr. grothman: terry left hope at the age of 18 to go into foreign missions. mr. ribble: he spent his entire life in full-time pastorial service. no one that's known his family -- today, terry is the senior pastor at the grace baptist church in dunmore, pennsylvania he has the intellect and he reaches out to the less fortunate, the sick and the hungry. improving the lives with whom they touch. they enrich their communities and i've watched terry to do all these things.
9:04 am
i'm proud of him and his work and thank him for his service today. with that, mr. speaker, i yield back. the speaker pro tempore: the gentleman yields back. the chair will entertain up to five one-minute speeches on each side of the aisle. for what purpose does the gentleman from tennessee rise? mrs. blackburn: to address the house for one minute and to revise and extend my remarks. the speaker pro tempore: the gentlelady is recognized for one minute. mrs. blackburn: i'm glad we're talking about doing good things for the american people and today i rise to recognize and pay tribute to the general federation of women's clubs. tomorrow, april 24, is recognized as federation day. and it is the 125th anniversary of the women's club federation. this organization has such an interesting beginning. jane crowley, who was a journalist was denied attendance at a dinner in new york to honor charles dickens and it was denied because of her gender so she got busy with
9:05 am
that and she organized a women's club convention and on april 24, 1890, 63 clubs around the country came together to form the federation to focus on helping our communities. they have over 90,000 members and last year did 100,000 different community service projects with 4.5 million volunteer hours. they're coming to tennessee in june for their convention. we look forward to welcoming them and celebrating doing good for other people. i yield back. the speaker pro tempore: for what purpose does the gentlelady from florida seek recognition? ms. wasserman schultz: i ask unanimous consent to address the house for one minute and to revise and extend my remarks. the speaker pro tempore: the gentlelady is recognized for one minute. ms. wasserman schultz: thank you, mr. speaker. i rise to commend the senate's action today on the justice for victims of trafficking act and
9:06 am
urge the house leadership to bring this up for final passage. the measures included will provide survivors of human trafficking the desperately needed resources to recover, rebuild their lives and put traffickers behind bars. i'm thrilled this package of bills has three pieces of legislation, including the hero act, which trains wounded military veterans to aid law enforcement in investigating child exploitation. the rape survivor child custody act which encourages states to allow a woman to terminate the parental rights of a rapist. and my friend representative ellmers' bill, to train health providers. victims have waited long enough. they need help housing and legal services now. they need civil protections now. i urge the house to bring the justice for victims of trafficking act up to a vote without delay. i yield back the balance of my time. the speaker pro tempore: the gentlelady yields back. for what purpose does the gentleman from georgia seek recognition?
9:07 am
>> to address the house for one minute and to revise and extend my remarks. the speaker pro tempore: without objection the gentleman is recognized for one minute. >> thank you, mr. speaker. i rise today to honor and remember two great civil servants from the great state of georgia who passed away this week. pete wheeler, and former state representative and transportation board member jay shaw. mr. wheeler served in the georgia army national guard, retiring as brigadier service and got the medals of the silver and gold medals of merits. he advocated on behalf of veterans in georgia. mr. wheeler served as v.a. commissioner for 61 years and if you couldn't get it done any other way you just called pete. mr. shaw served as mayor of lakeland for 10 years. he also served in the georgia house of representatives supporting improvements to the transportation system in georgia. mr. shaw was an active member of the georgia state transportation board and served as chairman in the past.
9:08 am
these two georgians did so much for our great state and i offer my condolences to their family and friends and would like to thank them for their service. the speaker pro tempore: the gentleman yields back. for what purpose does the gentlelady from texas seek recognition? without objection, the gentlelady is recognized for one minute. ms. jackson lee: this morning we will be addressing the issue of cybersecurity, one of the responsibilities of the homeland security department and the homeland security committee. in a briefing, many of us had the opportunity to hear a number of challenging and difficult representations regarding the gilocopter. let me say that responsibility of this nation and this government is to protect its citizens and i'm appalled at what seems to be the inability
9:09 am
or the inaction of certain agencies. i stand today on the floor of the house to say it is intolerable and unacceptable when tourists and americans come to their capital. i want them to expect the highest grade of security for their families, for their peace of mind. when the commander in chief resides in washington, d.c., that commander in chief has the right to have the highest degree of security. and so i'd ask, mr. speaker, that we immediately demand for a response from the appropriate agencies and that nothing of this kind happens ever again. i yield back. the speaker pro tempore: for what purpose does the gentleman from kentucky seek recognition? >> i request unanimous consent to address the house for one minute. the speaker pro tempore: without objection, the gentleman from kentucky is recognized for one minute. >> mr. speaker, i rise today to recognize and congratulate students from highlands high
9:10 am
school in fort thomas kentucky. these hardworking students in my district recently won the we the people state level competition and will represent the state of kentucky in the national competition this weekend in washington, d.c. the we the people program is a project from the center of civic education. it shows constitutional history and government and to give students a foundation in civics education that will prepare them to be future effective leaders. the program sponsors student debates and discussions of issues such as the similarities between the united states congress and the british parliament. the differences between the constitution and the articles of confederation and the merits of the anti-federalist arguments versus those of the federalists. i'm proud of these students' hard work and dedication. i wish them all the best in their competition this weekend and in all of their future endeavors. i yield back. the speaker pro tempore: the gentleman yields back. for what purpose does the
9:11 am
gentleman from illinois seek recognition? >> mr. speaker, i ask unanimous consent to address the house for one minute and to revise and extend my remarks. the speaker pro tempore: without objection, the gentleman is recognized for one minute. >> thank you mr. speaker. as i stand before you today it's with heavy heart that i think back to the events and atrocities that began 100 years ago. this week millions of us will gather around the world to mark the centennial of the armenian genocide. i stand to recognize the 1.9 million ar men yens who perished. the armenian genocide has left an indelible mark on all of us. unfortunately, turkey, the successor to the ottoman empire has never accepted responsibility for these atrocities. instead, turkey continues to hide behind the bullying tactics that conceal violations of human rights. as a world leader and as a country that recognizes freedom and justice for all we need to work to change the policies that ignore the actions of the ottoman empire against the people of armenia.
9:12 am
the continued campaign of denial sets a dangerous precedent that makes future atrocities and genocides more likely. as a greatest force for human dignity, the united states is long overdue to stand with the armenian people. mr. dold: we cannot continue to play politics. it's important that ated mferings will not follow in the footsteps of more world leaders. germany, austria and the vatican recognized this genocide on its 100th anniversary. i yield back. the speaker pro tempore: the gentleman's time has expired. for what purpose does the gentleman from pennsylvania seek recognition? mr. thompson: mr. speaker, request unanimous consent to address the house for one minute and to revise and extend. the speaker pro tempore: without objection, the gentleman is recognized for one minute. mr. thompson: mr. speaker, during a time when our digital world is so unsecure, new policies are needed to help defend against cyberattacks. the attacks against sony pictures, target and anthem were just a few of the most recent examples. according to report released by the centers for strategic and
9:13 am
international studies, cybercrimes in 2013 cost more than $100 billion in the united states and roughly half a trillion globally. mr. speaker, congress needs to resolve these problems by working together to improve our nation's cyberdefenses rather than having president obama try to solve the problem one executive order at a time and that is exactly what the house is doing this week. determined to protect the american people from future cyberattacks, last night the house passed one bipartisan bill and will vote on another today that seek to balance security while protecting privacy. mr. speaker, after years of inaction, the white house has indicated it is willing to work with congress on this issue, signaling we may finally put the policies in place that are necessary to protect our digital world in the 21st century. thank you, mr. speaker. i yield back the balance of my time. the speaker pro tempore: the gentleman yields back.
9:14 am
9:15 am
the speaker pro tempore: for what purpose does the gentleman from texas rise? >> mr. speaker, i ask unanimous consent that mifes -- that all members may have five legislative days to revise and extend their remarks and include extraneous material on the bill h.r. 1731. the speaker pro tempore: without objection. pursuant to house resolution 212 and rule 18, the chair declares the house in the committee of the whole house on the state of the union for the consideration of h.r. 1731.
quote
9:16 am
the chair appoints the gentleman from georgia, mr. woodall, to preside over the committee of the whole. the chair: the house is in the committee of the whole on the state of the union for the consideration of h.r. 1731 which the clerk will report by title. the clerk: to amend homeland security act of 2002 to enhance multidirectional sharing of information related to cybersecurity risk and strengthen privacy and civil liberties protections, and for other purposes. the chair: pursuant to the rule the bill is considered as read the first time. the gentleman from texas, will control 30 minutes. the chair recognizes the gentleman from texas. mr. mccaul: thank you mr. speaker. i yield myself such time as i may consume. the chair: the gentleman is recognized. mr. mccaul: i'm pleased to bring to the floor h.r. 1731, the national cybersecurity
9:17 am
protection act -- advancement act, a pro-privacy, pro-security bill that we desperately need to safeguard our digital networks. the i'd like to commend subcommittee chairman, mr. ratcliffe, for his work on this bill. as well as our minority counterparts, including ranking member thompson and subcommittee ranking member richmond for their joint work on this bill. this has been a noteworthy, bipartisan effort. i would also like to thank house intelligence committee chairman devin nunes and ranking member adam schiff for their input and collaboration. lastly i'd like to thank the judiciary committee, chairman goodlatte and ranking member conyers, for their contribution. make no mistake, we are in the middle of a silent crisis. at this very moment our nation's businesses are being robbed and sensitive government information is being stolen. we are under siege by a faceless enemy whose tracks are covered
9:18 am
in cyberspace. sophisticated breaches at companies like anthem, target neiman-marcus home depot, and j.p. morgan have compromised the personal information of millions of private citizens. nation states like iran and north korea have launched digital bonds to get revenge at u.s. based companies, while others like china are steal intellectual property. we recently witnessed brazen cyberassaults against the white house and the state department which puts sensitive government information at risk. in the meantime our adversaries have been developing the tools to shut down everything from power grids to water systems so they can cripple our economy and weaken our ability to defend the united states. this bill will allow us to turn the tide against our enemies and ramp up our defenses by allowing for greater cyberthreat
9:19 am
information sharing. this bill will strengthen the department of homeland security's national cybersecurity and communications integration center. the nccic is a primary civilian interface for exchanging cyberthreat information. fundraise good reason. it is not a cyberregulator. it is not looking to prosecute anyone. and it is not military or a spy agency. its sole purpose is to prevent and respond to cyberattacks against our public and private networks while aggressively protecting americans' prifecy. right now we are in a 9/11 -- pre-9/11 moment in cyberspace. in the same way legal barriers and turf wars kept us from connecting the dots before 9/11 the lack of cyberthreat information sharing makes us as vulnerable to an attack.
9:20 am
companies are afraid to share because they do not feel they have the adequate legal protection to do so. h.r. 1731 removes those legal barriers and creates a safe harbor which will encourage companies to voluntarily exchange information about attacks against their networks. this will allow both the government and private sector to spot digital attacks earlier and keep malicious actors outside of our networks and away from information that americans expect to be defended. this bill also puts privacy and civil liberties first. it requires that personal information of our citizens be protected before it changes hands. whether it is provided to the government or exchanged between companies, so private citizens do not have their sensitive data exposed.
9:21 am
significantly, both industry and privacy groups have announced their support for this legislation because they recognize that we need to work together urgently to combat the cyberthreat to this country. today we have a dangerously incomplete picture of the online war being waged against us, and it is costing americans their time, money, and jobs. the it is time for us to safeguard our digital frontier. this legislation is a necessary and vital step to do exactly that. mr. chairman, before i reserve the balance of my time, i would like to enter into the record an exchange of letters between the chairman of the committee on judiciary, mr. goodlatte and myself, recognizing the jurisdictional interest of the judiciary committee in h.r. 1731. the chair: the gentleman's request will be covered under general leave. mr. mccaul: with that, i urge my colleagues to support the legislation and i reserve the balance of my time.
9:22 am
the chair: the gentleman reserves. for what purpose does the gentleman from mississippi seek recognition? mr. thompson: mr. chairman, i rise in support of h.r. 1731, the national cybersecurity protection advancement act of 2015 and i yield myself such time as i may consume. the chair: the gentleman is recognized. mr. thompson: thank you, mr. chairman. every day u.s. networks face hundreds of millions of cyberhacking attempts and attacks. many of these attacks target large corporations and negatively impact consumers. they are launched by common hackers as well as nation states. as the sony attack last year demonstrated, they have a great potential for harm and put our economy and homeland security at risk. last week, it was reported that attacks against datea, industrial control systems, rose 100% between 2013 and 2014.
9:23 am
given that those systems are essential to running our power plants factories and refineries, this is a very troubling trend. just yesterday we learned about an advance persistent threat that has targeted high-profile individuals at the white house and state department since last year. according to an industry expert, these cyberthreat nicknamed cozy duke includes malware, information stealing programs, and anti-virus back doors that bear the hallmarks of russian cyberespionage tools. mr. chairman cyberterrorists and cybercriminals are constantly innovating. their success is dependent on the victims not being vigilant and protecting their systems. cyberterrorists and cybercriminals exploit bad practices like opening attachments and clicking links
9:24 am
from unknown senders. that is why i'm pleased that h.r. 1731 includes the provision authored by representative watson coleman to authorize a national cyberpublic awareness campaign to promote greater cyberhygiene. another key element of cybersecurity is of course information sharing about cyberthreats. we have seen that when companies come forward and share their knowledge about imminent cyberthreats timely actions can be taken to prevent damage to vital i.t. networks. thus cybersecurity is one of those places where the old adage, knowledge is power, applies. that is why i'm pleased h.r. 1731 authorizes private companies to voluntarily share timely cyberthreat information and malware with d.h.s. or other
9:25 am
impacted companies. under h.r. 1731 companies may voluntarily choose to share threat information to prevent future attacks to other systems. i'm also pleased that the bill authorizes companies to monitor their own i.t. networks to identify penetrations and take steps to protect their networks from cyberthreats. h.r. 1731 builds on bipartisan legislation enacted last year that authorized the department of homeland security's national cybersecurity and communications integration center, or commonly referred to as nccic. h.r. 1731 was unanimously approved by the committee last week, and represents months of outreach to a diverse array of stakeholders from the private sector and the privacy community. importantly, h.r. 1731 requires
9:26 am
participating companies to make reasonable efforts prior to sharing to scrub the data to remove information that could identify a person, when that person is not believed to be related to the threat. h.r. 1731 also directs d.h.s. to scrub the data it receives and add an additional layer of privacy protection. additionally, it requires the nccic to have strong procedures for protecting privacy and calls for robust oversight by the department's chief privacy officer it's chief civil rights and civil liberties officer, and inspector general, and the privacy and civil liberties oversight board. i'm a co-sponsor of h.r. 1731, but as the white house observed earlier this week, improvements are needed to ensure that it's liability protections are
9:27 am
appropriately targeted. in its current form, it would potentially protect companies that are neglect in how they carry out authorize the activities under the act. mr. chairman, before reserving the balance of my time, i wish to engage in a colloquy with the gentleman from texas, mr. mccaul regarding the liability protection provisions of 187 -- 1731. at the outset, i'd like to express my appreciation for the gentleman's willingness to work with me and the other democrats on the committee to develop this bipartisan legislation. we have a shared goal of bolstering cybersecurity and improving the quality of information that the private sector receives about timely cyberthreats so that they can act to protect their networks and the valuable data stored on them. therefore it is concerning that the liability protection
9:28 am
provisions appears to undermine this shared goal insofar as it includes language that on its face incentivizes companies to do nothing about actionable cyberinformation. specifically, and speaking of the language on page 36, line 18, that extends liability protections to a company that fails to act on timely threat information, provided by d.h.s. or another impacted company. i yield to the gentleman from texas to ask that he would work with me to clarify the language as it moves through the legislative process to underscore that it is not congress' intent to promote inaction by companies who have timely threat information. mr. mccaul: i thank the gentleman from mississippi for his question and would say that i do not completely share your view.
9:29 am
i assure you incentivizing companies to do nothing with timely threat information is certainly not the intent of this provision as the author of this bill. on the contrary, i believe it is important that we provide companies with legal safe harbors to encourage sharing of cyberthreat information and also believe that every company that participates in this information sharing process, especially small and medium-sized business can not be required to act upon every piece of cyberthreat information they receive. and as such support looking for ways to clarify that point with you. mr. thompson. i commit to working with you as this bill moves forward to look for ways to refine the language to ensure that it is consistent with our shared policy goal of getting timely information into the hands of businesses so that they can protect their networks and their data. i yield back to the gentleman. mr. thompson: thank you, mr.
9:30 am
chairman. with that, mr. speaker i ro i reserve the balance of my time. . the chair: the gentleman from mississippi reserves. gentleman from texas is recognized. mr. mccaul: thank you, mr. chairman. i now yield five minutes to the gentleman from texas, the chairman of the subcommittee on cybersecurity and my close ally and colleague on this legislation mr. ratcliffe. the chair: the gentleman from texas is recognized for five minutes. . mr. ratcliffe: mr. speaker, i'm grateful to work with chairman mccaul. i'd like to thank ranking members richard and thompson for their -- richmond and thompson for their hard work on this issue and the committee staff who worked hard to bring this important bill to the floor today. the private sector has been on the front lines in guarding against devastating
9:31 am
cyberattacks. one of the largest health insurance providers, anthem, suffered a devastating cyberattack that compromised the personal information and health records of more than 80 million americans. the consequences of that breach hit home for many of those americans just a week ago. on tax day when thousands of them tried to file their tax returns only to see them be rejected because cybercriminals had used their information to file false tax returns. mr. speaker, a tax like these serve as a wake-up call to all americans and provide clear evidence that our cyberadversaries have the upper hand. the consequences will get even worse if we fail to tackle this issue head on because even greater and more frightening things exist one that supports our very way of life. i'm talking about cyberattacks against the networks which control our bridges, our dams, our power grids, rails even
9:32 am
our water supply. attacks on this critical infrastructure has the potential to produce sustained blackouts, halt air traffic, shut off fuel supplies or even worse contaminate the air, food and water that we need to survive. these scenarios paint a picture of economic crisis and physical chaos that are unfortunately all too real and all too possible right now. mr. speaker, 85% of our nation's critical infrastructure is controlled by the private sector, not by the government, a fact which underscores the reality that america's security when it comes to defending against cyberattacks, largely depends on the security of our private networks. and the simple truth is that many in the private sector can't defend their networks or our critical infrastructure against these threats. h.r. 1731 provides a solution for the rapid sharing of important cyberthreat
9:33 am
information to minimize or in some cases prevent the cyberattacks from being successful. through the department of homeland security national cybersecurity communication and integration center, this bill will facilitate the sharing of cyberthreat indicators between the private sector entities and between the private sector and the federal government with carefully crafted tools, they would be able to share cyberthreat indicators with their private sector counterparts without fear of liability. the sharing of these indicators or more specifically the tools techniques and tactics used by cyberintruders will arm those who protect our networks with the valuable information they need to for theify our defenses against future cyberattacks. because some have said the prior approach -- proposals didn't go far enough in safeguarding personal privacy, this bill addresses those concerns with robust privacy measures that ensures the
9:34 am
protection of americans' personal information and private data. h.r. 1731 will provide protection only for sharing that's done voluntarily through the department of homeland security's ncic, which is a civilian entity. it does not provide for or allow sharing with the n.s.a. or the department of defense. in fact, this bill expressly prohibits information from being used for surveillance purposes. this bill limits the type of information that can be shared and requires the removal of all personally identifiable information which is scrubbed out before the cyberindicators can be shared. in short, this bill improves and increases protection for the personal privacy of americans which currently remains so vulnerable to malicious attacks from our cyber adversaries. mr. speaker the status quo isn't working when it comes to defending against cyberthreats. the need to bet remember secure
9:35 am
americans' personal information and better protect and safeguard our critical infrastructure is precisely what compels congressional action right now. i strongly endorse the passage of this vital legislation, and i urge my colleagues on both sides of the aisle to support it as well. i thank the gentleman from california for his leadership and i yield back. the chair: the gentleman from texas, mr. ratcliff, yields back. the gentleman from texas, mr. mccaul, reserves. the gentleman from mississippi is recognized. mr. thompson: thank you mr. speaker. mr. speaker, i yield three minutes to the gentleman from rhode island mr. langevin. the chair: the gentleman from rhode island is recognized for three minutes. mr. langevin: i ask unanimous consent to revise and extend my remarks. the chair: without objection. mr. langevin: i thank the gentleman for yielding, and mr. chairman, i'm very pleased to be back on the floor today to support the house's second major piece of cybersecurity legislation in less than 24 hours. as i said yesterday afternoon it's been a long time coming for sure but cybersecurity has
9:36 am
been a passion of mine for nearly a decade. i'm absolutely thrilled that after years of hard work the house, the senate and the president finally are beginning to see eye to eye. the national cybersecurity protection advancement act has at its core three basic authorizations. first it authorizes private entities and the d.h.s.'s ncic to share the cybersecurity -- for cybersecurity only those that have been stripped. second, it allows businesses to monitor their networks in search of cybersecurity risks and third, it authorizes companies to deploy limited defenses measures to protect their systems from malicious actors. now those three authorizations perfectly describe the information sharing regime we so debts pretty need. companies under the act will collection information on threats, share it with their pierce and with the civilian portal and then use the -- peers and with the civilian
9:37 am
portal and then use it to help themselves. information before they're shared and after they're received, companies are offered limited liability protections for sharing information they gather in accordance with this bill. this legislation also provides for the deployment of rapid automaticed sharing protocols, something d.h.s. has been hard at work with two other programs and expands last year's authorization. mr. chairman, i do believe that the liability protections protections contained in this bill may prove overly broad and i certainly hope we can address that point as the legislative process continues. particularly hopefully when we get to a conference committee on this issue. overall, it's a fine piece of legislation and i wholeheartedly congratulate chairman mccaul, ranking member thompson, subcommittee chairman ratcliff and ranking member richmond as well as the other members of the committee and especially the committee staff for a job well done.
9:38 am
information sharing legislation, mr. chairman, is not a silver bullet by any means but it will substantially improve our nation's cyberdefenses and get us to a place where our nation is much more secure in cyberspace than where we are today. protecting critical infrastructure of course, is among our chief concerns and that will allow the type of information sharing that will get us to a much more secure place. so mr. chairman, i urge my colleagues to support this bill and i hope that the senate will quickly follow suit. thank you and i yield back the balance of my time. the chair: the gentleman from rhode island yields back. the gentleman from mississippi reserves. the gentleman from texas is recognized. mr. mccaul: thank you, mr. chairman. i now yield as much time as she may consume, the gentlelady, the vice chairman of the homeland security committee from michigan, mrs. miller. the chair: the gen
9:39 am
9:40 am
best way -- the best way to combat these threats is to first recognize a threat and to combine private and government resources and intelligence and, mr. speaker, that's exactly what this bill does. mr. speaker, i think this bill will help to facilitate greater cooperation and efforts to protect our nation's digital
9:41 am
information, including power grids and utilities and other services and by removing barriers which will allow private companies to voluntarily -- voluntarily share their cybersecurity threat information with the department of homeland security and other companies i think we will in a very large way improve earlier detection and mitigation of potential threats. additionally, this legislation that we're debating on the floor today ensures that personal identityification information is removed -- identification information is removed prior to information and safeguards are put in place for civil liberties. mr. speaker, i point that out because that's something that was discussed a lot by practically every member by the homeland security committee. we were all united on that issue and i think it's a critical important point to make and is reflected in this legislation.
9:42 am
as mr. ratcliff mentioned just earlier, 85% -- 85% of america's critical infrastructure is owned and operated by the private sector. if you think about that, 85%, which means that cyberthreats pose as much of an economic threat to the united states as they do to our security, and we have a constitutional responsibility, as i pointed out in the beginning, a constitutional responsibility to protect ourselves, protect our nation, to protect our american citizens from this ever-evolving threat. and so, mr. speaker, i would urge that all of my colleagues join me, join all of us on our kentucky in voting in favor of this -- join us on voting in favor of this bill. i yield back. the chair: the gentlelady from michigan yields back. the gentleman from texas reserves. the committee will now rise informally to receive a message.
9:43 am
the speaker pro tempore: the house will be in order. the chair will receive a message. the messenger: mr. speaker, a message from the senate. the secretary: mr. speaker. the speaker pro tempore: madam secretary. the secretary: i have been directed by the senate to inform the house that the senate has passed s. 178, an act to provide justice for the victims of trafficking, in which the concurrence of the house is requested. the speaker pro tempore: the committee will resume its sitting. the chair: the committee will be in order. the gentleman from mississippi is recognized. mr. thompson: thank you, mr. speaker. mr. speaker, i yield two minutes to the gentleman from virginia mr. connolly. the chair: the gentleman from virginia is recognized for two minutes. mr. connolly: thank you, mr. chairman. i thank my dear friend from mississippi, mr. thompson, and
9:44 am
i commend him and the distinguished chairman of the committee, mr. mccaul, for their wonderful work on this bill. we cannot wait. america cannot wait for a cyber-pearl harbor. this issue cybersecurity may be the most complex and difficult challenge we confront long term. the line between our physical world and cyberspace continues to blur with every aspect of our lives from social interaction to commerce. yet, the remarkable gains that have accompanied an increasingly digital and connected society also have opened up new unprecedented vulnerabilities that threaten to undermine this progress and cause great harm to our country's national security, critical infrastructure and economy. it's long overdufort congress to modernize our cyberlaws to address those vulnerabilities. the bills before us this week are a step in the right
9:45 am
direction, and i'm glad to support them but they are a first step. information sharing alone does not inoculate or defend us from cyberattacks. indeed, the critical three p's of enhancing cybersecurity people, policies and practices, the measures before us make improvements primarily to policy. i commend the two committees for working in a bipartisan fashion to improve privacy and transparency protections. more is still needed to safeguard the civil liberties of our constituents. further, i hope that the broad liability protections provided by these bills will in fact be narrowed upon further consultation with the senate. . it includes the expectation of a requirement that our partners will, in fact, take reasonable actions. moving forward i hope congress will build on the -- this effort to address the security of crit -- critical information, the vast majority of which is owned and operated by the private
9:46 am
sector. we also need to strengthen our nation's cyberwork force and bring about a wholesale cultural revolution. i ask for 30 seconds more. mr. thompson: i yield additional 30 seconds. mr. connolly: thank you. so that society fully understands the critical importance of good cyberhygiene. the bottom line is that our vulnerability in cyberspace demands that we take decisive action and take it now. much like the tactics used in cybersecurity, we must recognize that enhancing our cyberdefenses is a process that requires continuous effort. i congratulate the staffs and the leadership of the committee. i yield back. the chair: the gentleman from virginia yields back. the gentleman from mississippi reserves. the gentleman from texas is recognized. mr. mccaul: mr. chairman, i now yield five minutes to the gentleman from georgia a member of the committee on homeland
9:47 am
security, mr. loudermilk. the chair: the gentleman from georgia is recognized for five minute. mr. loudermilk: thank you, mr. chairman. over the past 40 years we have experienced advancements in information technology that literally have transformed business education government. it's even transformed our culture. information research that only a couple decades ago would take days, months maybe even years to accomplish, is available quite literally at our fingertips and stainsly -- instantaneously. other aspects of our lives have also been shaped by this immediate access to information. shopping, can you go shopping without ever going to a store. you can conduct financial transactions without ever going to a bank. can you even have access to entertainment without ever going to a theater. these advancements in technology have not only transformed the way we access and store information, but it's also transform the way we communicate. no longer do you -- is instantaneous voice to voice
9:48 am
communication only available through a phone call, but people around the world instantly connect with one another with a variety of methods. from email, instant text messaging, even videoconferencing and this can be all done while you're on the move. you don't even have to be chained to a desk or in your business office. really, every aspect of our culture's been affected by the advancements in information technology. for the most part, our lives have been improved by these advancements. as an i.t. professional with 30-plus years' experience, in both the military and private sector, i know firsthand the benefits of this instant access to endless amounts of informing. on the other hand, i know all too well the vulnerabilities of these systems. for the past 20 years i have assisted businesses and governments to automate their operations and ensure they can access their networks any time and from anywhere. however, this global access to information requires a global interconnection of these systems. almost any time during the day americans are connected to this
9:49 am
global network through their phones tablets, health monitors car and navigation systems, even home security systems are now connected to the internet. we have become dependent on this interconnection and so have the businesses and government entities that provide crucial service that is we rely on. but as our dependence on technology has grown, so have our vulnerabilities. cyberspace is the new battleground. a battleground for a multitude of adversaries. foreign nations, international terrorists, organizations, and organized crime regularly target our citizens, businesses, and governments. unlike traditional combat operations cyberattackers don't require sfibblingted weaponry to carry out their warfare. on the cyberbattlefield, a single individual with a laptop computer can wreak havoc on business the economy evenure critical infrastructure. in the past several months we have seen an increasing number of cyberattacks on national security systems, private
9:50 am
company networks reaching crit cal information. just earlier this year, anthem blue cross, blue shield i.t. system was hacked by highly sophisticated cyberattacker obtaining personal employee and consumer data including names, social security numbers, and mailing addresses. an old adage among i.t. professionals states there are two types of computer users those who have been hacked and those who don't know they have been hacked. today this is truer than ever before. the incredible advancements made by the i.t. industry over the past three decades have been predominantly due to the competitive nature of the free market. without the overbearing constraints of government bureaucracy, oversight and regulation, technology entrepreneurs have had the freedom to bring new innovations to the market with little cost and record amount of time. it is clear our greatest advancements in technology have come from the private sector. that's why it is imperative that the government partner with the private sector to combat cyberattacks against our nation.
9:51 am
the bill being debated in this house today, the national cybersecurity protection advancement act, puts in place a framework for voluntary partnership between government anti-private sector to share information to protect against and combat against cyberattacks. through this voluntary sharing of critical information, businesses and government will voluntarily work together to respond to attacks and prevent our enemies from corrupting networks, attacking our highly sensitive data systems, and compromising our personal privacy information. while protecting individual privacy, this legislation also includes liability protections for the sharing of cyberthreat information, thereby promotes information sharing that enhances the national cybersecurity posture. we are no longer solely dealing with groups of hackers and terrorists, but individuals who target large networks, corrupt our database, and get hold of private material. with today's evolving technology, we must make sure we are affirming individual privacy
9:52 am
rights, safeguarding both government and private sector databases from cyberterrorism. protecting the civil liberties of the citizens of the united states is a top priority for me. and it should be for this congress. that's why i stand in support of h.r. 1731 as it provides a framework for cooperation -- the chair: the gentleman's time has expired. mr. mccaul: i yield additional 30 seconds. mr. loudermilk: thank you. protect the civil liberties of the united states is a top priority for me and i know for this congress as well. i do support h.r. 1731 because it provides that framework of cooperation between the government and the private industry and it provides the protections and liability protections our industries need. we must have this bill. i do stand in support of it. i thank you for allowing me this time to speak. i yield back. the chair: the gentleman from georgia yields back. the gentleman from texas reserves. the gentleman from mississippi is recognized. mr. thompson: mr. speaker, i
9:53 am
have no additional requests for time. so i reserve. the chair: the gentleman from mississippi reserves. the gentleman from texas is recognized. mr. mccaul: i now yield as much time as he may consume to the j texas, a member of the homeland security committee, mr. herd. the chair: the gentleman from texas, mr. herd, is recognized for as much time as he may consume. mr. herd: thank you mr. chairman. chairman mccaul, i spent almost nine years or a little over nine years as an undercover officer in the c.i.a. i chased al qaeda, tally ban. towards the end of my career we spent more time focusing on cybercriminals russian organized crime, state sponsors of terror like iran. and what this bill does is it helps in the protection of our digital infrastructure both public and private against this increasing threat.
9:54 am
i had the opportunity to help build a sishe security company and -- build a cybersecurity company and seeing threat to our infrastructure is great. this bill which i rise in support of is going to create that framework in order for the public and the private sector to work together against these threats. when i was doing this for a living, you give me enough time i'm going to get in your network. and we have to change our mind set and begin with the presumption of breach. how do we stop someone -- how do we detect someone getting in our system? how do we corral them? and how do we kick them off? and h.r. 1731 is a great start in doing this and making sure that we have the right protections. we also are helping small and medium-sized businesses with this bill. making sure that a lot of them don't have the resources that some larger businesses do and making sure that the department
9:55 am
of homeland security is providing as much information to them so that they can keep their company and their customers safe. so, i'd look -- like to commend everyone on both sides of the aisle to make this bill happen and i look forward to seeing this get past this house and our colleague from the senate. with that i yield back the remainder of my time. thank you. the chair: the gentleman from texas, mr. hurd, yields back. the gentleman from texas, mr. mccaul reserves. the gentleman from mississippi is recognized. mr. thompson: mr. speaker, i continue to reserve. the chair: the gentleman from mississippi reserves. the gentleman from texas is recognized. mr. mccaul: i have no further requests for time. i'm prepared to close if the gentleman from mississippi is prepared to close. mr. tomorrow sop: mr. speaker -- mr. thompson: i am prepared to close. the chair: the gentleman from texas controls the time. mr. mccaul: i reserve my time. the chair: the gentleman from mississippi is recognized. mr. thompson: thank you, mr.
9:56 am
chairman. mr. chairman, as someone involved in this issue for many years, i'm not surprised by the overwhelming support that h.r. 1731 has garnered. today the house has the opportunity to join with the president and stakeholders from across our critical infrastructure sectors to make our nation more security. by casting a vote in favor of h.r. 1731, you will be putting the department of homeland security, the federal civilian league for cyberinformation sharing, on a path to fully partnering with the private sector to protect the u.s. networks. with that, mr. chairman, let me yield back. the balance of my time. the chair: the gentleman from mississippi yields back. the gentleman from texas is recognized. mr. mccaul: mr. chairman, i yield myself such time as i may consume. the chair: the gentleman is recognized. mr. mccaul: mr. chairman, we are at a pivotal moment today and face a stark reality.
9:57 am
the cyberthreats to america have gone from bad to severe. and in many ways we are flying blind. the current level of cyberthreat information sharing won't cut it. in the same way we fail to stop terrorist attacks in the past, we are not connecting the dots well enough to prevent digital assaults against our nation's networks. the information we need to stop destructive breaches is held in silos rather than being shared. preventing us from mounting an aggressive defense. in fact, the majority of cyberinconstitutions go unreported. leaving our networks vulnerable to the same attacks. when sharing does happen it's often too little and too late. if we don't pass this legislation to enhance cyberthreat information sharing we'll be failing the american people and creeding -- ceding more ground to our adversaries. i hope today we have the
9:58 am
momentum to reverse the tide and do what the american people expect of us. pass pro-security, pro-privacy legislation to better safeguard our public and private networks. our inaction would be a permission slip for criminals, activists, terrorists, and nation states to continue to steal our data and do our people harm. i appreciate the collaboration from members across the aisle and from other committees in developing this legislation. i'd like to specifically commend, again subcommittee chairman, mr. ratcliffe, for his work on this bill as well as our minority counterparts, including ranking member thompson and subcommittee ranking member mr. richmond for their joint work on this bill. with that, mr. chairman, i urge my colleagues to pass h.r. 1731, i yield back the balance of my time. the chair: the gentleman yields back. all time for general debate has expired. in lieu of the amendment in the nature of a substitute
9:59 am
recommended by the committee on homeland security printed in the bill, it shall now be in order to considered in the bill for purpose of amendment under the five-minute rule an amendment in the nature of the substitute consisting of text of rules committee print 114-12. that amendment shall be considered as read. no amendment to that amendment in the nay taur of a substitute shall be in order except those printed in part b of house report 114-88. each such amendment may be offered only in the order printed in the report, by a member designated in the report shall be considered as read shall be debatable for the time specified in the report equally divided and controlled by the proponent and an opponent. shall not be subject to amendment, and shall not be subject to demand for division of the question. it is now in order to consider amendment number 1 printed in part b of house report 114-88. for what purpose does the gentleman from texas seek recognition? mr. mccaul: mr. chairman, i have an amendment at the desk. the chair: the clerk will designate the amendment.
10:00 am
the clerk: amendment number 1, printed in part b of house report number 114-88, offered by mr. mccaul of texas. the chair: pursuant to house resolution 212, the gentleman from texas, mr. mccaul, and a member opposed, will each control five minutes. the chair recognizes the gentleman from texas. . mr. mccaul: thank you, mr. chairman, i yield myself such time as i may consume. it further clarifies several intentions of the bill. these modifications were made in consultation with privacy groups, industry leaders in both the house intelligence committee and house judiciary committee. among the more notable changes made are the expansion of protections for personally identifiable information to include the exclusion of information and not just the removable of information. a modification to clarify that use of cyberthreat indicators in defensive measures are limited to those authorized in the bill only.
10:01 am
clarifying language to say the origin of a cybersecurity threat is a valid cybersecurity purpose. each of these changes along with the others made in the manager's amendment, strengthen the bill and further support the committee's mission to help protect america's networks and systems from cyberattacks. while at the same time ensuring that individuals' private information enjoys robust protection as well. and with that, mr. chairman, i yield back the balance of my time. the chair: the gentleman from texas yields back. for what purpose does the gentleman from mississippi seek recognition? mr. thompson: mr. speaker i claim time in time in opposition although i am -- i claim time in opposition although i am not opposed to the amendment. the chair: the gentleman is recognized for five minutes. mr. thompson: thank you, mr. chairman. mr. chairman the mccaul amendment makes several technical changes to reflect feedback from committee
10:02 am
democrats, department of homeland security and stakeholders. last week during committee consideration, representative richmond had a amendment on citizens' suits against the federal government for privacy violations. the underlying bill requires the clock to toll from the date that government violated the citizens' privacy. the likelihood that a citizen will know the exact date when the personal information is mishandled is pretty remote. as such, democrats argued that provision was tantamount to giving the federal government a free pass to violate the civil protections under this act. i'm pleased to see that chairman mccaul listened to democrats' concerns and has the amendment -- has the amendment to adjust the language though it could use further refinement. i'm pleased that the amendment clarifies that all public
10:03 am
utilities, not just electric utilities, are covered under this bill. the changes to the underlying bill that this amendment would make are in line with our shared goals of bolesering cybersecurity and improving the -- bolstering cybersecurity and improving it. accordingly, i support the mccaul amendment and reserve the balance of my time. the chair: the gentleman controls the only time remaining. does the gentleman reserves or yield back? mr. thompson: i reserve the balance of my time. the chair: the gentleman controls all the time remaining in the debate. mr. thompson: i yield back. the chair: the gentleman from mississippi yields back. the question is on the amendment offered by the gentleman from texas. all those in favor say aye. all those opposed, no. in the opinion of the chair, the ayes have it. the amendment is agreed to.
10:04 am
the chair: it's now in order to consider amendment number 2. for what purpose does the gentleman from texas seek recognition? >> mr. speaker, i ask unanimous consent to offer amendment number 2 in place of mr. katko.
10:05 am
the chair: is the gentleman rising as a designee of mr. katko? mr. ratcliffe: yes, mr. speaker. the chair: the clerk will designate the amendment. the clerk: amendment number 2 printed in part b of house report 114-88 offered by mr. ratcliff of texas. the chair: pursuant to house resolution 212 the gentleman from texas, mr. ratcliff, and a member opposed will each control five minutes. the chair recognizes the gentleman from texas. mr. ratcliffe: thank you mr. speaker. i'd like to rise in support of amendment 2. it would help the homeland security act and this bill. this bill narrows the definition the word incident to ensure that a cybersecurity incident is limited to actions taken against an information system or information stored on that system. this amendment, mr. speaker, ensures that information shared
10:06 am
with the nccic is limited to threats and information against information system and information stored on that system and with that i yield back. yes, i'll yield. mr. mccaul: i support this bipartisan amendment that will help clarify language in both the homeland security act and this bill by narrowing the definition of the word incident to ensure that a cybersecurity incident is limited to actions taken against an information system or information stored on that system. this amendment ensures that information shared with the nccic or other private entities is limited actions to against information systems and information stored on that system. i also want to thank the gentleman from california, mr. mcclintock, for being a leader on this issue in calling this
10:07 am
loophole, if you will, to the attention of the committee to make this a stronger bill on this floor and with that i yield back to the gentleman. mr. ratcliffe: and i yield back. the chair: the gentleman from texas yields back. for what purpose does the gentleman from louisiana seek recognition? >> mr. chairman, i claim the time in opposition although i am not opposed to the amendment. the chair: without objection, the gentleman is recognized for one minute. mr. richmond: i rise in support of this amendment to make an important change. this bill, acknowledged by some in the privacy community, is the limitations it places for sharing and network monitoring. these activities can only be carried out for a cybersecurity purpose. among other things, this limitation is intended to ensure that information is not shared for surveillance or law enforcement purposes. and the authorization for network monitoring is not exploited by an overzealous employer who wants to track his
10:08 am
employee's every move on the internet. however, because of the broadness of the term within the definition of cybersecurity -- cybersecurity purpose it came to light that language could be interpreted far more expansively than intended. i commend the gentleman from new york and mr. ratcliff who is now offering the amendment, for tightening up the definition of incident in this bill and the underlying law. we use our smartphones, tablets and computers for all manner of things, from setting up doctors' appointments to buying groceries or ordering books. it is important that even as we seek to bolster cybersecurity we do not lose sight of the need to protect the privacy interests of ordinary americans. that is why i support the ratcliff amendment. it will ensure that in practice the activities undertaken in this bill are limited to protecting networks and the data on them. i urge a yea on this amendment
10:09 am
and i yield back. the chair: the gentleman yields back. the question is on the amendment offered by the gentleman from texas. all those in favor say aye. all those opposed, no. in the opinion of the chair, the ayes have it. the amendment is agreed to. it is now in order to consider amendment number 3 printed in part b of house report 114-88. for what purpose does the gentleman from rhode island seek recognition? mr. langevin: mr. chairman, i have an amendment at the desk. the chair: the clerk will designate the amendment. the clerk: amendment number 3 printed in part b of house report 114-88 offered by mr. langevin of rhode island. the chair: pursuant to house resolution 212 the chair recognizes the gentleman from rhode island, mr. langevin, and a member opposed, for five minutes. langevin: the definition of cybersecurity risk and cybersecurity purpose does not apply to actions that solely
10:10 am
involve the violation of consumer terms of service or consumer licensing agreements this is a small but important change that will protect americans' privacy and ensure that white hat security researchers are not inadvertently monitored. the cyberdata that will help turn the tide against malicious actors are indicators of compromise. what will not help is knowing that a consumer has violated the busy teen terms of agreement or a researcher is testing software for exploitable bugs that he or she will then share with the security community. while not every terms of service violation is borne of ignorance, there's no doubt in my mind that -- the exclusion my amendment proposes is not new to this floor.
10:11 am
both the 2012 and 2013 versions of cispa, which i worked on in the house intelligence committee, had protecting cybernetworks act that passed the house yesterday also includes this manage. so the amendment also makes clear that the exclusions apply only for actions that solely violate terms of service. an action that disrupted an information system in addition to being a violation of terms of service would still constitute a cybersecurity risk. trust is the fundamental element of any information sharing regime. the bill that we are considering is designed to build that trust by limiting the use of information shared to cybersecurity purposes and ensuring that indicators are scrubbed of any personal information before sharing. so my amendment strengthens that trust by making it clear that our focus is on the many real cyberthreats out there, not on consumers and
10:12 am
researchers. i would like to again express my deep thanks to the chairman of the committee mr. mccaul, for his steadfast dedication of the issue of cybersecurity, and i would like to particularly thank his staff for working with us on this amendment. the chairman and the democratic ranking member mr. thompson, have done this body proud and i certainly urge the adoption of my amendment and the underlying bill and with that, thank you, and i reserve the balance of my time. the chair: the gentleman from rhode island reserves. for what purpose does the gentleman from texas seek recognition? mr. mccaul: mr. chairman, i ask unanimous consent to claim time in opposition though i am not opposed to the amendment. the chair: without objection, the gentleman from texas is recognized for five minutes. mr. mccaul: mr. chairman, i support this amendment which would clarify that term cybersecurity risk does not apply to actions solely involving violations of consumer terms of service or consumer licensing agreements. this amendment would protect consumers from having information shared with the
10:13 am
government due to a minor or unwitting violation of the terms of service. such as a violation of one's apple itunes agreement which my teenage daughters would ement appreciate. this amendment and this bill are meant to enhance the sharing of cybersecurity information within the government and the public. in order to promote voluntary sharing, the public needs to feel government that sole act of violating terms of service or licensing agreements won't be shared with the nccic and that this bill is not a tool to enforce violations regarding terms of service or licensing agreements. these violations have robust legal remedies in place and should be handled through those channels. i think this strengthens the bill and i appreciate the gentleman's amendment to do so. i support this amendment and i reserve the balance of my time. the chair: the gentleman from texas reserves. the gentleman from rhode island is recognized. mr. langevin: well, i thank the chairman for his kind words of
10:14 am
support. as many in this chamber know, chairman mccaul and i have a long history on the issue of cybersecurity from our time as co-chairs of the commission on cybersecurity for the 44th presidency and our current roles as co-founders and co-chairs of the congressional cybersecurity caucus, along a variety of other collaborations that he and i have engaged in. mr. mccaul: if the gentleman will yield? mr. langevin: i will yield. mr. mccaul: i'd like to highlight for all my cligse the great work that we do in the cybersecurity caucus -- colleagues the great work that we do in the cybersecurity caucus with my great friend and colleague from rhode island. it brings some of the brightest minds in both government and private sector to the hill to educate members and staff on this national security issue. when we first started the caucus in 2008, cyber was a topic very few members knew about. it really wasn't cool to know about cybersecurity. we made great progress, i believe, the gentleman and i
10:15 am
since that time in raising the level of debate and engagement and awareness and education with the members on this critical subject. i hope that the members will continue and the staff continue to take advantage of the opportunities afforded by the caucus as our lives become even more interconnected in the cyberspace and i think this issue has never been morrell vant and more of a -- more relevant and more of a threat than today. and with that i yield back. mr. langevin: i thank the chair. cybersecurity is not a problem to be solved but a challenge to be managed. i thank the chairman for his collaboration, his leadership on this issue, along with our ranking member thompson and i certainly look forward to the caucus' continuing contributions to the discussion, and with that i urge the adoption of my amendment -- i'd be glad to yield. >> i'd like to thank him for his amendment. it prevents this bill from becoming like the cfaa which
10:16 am
treats noncriminal activity as something wrong. ms. lofgren: this and the amendment, the katko-lofgren amendment narrows the bills and i thank the gentleman for supporting it and his amendment. mr. langevin: i thank the gentlelady for her support. with that i yield back the balance of my time. the chair: the gentleman from rhode island yields back. the gentleman from texas is recognized. . the gentleman from texas is recognized. >> i yield back my time. the chair: the question is on the amendment offered by the gentleman from rhode island. so many as are in favor say aye. those opposed, no. in the opinion of the chair, the ayes have it. the amendment is agreed to. it is now in order to consider amendment number 4 printed in part b of house report 114-88. for what purpose does the gentlewoman from texas seek recognition? ms. jackson lee: i have an amendment at the desk. the chair: the clerk will designate the amendment.
10:17 am
the clerk: amendment number 4, printed in part b of house report number 114-88, offered by ms. jackson lee of texas. the chair: pursuant to house resolution 212 the gentlewoman from texas ms. jackson lee, and a member opposed will each control five minutes. the chair recognizes the gentlewoman from texas. ms. jackson lee: i thank the chair very much. let me express my appreciation to the chairman and ranking member of the full committee. again they have shown the kind of leadership that the nation needs on dealing with homeland security. my particular appreciation to the chairman and subcommittee on cybersecurity as they have worked together and presented legislation that provided a very vigorous debate in the subcommittee and the full committee and we believe that we are making enormous leaps and bounds. we are not where we need to be but we are making leaps and bounds on at that whole question of cybersecurity. over the last couple years, even someone just reaching kindergarten understands hacking.
10:18 am
understands the collapse that we have seen in a variety of major retail entities and banking entities. and they recognize that we have a new lingo but a new problem. and frankly, almost maybe 10 years ago, maybe somewhere around seven years ago as the infrastructure of the united states was on the transportation security we made the note that 85% of the nation's cyberis in the private sector. this legislation is a real approach, the national cybersecurity advantagement act of 2015, clearly puts the department of homeland security where it needs to be and provides the national cybersecurity and communications integration center as the anchor of the information coming into the federal government and the vetting entity where americans can feel that their data can be protected. and our civil liberties are
10:19 am
protected. mr. chairman, my amendment deals with the industrial control systems, all of us know them. i have seen the impact that a cyberattack could have. the electric grid. all of these are in the eye of the storm and they are in the private hands. attacks against industrial control systems doubled last year, according to a new report from dell. we have over a million firewalls sending data to us on a minute by minute basis that the director of product marketing for network security at dell. we analyze the data and see interesting trends. in particular attacks specifically targeting industrial control systems rose 100% in 2014 compared to the previous year. 2014. countries most affected were finland, u.k., and yes the united states of america. the most common attack against these systems were buffer overflow attacks.
10:20 am
and that -- underlying premise of my amendment, the public benefit of this amendment is that taxpayer dollars provided to ensure cybersecurity of public and private computer networks will focus on real world application that is reflect how businesses and industries function. so i thank both my colleagues for it. and this amendment in particular will be an important addition to the legislation which i believe can be supported by every member. the amendment states that the department of homeland security in carrying out the functions authorized under this bill remain current on industrial control system innovation, industry adoption of new technologies, and industry best practices. industrial control systems are rarely thought of as long as they work as designed. industrial control systems are used to deliver utility services to homes and businesses at precision and speed to manufacturing and process. industrial control systems are responsible for the lights that brighten our cities, for the clean drinking water which i
10:21 am
indicated many of us have visited. these systems, the sewage. automobiles that travel. our highways and the rows upon rows of food that fills our grocery stores. we only need to look recently at a contamination of ice cream across the nation to know that industrial control systems are extremely important. they are also used in large-scale manufacturing. and days have not passed in this country when citizens alives are not impacted. so, mr. chairman, i am asking my colleagues to recognize we are in control but the industrial control systems may, in fact, control our daily lives. and my amendment is asking that the department of homeland security in carrying out its function authorized under this bill remain current on industrial control system innovation, industry adoption, new technology, and industry best practices. i ask my colleagues as i ask to put my entire statement into the record as itlies as whole litany of the private sector infrastructure dealing with industry control. i am hoping that my amendment
10:22 am
will be passed in order to ensure that all aspects of our cyberworld are protected for the american people. with that i yield back. the chair: the gentlelady's time has expired. for what purpose does the gentleman from texas seeked recognition? mr. mccaul: i ask unanimous consent to claim the time in opposition though i am not opposed to the amendment. the chair: without objection the gentleman from texas is recognized for five minutes. mr. mccaul: i support this amendment which would modify the informing sharing structure and processes section of the bill relating to the national cybersecurity and communications integration center or nccic industrial control system. the cyberemergency response team , u.s. cert. this amendment directs them to remain current on i.c.s., innovation, industry adoption of new technologies, and industry best practices. this amendment directs the i.c.s. to keep abreast of new innovative technologies and this
10:23 am
will enable them to respond when requested with the latest and most current technologies and practices. it's a good amendment. i thank the gentlelady for bringing it. i urge my colleagues to support this amendment and i yield back the balance of my time. the chair: the gentleman from texas yields back. the question is on the amendment offered by the gentlelady from texas. so many as are in favor say aye. those opposed, no. in the opinion of the chair, the ayes have it. the amendment is agreed to. it is now in order to consider amendment number 5 printed in part b of house report 114-le 8 -- 114-88. for what purpose does the gentleman from texas seek recognition? mr. castro: i have an amendment at the desk. the chair: the clerk will designate the amendment. the clerk: amendment number 5 printed in part b of house report number 114-88, offered by mr. castro of texas. the chair: pursuant to house resolution 212, the gentleman from texas, mr. castro, and a member opposed will each control five minutes. the chair recognizes the gentleman from texas. mr. castro: thank you mr. speaker, for yielding me this
10:24 am
time. first i'd like to thank my colleague and fellow texan, chairman mccaul, and ranking member bennie thompson, of the house homeland security committee for bringing up my amendment for consideration to h.r. 1731. this amendment supports small businesses across the nation at no cost to taxpayers. my amendment would make self-assessment tools available to small and medium sized businesses so that they could determine their level of cybersecurity readiness. the oftentimes medium-sized and small businesses don't have the framework or capability in place to protect against cybersecurity threats. in 2014, for example, 31% of all cyberattacks were directed not at large businesses but at businesses with less than 250 employees. this is a 4% increase from 2013. as the chairman knows, texas is home to many small companies in so many critical industries. biomed and pharmaceuticals, energy manufacturing, and many more. some of these businesses employ
10:25 am
as few as five to 10 people and their technology is unprotected. vulnerable to cyberattacks. today most small businesses use the internet to collect customer information and store sensitive information on business computers. yet many of these same companies don't have the readily available information to self-assess their ability to defend their digital assets. they lack the tools necessary for determining cybersecurity readiness. this pro-small business amendment fills that void and provides the information and tools needed to secure and empower small businesses across the country. mr. speaker, i'd like to yield one minute to the gentleman from louisiana, mr. richmond. the chair: the gentleman from louisiana is recognized for one minute. mr. richmond: mr. chairman, i rise to support the amendment offered by the gentleman from texas, mr. castro. over the course of the past year cyberbreaches at target,
10:26 am
sony, e bay, and anthem have consumed headlines and brought awareness to the vulnerability of large corporations to cyberthreats. although cyberattacks against small businesses are not well publicized, they are dangerous threat and we cannot afford to ignore. in fact, in 2012 alone, the national cybersecurity alliance found that 60% of small businesses shut down within six months of a data breach. small businesses are attractive prey for hackers because they often lack the resources necessary to identify cybervulnerability and harden their signer infrastructure. mr. castro's amendment builds upon language i inserted into the underlying bill that is aimed at improving cybersecurity capabilities of small businesses. i urge my colleagues to help protect small businesses from cyberthreats by supporting this important amendment. with that, mr. chairman, i yield back the balance of my time. the chair: the gentleman from louisiana yields back. the gentleman from texas.
10:27 am
mr. castro: thank you, congressman richmond, for reminding us the big businesses that get attacked by hacks make the big headlines, but we can't forget about small businesses and medium sized businesses who day in and day out are vulnerable to the same kind of cybersecurity threats. so with that i reserve the balance of my time. the chair: the gentleman from texas reserves. for what purpose does the gentleman from texas seek recognition? mr. mccaul: i ask unanimous consent to claim time in opposition though i am not opposed to the amendment. the chair: without objection, the gentleman from texas, mr. mccaul, is recognized for five minutes. mr. mccaul: i thank the chairman. i support the gentleman's amendment. the gentleman's correct, small and medium sized businesses are the lifeblood of our economy. yet they often cannot dedicate the resources to address cybersecurity issues. making self-assessment tools available to these businesses will allow them to determine their levels of cyberrisk, management of the risk through appropriate provisions.
10:28 am
i urge my colleagues to support this amendment and yield back the balance of my time. the chair: the gentleman from texas, mr. mccaul, yields back. the gentleman from texas, mr. castro is recognized. mr. castro: i yield, mr. speaker. the chair: the gentleman from texas, mr. castro, yields back. the question is on the amendment offer by the gentleman from texas, so many as are in favor say aye. those opposed, no. in the opinion of the chair, the ayes have it. the amendment is agreed to. it is now in order to consider amendment number 6 printed in part b of house report 114-88. for what purpose does the gentleman from texas seek recognition? mr. castro: i have an amendment at the desk. the chair: the clerk will designate the amendment. the clerk: amendment number 6, printed in part b of house report number 114-88, offered by mr. castro of texas. the chair: pursuant to house resolution 212, the gentleman from texas, mr. castro, and a member opposed, will each control five minutes. the chair recognizes the gentleman from texas. mr. castro: thank you, mr. speaker. first, i am very honored to be joined by my fellow colleagues, the members of congress, from both parties from san antonio,
10:29 am
texas, congressman smith, doggett, cuellar, and hurd who each represent a portion of bear county and joined me on this amendment. my amendment would give the secretary of homeland security authority to establish the national cybersecurity preparedness consortium or ncpc, within the department of homeland security. doing so would formly allow this consortium, which already exists outside of the government to assist state and local entities in developing their own viable and sustainable cybersecurity programs. and it would be at no cost to taxpayers. the ncpc consists of five university partners. the university of texas at san antonio leads the effort, along with texas a&m university in college station, the university of texas of arkansas -- the university of arkansas, the university of memphis, and nor witch university in vermont. these schools proactively came together to coordinate their work helping state and local officials prepare for
10:30 am
cyberattacks. the consortium also develops and carries out trainings and exercises to increase cybersecurity knowledge. additionally, the ncpc uses competitions and workshops to encourage more people to pursue careers in cybersecurity and grow the industry's work force. states and communities need the ability to protect -- prevent, detect, respond torques and recover from sishe events as they would any other disaster or emergency situation. . and it could impede emergency responders from doing their job this amendment codifies this valuable consortium. with that, mr. speaker i reserve the balance of my time. the chair: the gentleman from texas reserves. for what purpose does the gentleman from texas seek recognition? mr. mccaul: mr. speaker, i ask unanimous consent to claim time in opposition to the amendment though i am not opposed. the chair: without objection the gentleman is recognized for
10:31 am
five minutes. mr. mccaul: i thank the chairman. i support this amendment which establishes the national cybersecurity preparedness consortium, consisting of university partners and other stakeholders who proactively coordinate to assist state and local officials in cybersecurity preparation and the prevention of cyberattacks. the amendment directs cybersecurity and infrastructure protection directorate to update curriculum for first responders provide technical assistance where possible and conduct simulations to be better prepared for cyberattacks. it directs the core sort yum to consist of academic, nonprofit and government partners to deliver the best training possible which will further advance the overall goal of h.r. 1731. to strengthen the resiliencey of federal and private networks and thus protect the personal data of the american people more effectively. i'm a strong proponent of this type of consortium and i'm pleased that the gentleman from texas brought this amendment,
10:32 am
and i urge my colleagues to support the amendment and i reserve the balance of my time. the chair: the gentleman from texas, mr. mccaul, reserves. the gentleman from texas mr. castro, is recognized. mr. castro: mr. speaker, i yield back my time. the chair: the gentleman from texas, mr. castro, yields back. the gentleman from texas, mr. mccaul, is recognized. mr. mccaul: mr. chairman, i yield to the gentleman for as much time as he may consume the gentleman from texas, mr. hurd. the chair: the gentleman from texas is recognized for such time as he may consume. mr. hurd: mr. speaker thank you. mr. chairman, thank you for your work and making this amendment to happen. i ask my colleagues to support this amendment to h.r. 1731. cybersecurity is not just a buzz word. oftentimes large companies and governments have plans in place to mitigate and respond to cyberthreats. many smaller state and local entities do not. this is why i co-sponsored and have the support of representative castro's amendment to h.r. 1731. five leading universities across the nation have teamed up to face these cyberissues head on including the
10:33 am
university of texas at state of the union and my alma mater, texas a&m university. the proposed consortium would provide valuable training to local first responders in the event of a catastrophic cyberattack. it would provide technical assistance services to build and sustain capabilities in support of cybersecurity preparedness and response. it would coordinate with other crucial entities such as the multistate information sharing and analysis center and nccic. it is clear we must focus on cyberpreparedness not only at the federal level but the local level as well. again this is why i urge my colleagues to support this and i yield back the balance of my time. the chair: the gentleman yields back. the gentleman from texas mr. mccaul. mr. mccaul: mr. chairman, i yield back the balance of my time. the chair: the gentleman from texas yields back. the question is on the amendment offered by the gentleman from texas, mr. castro. all those in favor say aye. all those opposed will say no. in the opinion of the chair, the ayes have it. the amendment is agreed to. it is now in order to consider
10:34 am
amendment number 7 printed in part b of house report 114-88. for what purpose does the gentleman from texas seek recognition? mr. hurd: mr. speaker, i have an amendment at the desk. the chair: the clerk will designate the amendment. the clerk: amendment number 7 printed in part b of house report 114-88 offered by mr. hurd of texas. the chair: pursuant to house resolution 212 the gentleman from texas, mr. hurd, and a member opposed will each control five minutes. the chair recognizes the gentleman from texas. mr. hurd: thank you, mr. chairman. every day and every hour hackettivists and state actors breach government systems. this is a problem i dealt with during my time at the c.i.a. and since i left it's only gotten worse. they were attempting to steal valuable information that could be used against us. and the einstein program is a valuable tool that the u.s. government can deploy to respond to and mitigate cyberthreats. the einstein program was intended to provide d.h.s. situational awareness snapshot of the health of the federal
10:35 am
government's cyberspace. based on -- based upon agreements with participating federal agencies, d.h.s. installed systems at the internet access points to collect network flow data. einstein 3-a is a new program. this groundbreaking technology uses classified and nonclassified information to block cyberespionage and attacks. e-3-a is painting a wider and overall picture of the cybersecurity threat landscape. enabling strong correlation of events and the ability to provide early warning and greater context about emerging risk. cutting edge programs such as einstein can serve as a groundbreaking tool to stop criminals and nation states from harming the american public and government. i urge my colleagues to support codifying the e-3-a program and vote in favor of this amendment. mr. mccaul: if the gentleman will yield? mr. hurd: yes. mr. mccaul: i thank the gentleman.
10:36 am
i support this amendment which would authorize and codify the current einstein program operated in the department of homeland security. the einstein program, as deployed, makes available the capability to protect federal agency information and information systems. the einstein program includes technologies to diagnosis detect, prevent and mitigate cybersecurity risks involving federal information systems. i'd also like to thank my colleague and fellow chairman, mr. chaffetz, of the oversight and government reform committee for working with this committee on homeland security on this important issue. and i yield back to the gentleman from texas. mr. hurd: mr. speaker, i reserve the balance of my time. the chair: the gentleman from texas reserves. for what purpose does the gentleman from mississippi seek recognition? mr. thompson: mr. chairman, i claim time in opposition though i am not in opposition of the amendment. the chair: without objection, the gentleman from mississippi is recognized for five minutes. mr. thompson: thank you, mr. chairman. mr. chairman, this amendment would authorize the department
10:37 am
of homeland security's program to provide web-based security services to the u.s. federal civilian agencies. the program is known as einstein. when fully implemented, it is expected to provide all participating federal agencies with the ability to know the cyberthreats they face and protect their systems from insider and outsider threats. to fully implement einstein to protect federal civilian networks they are complex, interagency, privacy and coordination issues that still need to be settled. this authorization should help the department of homeland security's efforts in closing out these issues as it has specific statutory authority to the department to support einstein. i support the amendment and urge my colleagues to vote aye and i yield back the balance of my time. the chair: the gentleman from mississippi yields back. the gentleman from texas is recognized.
10:38 am
mr. hurd: i yield back the balance of my time. the chair: the gentleman from texas yields back. the question is on the amendment offered by the gentleman from texas. all those in favor say aye. all those opposed will say no. in the opinion of the chair, the ayes have it. the amendment is agreed to. it is now in order to consider amendment number 8 printed in part b of house report 114-88. for what purpose does the gentleman from south carolina seek recognition? mr. mulvaney: mr. chairman, vembing. the chair: the clerk will designate the amendment. the clerk: amendment number 8 printed in part b of house report 114-88 offered by mr. mulvaney of south carolina. the chair: pursuant to house resolution 212, the gentleman from south carolina, mr. mulvaney, and a member opposed, will each control five minutes. the chair recognizes the gentleman from south carolina. mr. mulvaney: i thank the gentleman from georgia.
10:39 am
i also thank the chairman for the opportunity to present this amendment. very similar, mr. chairman, to the amendment i presented yesterday that was approved by a majority of both republicans and democrats. it's a seven-year sunset provision to the bill. here again today we're dealing with two very real and very serious concerns. security of our people and the freedoms and liberties of our people. we're called upon to do that very often here in congress. and sometimes we get those balances exactly right. and sometimes we don't. sometimes we err too much on side of safety and protection and security to the expense of our individual liberties. sometimes we err on the other side and do not provide the requisite level of safety and security that citizens rightly demand of congress. and all this bill does is force us to make sure that we keep an eye on this piece of legislation to make sure that we got the balance exactly right. i know that many folks will
10:40 am
say, well, you know, mr. mulvaney, we have the opportunity at any time to go in and fix the bill. i know that and we've done that from time to time. at the same token this is a busy place and sometimes it falls between the cracks. putting in a hard wired sunset for seven years will only keep an eye on this on an ongoing basis but come back seven years from now and make sure we've done it precisely correctly. i think it's the exact right approach. in fact, i often wish we put sunset provisions, mr. chairman, in every single piece of legislation we have but we don't have that opportunity here today. we do have the opportunity to put a sunset into this very important piece of legislation around i hope the house does the same -- and i hope that the house does the same thing today and approve this by an overwhelming margin. with that i reserve -- mr. mccaul: if the gentleman will yield? mr. mulvaney: i'll yield to the chairman. mr. mccaul: as the gentleman knows, i have tremendous respect for, an advocate of
10:41 am
civil liberties and privacy rights, i did not oppose the inclusion of his amendment here today on the floor and it's for good reason. i believe we need an open and fair debate on this measure, this amendment. we need transparency in the process here on the floor. and my committee has undertaken that since day one as we assembled this bill in a bipartisan fashion. while normally i support sunset provisions i think in this case submitting a sunset provision to this vital national security program would not be in our best interest. i've heard time and time again from industry and other stakeholders that a sunset would stifle the sharing of this valuable cyberthreat information. it would undermine everything that we are trying to do here today as we try to incentivize participation and investment in this voluntary program. while i do have tremendous respect for the gentleman and his point of view on this, i will vote no and oppose this
10:42 am
amendment. and with that i yield back. mr. mulvaney: mr. chairman, i applaud the chairman for doing something that doesn't happen nearly enough in this chamber. he's allowing an amendment to come to the floor that he opposes. i think that doesn't happen nearly enough here. i think it speaks volumes to some of the recent steps we've taken to improve member participation in the process. i think we'll be better as an institution for it. with that i recognize the gentleman from mississippi for as much time as he may consume. the chair: the gentleman from mississippi is recognized. mr. thompson: thank you, mr. chairman. i thank the gentleman from south carolina. i claim time in opposition though i am not in opposition to the amendment. the chair: without objection, the gentleman will control a separate five minutes. the gentleman from mississippi is recognized. mr. thompson: thank you, mr. chairman. i appreciate, as i said, the maker of this amendment. let me be clear, i offered the
10:43 am
very same amendment in markup. it failed on a party line vote, and you know, this is democracy, but a little thing concerns me is when we went to the rules committee, my chairman gave an indication that he really didn't have a problem with the seven-year sunset -- mr. mccaul: if the gentleman will yield? mr. thompson: i'll yield to my chairman. mr. mccaul: i just want to clarify what i believe to be the record and that was i was not opposed to this amendment going to the floor for a full and fair debate. but i respect the gentleman's interpretation of that. i'd simply was not opposed to this going to the floor and i think it deserves a full debate as we saw yesterday as well. and i yield back. mr. thompson: thank you. but i do -- and offer for the
10:44 am
record the statement my chairman made at rules. mr. mccaul said, there is an amendment that has a seven-year sunset provision, and i'll be honest, i will not oppose that. i think seven years is ample time to advance those relationships, and while at the same time giving congress the authority to re-authorize after a seven-year period. mr. mccaul: if the gentleman will yield again. i must say, obviously since the time the rules committee discharged the amendment there's been tremendous opposition from industry which concerns me about the participation in this program and the success of this program. if the sunset provision allows to go forward. just to clarify my point of view. thank you. i yield back. mr. thompson: thank you. i expect -- accept the
10:45 am
gentleman's reinterpretation of his statement and we'll impforward. let me just say yesterday on a seven-year sunset on an intelligence bill, the house voted resoundly for this very same amendment. 313-110. it's clear that the congressional intent is that within seven years that should have been ample time for this bill to be law and now set a record for us to come back as members of congress and do our oversight responsibility. . mr. speaker, i am in strong support of mr. mulvaney's amendment. it's common sense. with that i yield back. the chair: the gentleman yields back. the question is on the amendment offered by the gentleman from
10:46 am
south carolina. so many as are in favor say aye. those opposed, no. in the opinion of the chair, the ayes have it. the amendment is agreed to. it is now in order it considered amendment number 9 printed in part b of house report 114-le 8. for what purpose does the the gentlewoman from california seek recognition? ms. hahn: i have an amendment at the desk. the chair: the clerk will designate the amendment. the clerk: amendment number 9 printed in part b of house report number 114-88, offered by ms. hahn of california. the chair: pursuant to house resolution 212 the gentlewoman from california, ms. hahn, and a member opposed, will each control five minutes. the chair recognizes the gentlelady from california. ms. hahn: thank you, mr. chairman. i rise to thank chairman mccaul and ranking member thompson for allowing me to offer this amendment. it's the national cybersecurity protection advancement act
10:47 am
amendment and it's to increase cybersecurity at our nation's most at-risk ports. this amendment will direct the connect of houston to submit a report to congress assessing risk and providing recommendations regarding cybersecurity at america's most at-risk ports. such as los angeles, long beach, oaklandland, -- oak, new york, houston. according to the american association of port authorities our ports contribute $4.6 trillion to the u.s. economy, making their security critical to our nation. in order to remain efficient and globally competitive, our ports have become increasingly reliant on complex computer networks for everyday management. however, the brookings institute has found that there is a cybersecurity gap at our nation's ports. currently, we do not have cybersecurity standards for our ports to give federal agencies
10:48 am
authority to address cybersecurity issues. this is completely unacceptable. the threat of cyberattack on the networks that manage the flow of u.s. commerce at our ports is real. as a representative of the nation's busiest port complex and the co-founder of the congressional ports caucus, i know that a significant disruption at our ports cripples our economy. an estimated $1 billion a day was lost during the lockout at the ports of los angeles and long beach back in 2002. imagine the possible damage of a more severe disruption. for example, if our ports were targeted and hacked and unable to operate. it could cost our nation billions and billions of dollars. and while the port of los angeles is a paragraph tissmant of the f.b.i.'s cyberhood watch program and has an award winning cybersecurity operation center, we need to ensure that all of our ports have the same ability
10:49 am
to protect themselves from cyberattacks. this is why i have offered this amendment that addresses the lack of cybersecurity standards and safeguards at our ports. we have ignored the cybersecurity of the networks managing our ports long enough. it is pointless and ironic for government to continue awarding funds that are spent on the installation of new technologies if the networks they are on remain vulnerable to cyberattacks. this amendment adds no new cost to this legislation, but will offer great security to our nation's movement of goods. with that, i reserve the balance of my time. the chair: the gentlelady from california reserves. for what purpose does the gentleman from texas seek recognition? >> i ask unanimous consent to claim the time in opposition though i am not opposed to the amendment. the chair: without objection, the gentleman is recognized for five minute. mr. ratcliffe: i support this amendment which requires the department of homeland security
10:50 am
to identify and mitigate cybersecurity threats to our nation's seaports. it requires the secretary to identify the 10 ports with the highest vulnerability to cybersecurity incidents and to fully evaluate and establish procedures to mitigate relevant cybervulnerabilities. america's seaports are critical infrastructure. 95 of america's foreign trade travels through these seaports. cybersecurity incident which impacts a major u.s. port could have profound effects on the global economy. the department of homeland security must take immediate proactive measures to identify and mitigate cybersecurity threats at america's most vulnerable ports. i urge my colleagues to support this amendment and i yield back the balance of my time. the chair: the gentleman from texas yields back. the gentlelady from california is recognized. ms. hahn: i thank you for your sport and alaud you and the committee -- support and applaud you and the committee for working in this bipartisan man
10:51 am
-- manner. all of my colleagues to support this amendment. i yield back the balance of my time. the chair: the gentlelady from california yields back. the question soffered -- the question is offered on the amendment offered by the gentlelady from california. so many as are in favor say aye. those opposed, no. in the opinion of the chair, the aye vs. it. the amendment is agreed to. it is now in order to considered amendment number 10 considered in house report 114-88. for what purpose does the gentlelady from texas seek recognition? ms. jackson lee: i have an amendment at the desk. the chair: the clerk will designate the amendment. the clerk: amendment number 10, print princhted in part b of house report number 114-88, offered by ms. jackson lee of texas. the chair: the gentlelady will suspend. pursuant to house resolution 212 shall the gentlewoman from texas, ms. jackson lee and a member opposed, will each control five minutes. the chair recognizes the gentlelady from texas. ms. jackson lee: thank you. let me thank again mr. thompson mr. mccaul for their leadership,
10:52 am
mr. ratcliffe and mr. richmond for their leadership and for the importance of this legislation on the floor today. and again something that i have often said, the importance of the department of homeland security being the front armor if you will, for domestic security. and this is a very important component of domestic security. the jeel-polis amendment states that not later than 60 months after the date of this act the comptroller of the united states shall submit to the committee on homeland security of the house of representatives and the committee on homeland security and government affairs of the senate an assessment on the impact of privacy and civil liberties limited to the work of the national cybersecurity and communications integration center. the public benefit of this amendment is that it will provide public assurance from reliable and trustworthy source their privacy and siff civil liberties are not being compromised. the patriot act, that is now proposed, the american people understand their security but understand their privacy and
10:53 am
civil liberties. the intent of this report is to provide congress with the information regarding the effectiveness of protecting the prifesiff americans. we have gone through too much, we have been through too much hacking. we lost too much personal data from a number of retail entities and elsewhere for the american people not to be protected. this amendment will result in the sole external support on the privacy and civil liberties of the impact of the programs created under this bill. with that i reserve my time. i ask that my colleagues support the jacksonville amendment. the chair: the gentlelady from texas reserves. for what purpose does the gentleman from texas seek recognition? mr. mccaul: i ask unanimous consent to claim time in opposition though i am not opposed to the amendment. the clerk: without objection, the gentleman from texas is recognized for five minutes. mr. mccaul: thank you, mr. chairman. i support this amendment. the report required by this amendment would provide a quantifiable tool for transparency accountability, and oversight of american civil liberties. and address privacy concerns. privacy is a hallmark of h.r.
10:54 am
1731 and any opportunity to highlight to the american people how well d.h.s. is protecting their civil liberties while strengthening the cyberresilience of our federal and nonfederal networks is a welcome endeavor. the report will provide data on how well the program is working and will potentially identify any areas of improvement. which will further strengthen the robustness of d.h.s.'s cyberinformation sharing practices. i urge my colleagues to support this amendment and i yield back the balance of my time. the chair: the gentleman from texas yields back. the gentlelady from texas is recognized. ms. jackson lee: thank you very much. privacy is of great concern to the american public in a digital economy where personal information is one of the most valuable assets of successful online business. with that i gean ask for support of the jeel-polis amendment. i'm happy to yield back my time. i thank the chairman for his comments. i yield back my time. the chair: the gentlelady from texas yields back. the question is on the amendment offered by the gentlelady from texas. so many as are in favor say aye. those opposed, no.
10:55 am
in the opinion of the chair, the aye vs. it. the amendment is agreed to. pursuant to clause 6 of rule 18, further proceedings on the amendment offered by the gentlelady from texas will be pow opponented. -- postponed. it is now in order to consider amendment number 11 printed in part b of house report 114-88. for what purpose does the gentlelady from texas seek recognition? ms. jackson lee: i have an amendment at the desk. the chair: the clerk will designate the amendment. the clerk: amendment number 11, printed in part b of house report number 114-88. offered by miss jackson lee of texas. -- ms. jackson lee of texas. the chair: pursuant to house resolution 212, the gentlelady from texas, ms. jackson lee, and a member opposed, will each control five minutes. the chair recognizings the gentlelady from tfpblgts ms. jackson lee: this is a comprehensive approach, mr. chairman to the issue of cybersecurity and national cybersecurity protection. the amendment that i'm offering now states that the secretary of homeland security may consult
10:56 am
with sector specific agencies, businesses, and stakeholders to produce and submit to the committee on homeland security of the house of representatives and the committee on homeland security and government affairs of the senate a report on how best to align federally funded cybersecurity research and development activities with private sector efforts to protect privacy and civil liberties while assuring security and resilience of the nation's critical infrastructure. again i can recount the incidences that have brought this issue to the attention of the american people. certainly one of the moats striking -- most striking wases the actions of mr. snoweden. it's important we develop research that blocks those who would intend to do ill to the american people. it includes a development objective to enable the secure and resilient design and construction of critical infrastructure and more company signert technology. we want to have a firewall that stands as a firewall. and i believe that we have the capacity to have the r&d to do
10:57 am
so. the public benefit of this amendment is that it will make sure that as innovations occur in the private sector that can improve privacy and civil liberty protection that is they will be adopted by d.h.s. for its programs established by this bill. with that, mr. chairman, i ask for support of the jackson lee amendment and i reserve my time. the chair: the gentlelady from texas reserves. for what purpose does the gentleman from texas seek recognition? mr. mccaul: i ask unanimous consent to claim the time in opposition though i am not opposed to the amendment. the clerk: without objection, the gentleman from texas -- the chair: without objection, the gentleman from texas is recognized for five minutes. mr. mccaul: i support this amendment that ayou los the secretary of homeland security to consult with stakeholders and submit a report on how best to align federally funded cybersecurity research and development activities with private sector efforts to protect privacy and civil liberties while assuring security and resillents of the nation's critical infrastructure. the promotion of research and development activities to design resilient critical infrastructure that includes cyberthreats infrastructure that
10:58 am
also includes cyberthreat consideration in its plan is important as we build defenses defense the cascading effect of cyberattacks on critical infrastructure. again i want to thank the gentlelady for bringing this amendment and i urge my colleagues to support it. i yield back the balance of my time. the chair: the gentleman from texas yields back. the gentlelady from texas is recognized. ms. jackson lee: the american people, i thank the gentleman from texas, the american people deserve the kind of investigateor work. the results and r&d that provides the armor against the attacks we have noted are possible and have occurred. and with that i ask for support of the jackson lee amendment and yield back my time. the chair: the gentlelady from texas yields back. the question is on the amendment offered by the gentlelady from texas. so many as are in favor say aye. those opposed, no. in the opinion of the chair, the ayes have it. the amendment is agreed to. pursuant to clause 6 of rule 18, the unfinished business is the request for recorded vote on
10:59 am
amendment number 10 printed in part b of house report 114-88. by the gentlelady from texas ms. jackson lee, on which further proceedings with a postponed and on which the ayes prevailed by voice vote. the clerk will redesignated the amendment. the clerk: amendment number 10 printed in part b of house report number 114-88, offered by ms. jackson lee of texas. the chair: a recorded vote has been requested. those in support of the recorded vote will rise and remain standing. a sufficient number having arisen, a recorded vote is ordered. members will record their votes by electronic device. this will be a 15-minute vote. [captioning made possible by the national captioning institute, inc., in cooperation with the united states house of representatives. any use of the closed-captioned coverage of the house proceedings for political or commercial purposes is expressly prohibited by the u.s. house of representatives.]
11:00 am
11:01 am
11:02 am
11:03 am
11:04 am
11:05 am
11:06 am
11:07 am
11:08 am
11:09 am
11:10 am
11:11 am
11:12 am
11:13 am
11:14 am
11:15 am
11:16 am
11:17 am
11:18 am
11:19 am
11:20 am
11:21 am
11:22 am
11:23 am
11:24 am
11:25 am
11:26 am
11:27 am
11:28 am
11:29 am
11:30 am
11:31 am
the chair: on this vote the yeas are 405 and the nays are eight. the amendment is adopted. the question is on the amendment in the nature of a substitute. those in favor say aye. those opposed, no. the ayes have it. the amendment is adopted. accordingly under the rule, the committee rises.
11:32 am
the speaker pro tempore: the chair of the committee of the whole house on the state of the union reports that the committee has had under consideration the bill h.r. 1731 and pursuant to house resolution 212 reports the bill back to the house with an amendment adopted in the committee of the whole. under the rule the previous question is ordered. is a separate vote demanded on any amendment to the amendment reported from the committee of the whole? if not the question is on adoption on the amendment in the nature of a substitute. those in favor say aye. those opposed, no. the ayes have it. the amendment is agreed to. the question is on engrossment and third reading of the bill.
11:33 am
those in favor say aye. those opposed, no. the ayes have it, third reading. the clerk: a bill to amend the homeland security act of 2002 to enhanceualityy directional sharing of cybersecurity risks and strengthen civil liberties and freedoms and for other purposes. -- strengthen privacy and civil liberties protections and for other purposes. the speaker pro tempore: the house will come to order. the house will come to order. the house will be in order. >> mr. speaker. the speaker pro tempore: for what purpose does the gentleman from new york rise? >> mr. speaker, i have a motion to recommit at the desk.
11:34 am
the speaker pro tempore: is the gentleman opposed in the current form? mr. israel: i am. the clerk: mr. israel of new york -- the speaker pro tempore: the clerk will suspend. for what purpose does the gentleman from texas rise? mr. mccaul: i reserve a point of order. the speaker pro tempore: the point of order is reserved. the clerk: mr. israel of new york moves to recommit the bill h.r. 1731 to the committee on homeland security with instructions to report the same back to the house forthwith with the following amendment -- add at the end of the bill the following. section, protecting critical infrastructure, american jobs and health information from cyberattacks. a, in general subtitle c of title 2 of the homeland security act of 2002, 6 united states code 141 is amended by adding at the end the following new section -- section 232 protecting critical infrastructure, american jobs and health information from cyberattacks. a, in general the secretary of
11:35 am
homeland security shall undertake ongoing risk informed outreach including the provision of technical assistance to the owners and operators of at-risk critical infrastructure to promote the sharing of cyberthreat indicators and defensive measures. as such terms are defined in section 226 relating to the national cybersecurity and communications integration center. in carrying out this outreach, the secretary shall prioritize the protection of at-risk supervisory control and data acquisition. industrial control systems which are critical to the operation of the united states economy. b, prioritization. in carrying out outreach under subsection a, the secretary of homeland security shall prioritize the protection and welfare of the american people and economy and give special attention to protecting the following. one, united states critical infrastructure including the
11:36 am
electrical grid, nuclear power plants oil and gas pipelines, financial services and transportation systems from cyberattacks as attacks on industrial control systems increase by 100% in 2014 over the previous year. two, the intellectual property of the united states corporations particularly the intellectual property of at-risk small and medium-sized businesses in order to maintain united states competitiveness and job growth. the speaker pro tempore: the clerk will suspend. for what purpose does the gentleman from texas rise? without objection, further reading of the bill is suspended. the house will come to order. the gentleman from new york is recognized for five minutes. mr. israel: thank you, mr. speaker. mr. speaker, this is a final amendment. it will not kill the bill.
11:37 am
it will not send the bill back to committee. if adopted the bill will immediately proceed to final passage, as amended. mr. speaker, two weeks ago d.c. went dark. the lights went out, the power stopped near the white house, lights out, no power at the department of state. federal agencies were plunged into darkness. small businesses plunged into darkness. business stopped. the business of government stopped because there was a blackout. now, in this case mr. speaker this loss of energy was because of a blown transformer and there was no indication that this was the result of a cyberattack on our energy sources or systems. there are indications, mr. speaker, every day of attempted attacks on our critical energy infrastructure. and this amendment simply strengthens the response of the department of homeland security to protect our constituents, our government, our infrastructure and our country from this attack. mr. speaker, the house is not
11:38 am
in order. the speaker pro tempore: the gentleman's correct. the gentleman will suspend. the house will please come to order. the gentleman is recognized. mr. israel: thank you, mr. speaker. mr. speaker, in the first six months of 2012, we know there was a sustained and persistent cyberattack on critical gas pipeline control systems. now, the good news is that we successfully defended against those attacks. the bad news is, as we all know, the very nature of cyberwar means that every time you defend against an attack you are transmitting to your attackers what your defenses are. of the d.h.s. reports that of roughly 200 cases of major cyberattacks handled by the cybersecurity team in 2013, 40% were in the energy sector. there have been attacks on supervisory control and data
11:39 am
acquisition systems. those attacks doubled between 2013 and 2014. so we know these attacks are being attempted. we know how serious it is. we learned two weeks ago what happens when we plunge into the darkness. we know the economic devastation, the social devastation, the military devastation that will occur when an attack is successful, when a cyberattack against our energy systems succeeds. we know it's coming and we cannot wait until the day after when we ask ourselves in the dark why didn't we do more yesterday. this is like being told that pearl harbor is coming, that 9/11 is coming, knowing it's coming and deciding, are you going to do something about it or are you going to continue to bury your head in the sand? now, this amendment is very simple mr. speaker. it simply directs the department of homeland security to organize a strong concerted, focused partnership with energy companies throughout this country. those partnerships would provide technical assistance
11:40 am
from d.h.s. through energy companies and information sharing. these partnerships would be focused on critical infrastructure, the electrical grid oil and gas pipelines and nuclear power plants. mr. hoyer: mr. speaker, the house is not in order. the speaker pro tempore: the gentleman from new york will please suspend. the gentleman deserves the courtesy of being heard. please take conversations off of the floor. the gentleman from new york is recognized. mr. israel: mr. speaker, what happened in washington, d.c., on april 7 of this year can happen in any congressional district in this body. instead of a blown transformer, it will be a cyberattack against energy systems in any one of the districts represented here today mr. speaker. and when that happens, our constituents will ask us from that place in the dark, what did you do to prevent it and what did you do to protect me from it? and this vote on this motion to
11:41 am
recommit will be your answer. let's put the protection of our businesses, our government our military and our constituents ahead of partisanship and vote yes on this motion to recommit. with that i yield back, mr. speaker. the speaker pro tempore: the gentleman yields back. for what purpose does the gentleman from texas rise? mr. mccaul: mr. speaker i withdraw my reservation and rise today in strong opposition to the motion to recommit. the speaker pro tempore: the reservation is withdrawn and the gentleman from texas is recognized for five minutes. mr. mccaul: the gentleman from new york is correct regarding the nature of the threat. however, the activities he's discussed were authorized by congress last congress with a bill that i sponsored. in addition, the bill currently before the house strengthens those provisions. this bipartisan bill passed out of committee unanimously. this motion is nothing more than an 11th hour attempt to bring down the bill that we worked so har on to get to this
11:42 am
point where we are today. you know mr. speaker, people always ask me what keeps me up at night. in addition to the kinetic threats posed by al qaeda and isis it is a cyberattack against our nation that concerns me the most. this legislation -- mr. speaker, the house is not in order. the speaker pro tempore: the gentleman from texas lr suspend. -- will suspend. mr. mccaul: this legislation -- the speaker pro tempore: the gentleman is recognized. mr. mccaul: to protect americans. every day america is under attack. our office of capabilities are strong but our defensive -- our offensive capabilities are strong but our defensive capabilities are weak. the attack on target and home depot stole the personal information and credit cards of millions of americans. the cyberbreach at anthem compromised the health care accounts of 80 million individuals impacting one out of every four americans in the most private way. and north korea's destructive a
11:43 am
-- attack attempted to chill our freedom of speech. general alexander described this as the greatest transfer of wealth in history. at the same time iran attacks our financial sector on a daily basis in response to the sanctions. we also face a growing threat from cyberterrorists like the isis sympathizers who hacked into u.s. centcom's social media account. the speaker pro tempore: will the gentleman from texas please suspend? the house will come to order. take your conversations off of the floor. the gentleman will still suspend. the gentleman from texas is recognized. mr. mccaul: carry out a destructive cyberattack to bring things down into the united states, including our power grids. this bill protects our nation's networks both public and
11:44 am
private by removing legal barriers to the sharing of threat information. the bill's voluntary. it is both pro-privacy and pro-security and has widespread support from industry. it allows us to obtain the keys to information sharing to lock the door to keep nation states and criminals out. we cannot send a signal weakness to our adversaries. many mr. speaker, refer to the threat of a cyber-pearl harbor. my father, part of the greatest generation was a bomb deer on a b--- bombardier on a b-17. today, a new generation faces different threats to our national security and we must protect americans in this new frontier. we now live in a new threat environment where digital bombs can go undetected and cause massive devastation.
11:45 am
this bill will defend america from these attacks. inaction today mr. speaker, will be nothing short of reckless. it is urgent that we pass this bill today for if congress fails to act and the united states is attacked, then congress will have that on its hands. i urge my colleagues to vote against the motion to recommit and support this bill and yield back the balance of my time. . the speaker pro tempore: the gentleman yields back. without objection the priest question is ordered. the question is on the motion to recommit. those in favor say aye. those opposed, no. the noes have it. the motion is not adopt. the gentleman from new york. >> i demand a recorded vote. the speaker pro tempore: a recorded vote is requested. those favoring a recorded vote will rise. a sufficient number having risen , a recorded vote is ordered. members will record their votes by electronic device. this five-minute vote on the
11:46 am
motion to recommit will be followed by a five-minute vote on passage of the bill if ordered. this is a five-minute vote. [captioning made possible by the national captioning institute, inc., in cooperation with the united states house of representatives. any use of the closed-captioned coverage of the house proceedings for political or commercial purposes is expressly prohibited by the u.s. house of representatives.]
11:47 am
11:48 am
11:49 am
11:50 am
11:51 am
11:52 am
11:53 am
11:54 am
the speaker pro tempore: on this vote, the yeas are 180, the nays are 238. the motion is not adopted. the question is on passage of the bill. those in favor say aye. those opposed, no.
11:55 am
the ayes have it. the bill -- the gentleman from texas. >> i request a recorded vote. the speaker pro tempore: a recorded vote is requested. those favoring a recorded vote will rise. a sufficient number having risen, a recorded vote is ordered. members will record their votes by electronic device. this is a five-minute vote. [captioning made possible by the national captioning institute, inc., in cooperation with the united states house of representatives. any use of the closed-captioned coverage of the house proceedings for political or commercial purposes is expressly prohibited by the u.s. house of representatives.]
11:56 am
11:57 am
11:58 am
11:59 am
12:00 pm

108 Views

info Stream Only

Uploaded by TV Archive on