[国会记录第159卷,第52号(2013年4月17日星期三)] [HUSE] [页面H2088-H2103] {TIME} 1420网络情报共享和保护法案将军留下密歇根州罗杰斯先生。发言人先生,我提出了一致的同意,所有成员可能有5个立法日修改和延长他们的言论,并在票据中包括关于票据的外文材料。624.扬声器专业的讲话者。是否有反对绅士从密歇根州的要求?没有异议。扬声器职业游戏。Pursuant to House Resolution 164 and rule XVIII, the Chair declares the House in the Committee of the Whole House on the state of the Union for the consideration of the bill, H.R. 624. The Chair appoints the gentlewoman from Florida (Ms. Ros-Lehtinen) to preside over the Committee of the Whole. {time} 1422 In the Committee of the Whole Accordingly, the House resolved itself into the Committee of the Whole House on the state of the Union for the consideration of the bill (H.R. 624) to provide for the sharing of certain cyber threat intelligence and cyber threat information between the intelligence community and cybersecurity entities, and for other purposes, with Ms. Ros-Lehtinen in the chair. The Clerk read the title of the bill. The CHAIR. Pursuant to the rule, the bill is considered read the first time. The gentleman from Michigan (Mr. Rogers) and the gentleman from Maryland (Mr. Ruppersberger) each will control 30 minutes. The Chair recognizes the gentleman from Michigan. Mr. ROGERS of Michigan. I yield myself such time as I may consume. I want to thank my ranking member and both the Republican and Democratic staffs and the Republican and Democratic members of the Intelligence Committee for 2 years of long hours in negotiated efforts to reach the point that we are. I want to back up just a little bit and tell you how we got to where we are today. We sat down some 2 years ago when the ranking member and I assumed the leadership of the Intelligence Committee and we looked at the one threat that we knew existed but we were not prepared to handle as Americans, both the private sector and the government. And we knew that we had to do something about this new and growing and misunderstood cyber threat and what it was doing to our intellectual property across the country, what it was doing to the freedom and open Internet that we so enjoy and are increasingly dependent on and the commercial value of our growing economy. And it was at risk. The private sector was at risk because people were stealing their identities, their accounts, their intellectual property, and subsequent to that, their jobs, and people began to question the value of getting on the Internet and using it for commercial purposes. Their trust in the free and open Internet the way we've embraced it in the United States really was at risk. How do we solve that problem? We knew that nation states were investing millions and billions of dollars to generate cyber warriors to go in and crack your computer network. I don't care if you had intellectual property--those blueprints that made your business successful, or maybe it was your bank account, or your ability to have a transaction. If they could interrupt that, they could do great harm to our economy and to the United States. We saw nation-states like Russia and China and now Iran and North Korea and others developing military-style attacks to actually do harm to the U.S. economy, to hurt the very men and women who get up every day and play by the rules and think that the Internet would be a safe place for them to interact when it comes to commerce. We want that to continue. So we sat down and we talked to industry folks, people who are in the business, high-tech industry folks from Silicon Valley, financial services folks from New York City, manufacturers from across the Midwest, who were losing intellectual property due to theft from nation-states like China. We talked to privacy groups. We talked to the executive branch. And over the last 2 years, there were some 19 adjustments to this bill on privacy. We believe this: this bill will not work if Americans don't have confidence that it will protect your privacy and civil liberties while allowing one very simple thing to happen: cyber threat material, that malware that goes on your computer and does bad things, allows somebody else to take over your computer to attack a bank, allows them to go on your computer and steal your personally identifiable information and use it in a crime, allows them to go into your network at work and steal your most valuable company secrets that keep you alive and build great products here in the United States--could we allow the government to share what they know with the private sector and allow the private sector to share when it comes to just that cyber threat, those zeros and ones in a pattern that equates to malicious code traveling at hundreds of millions of times a second the speed of light, can we share that in a way to stop them from getting in and stealing your private information? And the good news is the answer is, yes, we can do this. We can protect privacy and civil liberties, and we can allow this sharing arrangement, but not of your identity, not of your personally identifiable information. As a matter of fact, if that's what's happening, it won't work. But at the speed of light, from machine to machine, from your Internet service provider before it ever gets into your network they bounce out the nastiest stuff that's in there that's going to take over your computer, steal your money, steal your personally identifiable information, steal your company secrets. And they can identify that by a pattern and kick it out. They'll say, Something looks bad about that. Can the government take a look at that and say, you know what? This is a Chinese attack, it's an Iranian attack, it's a North Korean attack--let's defend our networks. It's really very simple. Today, what you see is a collaborative effort. This isn't a bill by Dutch Ruppersberger and Mike Rogers and this is the only way it has to be. We have taken suggestions from all the groups I just talked about, from privacy to the executive branch to industry to other trade associations. And this is the bill that mutually all of those people, representing tens of millions of employees around this country, said this is the way you do this and protect the free and open Internet and you protect civil liberties. And you finally raise that big red sign that tells people like China and Iran and Russia, stop. We're going to prevent you from stealing America's prosperity. I heard a lot of debate earlier on the rule. I've heard a lot of misinformation. There are people who don't like it for whatever reason, maybe it's conviction, maybe it's politics, maybe it's political theater. And I have a feeling there's a little bit of all of that when they talk about this bill. This bill does none of the things I've heard talked about in the rule--that [[Page H2089]] it's an exchange of information that they've never seen with the government. This is not a surveillance bill. It does not allow the national security agencies or the Department of Defense or any of our military organizations to monitor our domestic networks. It does not allow that to happen. We would not allow that to happen. {time} 1430 So some notion that that's happening is just wrong, and some of the folks who are pretending otherwise know it's wrong. This is important. You know, the Iranians, by public report, are laughing at our shores, looking for weaknesses in our financial institutions. They're not doing it for benevolence. They're doing it to try to create chaos in our markets here at home. This isn't 10 years or 20 years. This is today. It's happening today. The average credit card in your purse, Madam Chair, will be hit 300,000 times today by bad actors trying to get in and steal your personal information--all those cardholders' information--and use it to commit a crime. Today, hundreds of millions of times across this great country companies will be besieged by DDoS attacks trying to overwhelm their systems and shut them down and not allow commerce to happen, by people who are trying to get into their networks and steal something valuable. This bill is that right balance between our privacy, civil liberties, and stopping bad guys in their tracks from ruining what is one-sixth of the U.S. economy. It's that important, and it's important that we get at it today. We must do more to improve our cybersecurity, and this bill is that vital first step toward that bill. Our intelligence agencies collect important information overseas about advanced foreign cyber threats that could dramatically assist the private sector. That information is the intelligence community's unique value-added when it comes to our cybersecurity. Unfortunately, we are not getting the full value of those intelligence insights. As I said, the intelligence community is not monitoring the Internet. They don't know what's happening on the domestic Internet. So when there is a nasty piece of source code or malicious source code attacking the private sector, the only way we're going to know that is if we--and these folks are victims of crime, by the way--if we allow them, in a classified environment, to share malicious source codes--zeros and ones in the right pattern--with the government and say, Hey, I am the victim of a crime. Here's what it looks like. Can you help? The government needs to be able to share this threat intelligence so that the private sector can protect its own networks. The government is going to reciprocate. Our intelligence services go overseas. They find out what the bad guys are doing. They come back and protect the government networks. The problem is, because of laws and policies and procedures, we can't share that with the private sector so they can protect their own networks. Wouldn't it be great if they know what's coming? If you know what you're looking for, you can stop it. That's really what we're talking about doing here, Madam Chair. We must also modernize the law to give the private sector clear authority to share cyber threat information within the private sector, as well as the government, on a voluntary, anonymous basis. Again, if you believe in the free and open Internet and you look at all the bills that have been introduced, there is a chomping at the bit in this town to go out and try to put their mitts on the Internet. They want to get in there and start regulating and standards and setting up procedures. They want to get in from business-to-business communication. They want the government to be at every corner of the Internet. I reject that wholly. It's the wrong approach. It will not work. It will bring the Internet to a halt. This is the only bill that doesn't have new mandates, new authorizations for any government involvement in the Internet. It does something very simple. I'm going to repeat it a lot today, Madam Chair. It allows the government to share zeros and ones in the right pattern with the private sector. And zeros and ones from the private sector, when they know it's malicious and attacking their networks, they share it with the government and say, This is a problem. Can you help me? That's what this bill does. And we've got a long list of privacy protections and restrictions to make sure that that's all that this bill does. The bill achieves all of these important goals that I just walked through, and it will empower the private sector, which already does significant work to protect computer networks, to do even more. The bill will allow the government to share cyber threat intelligence more widely with American companies in operationally usable form so they can help prevent state-sponsored cyber spies from stealing American trade secrets. It also provides clear, positive authority to allow companies to share cyber threat information with others in the private sector. It also provides authority to allow those companies to share threat information on a purely voluntary and anonymized basis with the government, meaning no personal identifying information. This bill will not require additional Federal spending. It will not require the creation of a vast new government bureaucracy. It will not impose any Federal regulations or unfunded mandates on the private sector. To the contrary, it will be a critical, bipartisan first step toward enabling America's private sector to better defend itself from the advanced state-sponsored cyber threats in which we live in today. I'm very proud of the open and transparent process that produced this bill. We've had a great conversation over the last 2 years with a broad range of private sector companies, trade groups, privacy and civil liberties advocates, and the executive branch. I appreciate all the constructive input we have received from the process. This bill has been revised every step of the way in this process, and all of that has been based on discussions with all the groups I just mentioned. I just want to cover some of the privacy protections we've added along the way. The bill prohibits the government from requiring private sector entities to provide information to the government. There is nothing in here that has any requirement that the private sector must share cyber threat information. If they don't think it's in their best interest to stop that cyber crime, they don't have to say a word. If they do, they're allowed to share just that cyber threat information with the right agencies in real time. Again, this is machine to machine so that they can deal with the international nature of that threat. It encourages the private sector to anonymize or minimize the information it voluntarily shares with others, including the government. In addition, the bill requires an annual independent inspector general audit and report to Congress of all voluntary information sharing with the government. That's another layer of oversight. We have built multiple layers of oversight into this bill so that we can gain the confidence of the public in its purpose, intent, and success. The bill significantly limits the Federal Government's use of information voluntarily provided by the private sector, including a restriction on the government's ability to search that data--very important. The bill also enforces the restrictions on the government by levying penalties against the government through Federal court lawsuits for any violations of those restrictions. Again, another layer of oversight. In the markup, we've made some progress, as well, between the ranking member and the members on the committee negotiating and working out what changes we can make to, again, improve the confidence that people have in this bill. We have improved this bill every step of the way for the last 2 years, and the markup was no different. At our markup, which voted the bill out of committee on a strong 18-2 vote, we adopted five important amendments to further strengthen the bill's protections and safeguards. We adopted an amendment by Mr. Langevin that made it clear that the bill contained no new authority to allow companies to hack back into networks in other companies. It certainly wasn't intended in the legislation. I thought it was a well-intended amendment. The last thing we want to do is [[Page H2090]] unleash digital vigilantism across the country and what that might do to our ability to continue to rely on the Internet as an engine of commerce. We've put in place the private sector use restriction that limits companies' use of information received to only cybersecurity purposes. Mr. Heck and Mr. Himes worked diligently on this amendment to improve the bill and make it very clear that this is just about cybersecurity and cybersecurity purposes. The bill previously gave the government authorization to create procedures to protect privacy and civil liberties and prevent the government's retention of personal information not necessary to understand a cyber threat. Last week's amendment makes those procedures mandatory. That was by Mr. Himes. We agreed that was the right place to put the burden to make sure there was no personal identifiable information that was not necessary to determine the nature of the attack. We also struck the bill's authorized government ``national security'' use of information received from the private sector. This would have provided the government flexibility in the future to address advanced cybersecurity threats. In conversations with government national security lawyers in recent months, they assured us that this flexibility wouldn't be required in the near future. In light of that, and given the widespread misunderstanding this language was generating, we thought it was prudent to take it out. Ms. Sewell from Alabama offered that amendment and worked with the committee to make sure it was adopted. We also added additional oversight in the already very strong oversight structure in the bill to monitor the government's receipt and use of cyber threat information voluntarily provided by the private sector. We added roles for the Privacy and Civil Liberties Board and the individual agency privacy officers to provide additional oversight of the government's use of information received from the private sector under this bill. I'm also very proud to cosponsor an amendment today with Mr. McCaul and Mr. Thompson of Mississippi, Mr. Ruppersberger and myself that would put a civilian face on the privacy sector cyber information sharing with this government. It was a concern by many. It was something we had long debates and conversations on, and I think we came to an agreement that will at least end that debate. It puts the appropriate civilian face so that, again, people can have confidence in the intention of this bill and what it will do to protect cybersecurity on networks or allow the private sector to protect their own networks and protect civil liberties of Americans. {time} 1440 Other elements of the government, such as the intelligence community, will still receive the information they need to play their important roles, but only after it has been minimized and screened by a civilian entity like the DHS or, in some rare cases, the FBI. This bill already contains several levels of strong protections to ensure that it improves cybersecurity without compromising our important civil liberties, but this bill will add a significant new privacy protection to that existing structure. Again, Madam Chair, you can see the level of effort that we are doing here to protect privacy and civil liberties and still have a workable bill that stops nation-states like China, Russia, Iran, and North Korea from getting into your networks and stealing your property. We have yet to find a single U.S. company that opposes this bill. In fact, we have the enthusiastic support of nearly every sector of the economy, because they are under assault from foreign cyber attacks and they need our help. They need it now. Companies and industry groups from across the country, including Intel, the chip maker, IBM, the Internet Security Alliance, the U.S. Chamber of Commerce, the Business Roundtable, TechAmerica, TechNet, companies of Silicon Valley, the Financial Services Roundtable, U.S. Telecom, the Nuclear Energy Institute, and the National Association of Manufacturers, just to name a few, have sent the committee letters of support. And that list is growing by the day of people who are encouraged by the very light touch of the government; no new programs, no new authorizations, it's not a surveillance bill. This is the only appropriate way to try to deal with this problem. By allowing the private sector to expand its own cyber defense efforts and to employ classified information to protect systems and networks, this bill will harness private-sector drive and innovation while also keeping the government out of the business of monitoring and guarding private-sector networks. This important legislation would enable cyber threat sharing and provide clear authority for the private sector to defend its own networks while providing strong protections for privacy and civil liberties. Madam Chair, with this great collaborative effort, with the effort facing this country, when you see this many Republicans and Democrats coming together, recognizing the threat and crafting a bill that meets that very important standard, this is the bill we should all stand up and enthusiastically support, and I reserve the balance of my time. Mr. RUPPERSBERGER. Madam Chair, I yield to the gentleman from Illinois (Mr. Gutierrez) for the purpose of making a unanimous consent request. (Mr. GUTIERREZ asked and was given permission to revise and extend his remarks.) Mr. GUTIERREZ. I thank the gentleman for yielding. Madam Chair, as a member of the House Permanent Select Committee on Intelligence, I am very familiar with the types of threats that this country faces every day and the serious ramifications of cyber vulnerabilities. This is an issue to which the committee has devoted a great deal of time and energy during the last year. In the cyber security realm these threats are growing in frequency and severity, so much so that the Director of National Intelligence, James Clapper, identified cyber security as a top threat facing this country earlier this year. Director Clapper stated in an open hearing just a month ago that the growing cyber capabilities of both state and non-state actors ``put all sectors of our county at risk, from government and private networks to critical infrastructures.'' We have seen more and more brazen attacks, from financial institutions and banks to news outlets, credit card companies, telecommunications providers and even government entities. I believe that we should make every effort to safeguard the privacy of Americans' personal information even as we take steps to prevent attacks to our electronic networks and attempts to steal trade secrets, facilitate critical information sharing, and protect our critical infrastructure. To that end, the committee made a number of improvements to the bill with bipartisan support during our markup last week. Most notably, we voted to remove the authority for private information to be used for broad non-cyber ``national security'' purposes. We also expanded oversight responsibilities for the Privacy and Civil Liberties Oversight Board and restricted usage of information received by private entities to cyber security information. The bill also requires the government to minimize any personal information that is unrelated to a cyber threat. The bill has improved since the last time it was considered by the House of Representatives in 2012. I understand that there remain areas of concern for some of my colleagues. I share your reservations and am disappointed that we were unable to adopt amendments to address some of the liability issues, require private sector entities to make ``reasonable efforts'' to remove irrelevant personally identifiable information, and establish the Department of Homeland Security as the primary receptor of cyber threat information. An amendment to place DHS as the primary agency was not made in order today and I hope that we can continue to work on an agreement to do that. I am sensitive to these privacy concerns and hope that we can continue to improve the Cyber Intelligence Sharing and Protection Act through amendments today and ongoing dialogue. However, my underlying concerns about the national security implications of ever-present and even escalating cyber attacks compels me to support the bill today. Mr. RUPPERSBERGER. Madam Chair, I yield myself such time as I may consume. Chairman Rogers and I are here today to discuss the Cyber Intelligence Sharing and Protection Act, known as CISPA. The bill simply allows the government to give cyber threat intelligence to the private sector to protect its networks from cyber attacks. I don't want to repeat a lot of what the chairman has said, but the first [[Page H2091]] thing I want to do is to acknowledge the leadership of the chairman. Three years ago, the chairman and I, when we took over the leadership of the House Select Intelligence Committee, realized how serious the threat of cyber attacks were to our country, to our businesses, to our health, safety, and welfare. We decided to pull together a group of representatives from different parts of this issue--we had the administration involved, we had the privacy groups involved, including the ACLU, we brought in the industry--because we knew that we had to put together a bill that would pass the House, the Senate and be signed by the President. So, what we attempted to do was get input, and then we put together a bill. And, by the way, the bill is only 27 pages--it's probably a record in this Congress--and we did read the bill. Now, what we attempted to do in this bill is to address a situation where now, the government cannot really communicate with the private sector to try to help protect our citizens, our businesses from cyber attacks. The reason for that is in 1947, there is a law that says that the intelligence community cannot communicate or pass information to another entity that does not have clearances. So, basically what our bill does is to allow the sharing of information, which we can't do now, to the private sector. Now, why is this important? This is something that is very important because most people don't understand this. In the United States of America we have 10 companies, called the providers, that control 80 percent of our network--80 percent of our network. So in order for us to protect the United States of America from cyber attacks, we need to make sure that the government has a partnership with the private sector and that they can pass the threat information so that the government can help protect. As an example, if your house is being robbed, you call 911 and the police department comes. That's the same scenario that we're looking at here, only it's a lot more sophisticated. Again, as the chairman said, passing information, mostly zeroes and ones, to the government so that we can work together to protect our network. Now, why is this so important? And I think it's important that we get into some of the issues of threats. Just recently, we understand, and we know, that The Washington Post, The New York Times, The Wall Street Journal, were cyber-attacked. And basically, our understanding is that they did this, especially China, to intimidate the paper sources within China. We had our U.S. banks. It is very serious for U.S. banks to be attacked and hacked. Most of what our banks have are records and information. And to be able to shut down a bank or to be able to manipulate or get privacy information could be very destructive to our banks, and yet this is being done, and it's been done for a period of time. Media reports have said that Iran, a rogue country that we know exports terrorism--we know what Iran's beliefs are, and yet reports have said that Iran attacked Saudi Arabia's oil company, one of the largest in the world, Aramco, and wiped out 30,000 computers in a weekend. And let me say this: Iran is not a very sophisticated company as it comes to cyber, but they have the sophistication to be able to knock out 30,000 computers and really shut their businesses down for a period of time. This is what's happening in the United States. Cyber Command, whose job it is to protect our military networks, estimated that in the last couple of years that we have had, the United States of America has had $400 billion--not million, billion--worth of American trade secrets being stolen from U.S. companies every year, costing these companies market share and jobs. That's probably the biggest theft in the history of the world, and yet we still are not able to help government working with business. You have Secretary Napolitano, the Director of the FBI, you have the Director of the NSA, Alexander, and all three have said one of the biggest fears they have now are these attacks, and that unless we have a sharing opportunity between government and between business, they feel that they cannot protect our country from these cyber attacks the way that they should. It's so important that we need to act now on this bill. Now, we can pass bills in the House all day long, but if the Senate doesn't pass a bill and the President doesn't sign it, where are we? We were able to pass our bill last year in a bipartisan manner, and yet our bill went to the Senate and it stalled and the bill didn't go anywhere, so Chairman Rogers and I started again. But, what we said to each other and we discussed was that we need to address the issue of privacy. Even though we felt strongly that our bill does protect privacy, we knew there were groups out there, especially the privacy groups, that felt that there was not enough protection in our bill. So we rolled up our sleeves, we listened to the issues raised by the privacy groups, the administration had issues with respect to privacy, and we changed the bill. Now, I don't want to repeat what the chairman said, but basically we made some significant changes to our bill to deal with the issue of privacy. We provided that first, there's a privacy and civil liberties oversight board, and now that board must review our program. That's one area of oversight. In the intelligence community, we have privacy officers in each department, in each area. And these privacy people have to look at the threat information. They must also conduct a classified and unclassified review. That's the second oversight that was changed in the bill. {time} 1450 An annual report must be sent to Congress. We also have what we call the ``inspector general,'' whose job it is to oversee the different agencies they represent. Those are four areas of oversight just in the bill. Regarding the privacy agreements that we were concerned about, we only have five elements where this bill applies. That means if you're a tax cheat and we pick up some information, that can't be used against you. The privacy agreements were concerned about the issue of national security being one of those elements in this bill. They thought it was too broad. So Chairman Rogers and I got together, and we were able to get the votes from both sides of the aisle, and we were able to take a position that the national security issue is not in the bill anymore. We feel national security is being covered by one of the elements in the bill that says it deals with the issue of protecting people's lives or liberty. So we feel that we have covered national security. One of the most important issues was the issue of minimization. What is minimization? Most people don't know what it is. Basically, minimization is if private information is passed, there needs to be an entity out there that will take that private information out so that it is not used. We've now added to the bill that any of the zeroes and ones that are passed--and that's what's happening--if there was some reason why somebody's personal information is passed when those zeroes and ones are coming back and forth, now we have what we call 100 percent minimization, and the government will make sure that every single entity and all the information that is passed will be 100 percent minimized. If there is any personal information in there at all, it will be knocked out. That's very significant, and that gives a lot of coverage. This is also important: you don't have security if you don't have privacy. That was one of the themes Chairman Rogers and I used in the beginning: if you don't have security, you don't have privacy. Even though we thought our first bill had it, we felt there was a certain perception, we heard what was said and we made these changes. There is one other issue that is out there that's very important that I think is also extremely relevant. That's the issue of when the information is passed when we're attempting to protect our citizens and our businesses from these attacks and hopefully from a destructive attack like Iran did to Aramco in Saudi Arabia, there was a perception out there which, again, had to deal with perceptions. The perception was that if this information of zeroes and ones that are being passed back and forth, what is the point of entry. We did not want the perception to be that the military in any way would be in charge or would [[Page H2092]] be the entity that is overseeing this. We felt very strongly that it had to be civil. So Chairman Rogers and I, along with Chairman McCaul of the Homeland Security Committee and Ranking Member Thompson, have an amendment here today which is very significant. I'm sure it will be very well received by the privacy groups in the White House. What the bill will now say is that when information is passed, it will be the Department of Homeland Security. That is very significant, and we would hope that that would truly deal with the majority of these privacy issues. We know that we have to move and we have to move quickly. We're here today to debate this bill. And, again, Chairman Rogers--he's not listening, but I'll say it anyhow--has shown tremendous leadership. I say this and I say it sometimes in jest, that I was a former investigative prosecutor and he was a former FBI agent and all good FBI agents must listen to their prosecutors, even if we're in the minority. That was a joke. Not withstanding that, he has shown leadership. We threw partisanship out the window. We knew the stakes were high. We have been concerned that we have not been able to protect our country. I believe that Congress needs to act because we're standing in the way of protecting our country. This reminds me of a situation. We know how serious Hurricane Sandy was. It's similar to if you are a meteorologist and Sandy is coming up the east coast and you can't warn your constituents that Sandy is coming. That's why we need to pass this bill tomorrow, and we need to do it for the benefit of our country. And I do want to end with this: you do not have security if you don't have privacy. We feel that this bill, along with the amendments that will be introduced today, will effect that. With that, I reserve the balance of my time. Mr. ROGERS of Michigan. Madam Chair, I yield 3 minutes to a current military officer and great member of the Intelligence Committee, the gentleman from Nevada (Mr. Heck). Mr. HECK of Nevada. I want to begin by thanking both the chairman and the ranking member for their incredible leadership on this very difficult task. It was especially gratifying to work in such a bipartisan manner to come to the final product that we'll be voting on later tomorrow. Madam Chair, our Nation is under attack every day, every hour, every minute. Cyber attacks on our Nation's networks threaten our economic and national security. That is why I rise in support of H.R. 624, the Cyber Intelligence Sharing and Protection Act. Whether it is hacktivists attempting to disrupt services, criminals intent on stealing personal information, spies looking for intellectual property or trade secrets or nation-states searching for military and security vulnerabilities, our networks are at risk. Cyber looting puts U.S. businesses at a competitive disadvantage, threatening jobs and our private information. The same vulnerabilities used to steal intellectual and personality property are also exploited to target America's critical infrastructure, such as our electrical grids and our banking and financial institutions. These cyber weaknesses make the intelligence-sharing provisions within H.R. 624 vitally important. However, as we seek to secure and defend the U.S. economy and our country's critical infrastructure, we must be mindful of our Nation's founding principles. We must ensure that we protect our citizens' privacy and civil liberties. The House Permanent Select Committee on Intelligence has sought the input of and worked closely with privacy and civil liberties groups to strengthen the bill and provide necessary individual protections. These discussions resulted in a number of amendments that were adopted on a broad bipartisan basis during the committee markup. My amendment, offered with my colleague from Connecticut (Mr. Himes), specifically limits the private sector's use of cyber threat intelligence only to a cybersecurity purpose. This provision addresses the concerns and misperceptions that private sector companies could have used this information for marketing and other commercial purposes. Another amendment requires the establishment of minimization procedures to limit the receipt, retention, and use of personally identifiable information, or PII. In the unlikely event that PII is inadvertently shared, this provision will prevent the government from receiving and/or maintaining that information while still ensuring rapid transmission of critical cyber threat intelligence necessary to protect our systems. Yet another amendment narrows the authorized use of shared cyber threat intelligence by striking the provision providing the government broad authority to use this information for national security purposes. All of these bipartisan amendments will provide the private sector the necessary tools to protect its own networks while at the same time providing critical protections for privacy and civil liberties. This legislation represents an important first step toward securing our Nation's intellectual property and critical infrastructure from cyber attack, and I urge my colleagues to support its passage. Again, I thank the chairman and the ranking member for their leadership. Mr. RUPPERSBERGER. Madam Chair, I now yield 2 minutes to a senior member of our committee who worked very hard on this bill, the gentleman from California (Mr. Thompson). He's been with us for the last 3 years attempting to pass a bill that will help our country and protect us. Mr. THOMPSON of California. Madam Chair, I thank the gentleman for yielding, and I thank both the ranking member and the chairman for their good work on this measure and for including all of us in trying to build a better product. Clearly, the threat of a devastating cyber attack is real and, as has been mentioned by a number of previous speakers, can't be understated. Advanced cyber attacks from China and other nation-state actors are stealing hundreds of billions of dollars' worth of cutting-edge research and development from our U.S. companies and even from our Federal Government. That's why it's essential that the business community and the Federal Government work together to share cyber threat information for the purpose of protecting the American people from the fallout of cyber attacks and cyber hackers. While it's important that we protect against the threat of cybersecurity, it's equally as important that we recognize the responsibility to protect the constitutional rights of law-abiding citizens. Though I support H.R. 624, both for the fact that it is important that we address these issues and because I believe it needs to be moved on and we can get it in conference committee with the Senate bill, I remain somewhat concerned that the bill as drafted could lead to the broad sharing of consumer information which in turn could be used in ways unrelated to combating cybersecurity threats. {time} 1500 I emphasize ``could be used.'' Already the chair and the ranking member have accepted and we've incorporated a series of provisions in this bill that I authored that would minimize the sharing of some personally identifiable information, that would limit permissible uses of information which would be shared under this bill, and that would insist on a number of reporting requirements that will ensure Congress' ability to provide the necessary oversight of this program. The CHAIR. The time of the gentleman has expired. Mr. RUPPERSBERGER. I yield the gentleman an additional 30 seconds. Mr. THOMPSON of California. So, taken together, these provisions will improve the transparency and the accountability of this bill. However, notwithstanding these important changes, the bill is not perfect. Given the significance of this threat and the commitment of everyone to continue to work together, I strongly urge my colleagues to support this bill and to move it out of the House. Let's get the thing to conference. Let's get the best bill possible, get it signed into law, and work together to protect the American people. Mr. ROGERS of Michigan. Madam Chair, I am proud to yield 3 minutes to a leader on the Homeland Security [[Page H2093]] Committee and the chair of the House Admin Committee, the gentlelady from Michigan (Mrs. Miller). Mrs. MILLER of Michigan. I thank the gentleman for yielding me time. Madam Chair, let me just read for our colleagues the preamble of our Constitution: We the people of the United States, in order to form a more perfect Union, establish justice, insure domestic tranquility, provide for the common defence, promote the general welfare, and secure the blessings of liberty to ourselves and our posterity, do ordain and establish this Constitution for the United States of America. Madam Chair, this great statement that is the foundation for our Federal Government provides us the direction that we need to our primary responsibilities. I would suggest that this legislation helps us fulfill every one of the responsibilities mandated on us by our Constitution. Now let's just take them one by one. ``Establish justice''--it is just to protect American companies from the theft of their intellectual property by attackers and by competitors. ``Insure domestic tranquility''--can you even imagine the threat to domestic tranquility if our power grid is successfully attacked by a foreign state like North Korea and this Nation is left in the dark? ``Provide for the common defence''--what is more common than our power grid, our financial system and our economy? Are we not required to defend all of that? ``Promote the general welfare''--again, if our power grid is taken down, it is impossible to promote the general welfare. ``Secure the blessings of liberty to ourselves and to our posterity''--our intellectual property, made with American ingenuity, our life savings in banks, under threat from foreign actors, our jobs, our economy. All of these blessings of liberty are currently at risk if we do nothing. I've heard some suggest, Madam Chair, that they have constitutional concerns about passing this bill. I would just suggest to them that I believe strongly that you should have constitutional concerns about not passing this bill. I do not believe that our Constitution gives foreign state actors like China or Russia or North Korea or Iran uncontested access to the critical systems of private American companies. To the contrary, I believe that our Constitution requires us, the Federal Government, to defend them. I certainly want to applaud the great work that has been done by the chairman of the House Intelligence Committee, Mr. Rogers of Michigan, and certainly applaud our ranking member, Mr. Ruppersberger. Gentlemen, you have worked so closely together on your committee and with other committees as well on this great piece of legislation. I would urge all of my colleagues, Madam Chair, to join me in fulfilling our oath and in voting ``yes.'' Mr. RUPPERSBERGER. Madam Chairwoman, I yield 2 minutes to a great Member from the State of Illinois (Mr. Enyart). Mr. ENYART. Madam Chair, I rise today in support of this important legislation. The threat we face today from cyber attacks poses a clear and present danger that must be addressed. When I was sworn in to Congress to represent the people of southern Illinois, I took a vow to protect them from all enemies, both foreign and domestic. It was not the first time I had taken such an oath. By supporting CISPA, we move to fulfill our oath. I know there are good Americans who oppose this legislation because they believe the protections for civil liberties and privacy don't go far enough, but we must not let the perfect be the enemy of the good. This bill prohibits the government from forcing private sector entities to provide information to the government. It places restrictions on the use of any data voluntarily shared. The bill provides for strong congressional oversight. These are tremendous victories to protect our civil liberties. I support this bill because American jobs hang in the balance. Every day, our companies are subject to cyber attacks seeking to steal valuable trade secrets which deprive American citizens of high-paying high-tech jobs. Locally, my hometown grocery store in southern Illinois, Schnucks, was recently hacked, and customers' debit and credit card information was compromised, making many of my constituents vulnerable to theft. I cannot stand by and let an opportunity to prevent such actions pass me by, which is why I stand in support of this legislation. To protect the jobs of those who work to build planes at Boeing in Belleville or workers at Afton Chemical in Sauget, I must support this legislation. To ensure that those who make weapons to defend our country at General Dynamics in Marion, Illinois, don't lose their jobs because some Chinese hacker has stolen proprietary information, I must support this legislation. As the weapons of warfare change and adapt, we must make the necessary adjustments to protect our Nation while adhering to our founding principles. I urge my colleagues to join me in support of this act. The CHAIR. The gentleman from Maryland has 14\1/2\ minutes remaining, and the gentleman from Michigan has 5\1/2\ minutes remaining. Mr. ROGERS of Michigan. Madam Chair, I yield 2 minutes to a former military officer, the distinguished gentleman from Kansas (Mr. Pompeo). Mr. POMPEO. I want to thank Chairman Rogers and Ranking Member Ruppersberger for all of their hard work over many months, now years, in bringing this to where we are today, and I want to thank all of the committee staff who worked so hard to bring it to this point as well. I'd like to keep things pretty simple. If there were a sergeant from the Chinese People's Liberation Army inside one of our power plants or inside one of our banks and if they were trying to steal stuff and if they were looking around, trying to figure out how to get in and how to access our systems or to take property or to do damage to our power grid, the American people would demand that the government do whatever it could, and they would be thrilled to learn that that company was permitted and, indeed, protected if it decided to share with others that potential threat to its piece of the infrastructure. That's what we're doing today. The world has changed just a little bit. In just this last month, the last M-1 tank left Europe. It's the first time we haven't had a tank in Europe since D-day when the great Kansan invaded on the great quest to free us from Nazi totalitarian domination. There are no tanks. We fight in a different world today. We use the word ``cyber,'' and sometimes folks forget what we're really talking about. We're talking about nation-states trying to do terrible harm to American interests, to American property and, indeed, to American civil liberties. Now, in the last minute I have here, I want to talk about a couple of myths that have arisen about this piece of legislation. When I first learned about it, I, too, shared some of the concerns about what might be happening, about what might take place here. I offered an amendment last year, which is now incorporated into the bill, along with dozens of such amendments, to make sure belt-and-suspenders that we protected civil liberties. I've heard the myth propagated that this piece of legislation violates contract rights, that somehow through CISPA we're going to take away the ability of people to negotiate privately for contractual things that they want. I don't know how that could be. This bill is purely voluntary. It mandates that no one participate. It simply allows businesses to voluntarily participate and share information they have about attacks that have been foisted upon them. I've heard a second myth that this will authorize warrantless searches across the United States of America. The CHAIR. The time of the gentleman has expired. Mr. ROGERS of Michigan. I yield an additional 60 seconds to the gentleman. {time} 1510 Mr. POMPEO. There's talk about warrantless searches all across America. The legislation does no such thing. It's a short bill. It's 26 pages. I would urge everyone to go read it for themselves. It fairly clearly limits what government may do, what information government may receive. It limits what private companies can share with government and amongst themselves. It [[Page H2094]] limits what government can do with that information once it is received. It has greatly capped what is going on here. Its design is simple: it is to make sure that all of the information about direct attacks on America are widely known, easily disseminated, and available for all to help in the protection of the American state. I urge my colleagues to support this legislation. Mr. RUPPERSBERGER. Madam Chair, I yield 2 minutes to my good friend, the gentleman from Rhode Island (Mr. Langevin); and I do want to say that we've been working together for years on this issue of cybersecurity, and I consider him to be one of the experts and one of my closest friends working on this issue. (Mr. LANGEVIN asked and was given permission to revise and extend his remarks.) Mr. LANGEVIN. Madam Chair, I thank the gentleman for yielding. I rise in strong support of H.R. 624, and I do thank Chairman Rogers and Ranking Member Ruppersberger for their commitment to a bipartisan and inclusive process on a very, very challenging issue. We know with certainty that cybersecurity threats that we face are real, and they are increasing both in number and sophistication every day. Congress may not have acted last year, but those who would use cyberspace for nefarious purposes certainly did, and they continue to steal intellectual property, identities, funds from bank accounts, and sensitive security information. I know full well that this is not a perfect bill, such is the nature of the legislative process. But we need the authority that CISPA provides to allow the voluntary sharing of cybersecurity threat information. Improvements, I should point out, have been made over last year's bill. Several amendments have already been adopted to alleviate many privacy concerns, and more may be adopted before we are done. I welcome such progress. This bill is an important step, but information-sharing is only one portion of the broader cybersecurity debate. I have long maintained that we must also work to ensure the creation of minimum standards for critical infrastructure; the education of a strong and vibrant future cybersecurity workforce; and effective Federal and military cyber structure, including a Senate-confirmed cybersecurity director with real authority, including comprehensive budgetary authority; and the coordination of research and development on cybersecurity across the Nation. Together with the President's recent executive order, I believe CISPA and the bills this House approved yesterday are a very promising beginning, but there is obviously much more to be done. Again, I want to thank Chairman Rogers and Ranking Member Ruppersberger for their efforts. I commend them on a collaborative approach to a very important issue, and I ask my colleagues to support this important measure. Mr. ROGERS of Michigan. I don't have any further speakers, and so I will continue to reserve the balance of my time to close. Mr. RUPPERSBERGER. I yield 2 minutes to the gentlewoman from Illinois (Ms. Schakowsky), who is a senior member of our committee and has worked very hard on this issue. Ms. SCHAKOWSKY. Madam Chair, I sincerely want to thank the chair and ranking member of the Intelligence Committee and express my appreciation for all of their efforts to work in a bipartisan manner and to address the concerns raised by me, by civil liberties groups, and by the White House. However, I rise today in opposition to the bill. While I strongly believe that we need to address the serious cybersecurity threat--there is no question about that--I think we can do it without compromising our civil liberties. Despite some positive changes, I feel this bill fails to adequately safeguard the privacy of Americans. Cybersecurity and privacy are not mutually exclusive, and this bill fails to achieve a balance between protecting our networks and safeguarding our liberties. Yesterday, I offered an amendment that would have made critical advances toward protecting privacy. My amendment would have required that companies report cyber threat information directly to civilian agencies, maintaining the longstanding tradition that the military doesn't operate on U.S. soil or collect information of American citizens. Another important amendment offered by Congressman Schiff would have required companies to make ``reasonable efforts'' to remove personal information before sharing cyber threat information. Unfortunately, those critical amendments were not made in order. Yesterday, the Obama administration expressed ongoing concerns about this legislation, issuing a veto threat. I share the President's concern--despite positive changes, this bill falls short in several key ways. As written right now, and hopefully there still may be some changes, CISPA allows the military to directly collect personal information on American citizens. It fails to safeguard privacy of Americans and grants sweeping immunity to companies for decisions made based on cyber information, prohibiting consumers from holding companies accountable for reckless actions and negligence. The CHAIR. The time of the gentlewoman has expired. Mr. RUPPERSBERGER. I yield 30 seconds to the gentlewoman. Ms. SCHAKOWSKY. I do urge my colleagues to oppose this bill. We can and should do better, and I'm hopeful that we still will do better. Mr. ROGERS of Michigan. Madam Chair, I yield myself 30 seconds. I just want to make very, very clear--and I thank the gentlelady for working with us, she is a great member of the committee--nowhere in this bill does it allow the military to collect information on private citizens in the United States. This is not a surveillance bill. It does not allow it to happen. That needs to be very, very clear in this debate. It does not allow the military to surveil private networks in the United States. Period. End of story. That's the biggest part of our privacy protections. Again, I want to thank the gentlelady for working with us, but that's just an inaccurate statement, and I want to make that clear for the Record. I reserve the balance of my time. Mr. RUPPERSBERGER. Madam Chair, how much time do I have remaining? The CHAIR. The gentleman from Maryland has 10 minutes remaining. Mr. RUPPERSBERGER. Madam Chair, I yield 2 minutes to the gentlewoman from Texas (Ms. Jackson Lee), a very active member of our caucus. Ms. JACKSON LEE. I thank the distinguished ranking member and the chairman, as well, for working to answer an enormous concern on the question of national and domestic security. Since Robert Tappan Morris in 1988 released one of the first commuter worms, we realized, as the computer and the Internet now have grown, the proliferation of computer malware, or computer programs designed specifically to damage computers or their networks or to co-opt systems or steal data, has attracted public and media attention and that we needed to do something. Now more than ever, cybersecurity impacts every aspect of our lives. As a member of the Homeland Security Committee, I can assure you that my concern about the electric grid utilities, the energy and financial industries, recognize that it is important to act, and to act with speed and understanding. Likewise, I am concerned about the rage in epidemic of hackers and the impact that it has on 85 to 87 percent of the infrastructure in this Nation. For that reason, however, I believe that along with this effort, we should have a lead civilian agency to collect the data. I'm looking forward to the manager's amendment, which I hope will clarify that Homeland Security will be that. In addition, I have offered an amendment. My amendment ensures that if a cloud service provider identifies or detects an attempt by someone to access, to gain unauthorized access to nongovernmental information stored on the system, it would not be required or permitted to report that attempt to the government and it cannot share that information with the government. I thank the Rules Committee for allowing that amendment to be in. I do, however, want to raise the question on privacy. I believe that we could [[Page H2095]] fix this legislation with a small addition dealing with the privacy question as we hopefully address the question dealing with the lead civilian agency. I thank the chairman and the ranking member, and I look forward to further discussion on this legislation. Mr. ROGERS of Michigan. I continue to reserve the balance of my time. Mr. RUPPERSBERGER. Madam Chair, I yield 2 minutes to the gentleman from Colorado (Mr. Polis), a member of the Rules Committee. Mr. POLIS. I thank the gentleman. This bill, unfortunately, hurts what it purports to help. It's detrimental to job growth, innovation, and privacy. {time} 1520 We talked a bit about the process whereby a number of amendments that would have improved it were not allowed to be discussed or voted on on the floor. And there are still enormous flaws with this bill which need to be addressed. Look, to the extent that companies believe that information-sharing is important, it should be done in a way that's consistent with sanctity of contract. If there's something that gets in the way of information-sharing, we need to identify it. That hasn't been identified. Clearly, the answer is not to say whatever a company agrees upon with a personal user, even if explicitly it says we're going to keep your information private, the minute after that's agreed to by a user, the company would be completely indemnified by turning all this information, personal information, credit card information, address, everything, over to the government. Now, why not remove anything? Why not just pass along the parts that are related to cybersecurity? There's no incentive to do so. Had there been a requirement that reasonable efforts were taken to delete personal data, that would have been a step in the right direction. But, again, it's an extra cost with no benefit for the company to delete personal data because they're completely indemnified with regard to this matter without the consent of the user himself. What happens to this information once it reaches the government? It can be shared with any government agency. It can be shared with the Bureau of Alcohol, Tobacco and Firearms, the National Security Agency, the Food and Drug Administration. Again, the limitations are so open-ended that anything that relates even to a minor scratch or a cut, issues completely unrelated to cybersecurity, things that could be related to dog bites, essentially any information. Part of the problem here, there are cyber attacks everywhere. I ran an e-commerce site. Tens of thousand every day. I mean, any e-commerce company experiences this every day, so it's a reality every day. Everything is a potential cybersecurity threat. There's people cracking passwords every day. So all information is affected by this, under this bill, in its present form, turned over to the government, shared with every agency relating to any bodily injury or harm, and we haven't been offered an opportunity to amend that. So I encourage my colleagues to vote ``no'' on this bill. We can and we must do better for our country. Mr. RUPPERSBERGER. I yield 2 minutes to the gentlewoman from Alabama (Ms. Sewell). Is it ``Roll Tide''? She is an outstanding new member of the Intelligence Committee. She's smart. She works hard. She's very dynamic, and she is our closer today. Ms. SEWELL of Alabama. Madam Chair, today I rise to support the bill. I can say, Madam Chair, that I actually voted against the bill last term. But today I am proud to say, because of the hard work of both the chairman and the ranking member and so many members of this committee, that today I stand before you in support of the bill. I am now a new member of the Intelligence Committee and, as I've told my staff, the more you know, the better you can vote. And today, I want to rise to explain why I am voting for this bill. I think that everybody agrees that there are cyber threats each and every day. And, in fact, Director Clapper, the Director of National Intelligence, he actually said his number one thing that keeps him up at night is cyber attacks. And what this bill will do is simply to share information. It is not about releasing personal identifiable information. That is strictly prohibited by this bill. So it is strictly prohibited by this bill. And this bill has been greatly enhanced by so many of my wonderful colleagues who have submitted amendments, many of which I am sure will pass tomorrow, as well as greatly enhanced by the amendments that were brought forth by committee members. I shared some serious concerns about some privacy protections when I came on the committee, and I have to tell you that the committee was gracious enough to listen to the amendments that I offered, as well as other amendments that were offered by my colleagues on this side of the aisle. I was surprised, given the partisan nature of politics here in this House, that the Intelligence Committee really tries, because of our national security, to work together. And in a true bipartisan manner, many of those privacy protections were unanimously agreed to by members of the committee. Once again, I urge my colleagues to vote for this bill, and I urge the President to sign this bill into law. Today, I rise in support of this bill. But Madam Chair, last year, I voted against the cybersecurity bill that was offered in this body. I am now and am honored to serve as a member of the Intelligence Committee and the more you know, the better you can vote. I want to commend the Chairman and the Ranking Member for their leadership to improve this legislation. I also want to thank all of my colleagues who offered amendments to strengthen this bill by providing more privacy protections for our citizens and improving inter-agency coordination. While this is not a perfect bill, this is a step in the right direction and I am hopeful that the Senate will take up this measure and make it even stronger. It is also my hope that the White House will continue to work with us in this body's effort to be proactive instead of reactive. Madam Speaker, we simply cannot afford to wait--The threats against our national and economic security are real. Attacks against our financial, energy and communication sectors are happening every day. We have received dire warnings from our defense and intelligence officials that widespread attacks are the number one threat to our national security above all else. The Director of National Intelligence, James Clapper, has elevated cyber threats to the top of the list of national-security concerns. The National Intelligence Estimate provided evidence of widespread infiltrations of U.S. computer networks. Evidence has also emerged of spying inside the computer networks of major U.S. media, including the Wall Street Journal and New York Times. Defense and intelligence officials have grown increasingly alarmed over a relentless cyber attack campaign against U.S. banks, critical infrastructure and a host of other private entities. We must continue to work together to find a balance between preserving privacy and protecting the security of this country from the danger of cyber attacks. Sharing cyber threat information, as provided for in this bill, is vital for combatting malicious hackers, criminals, and foreign agents. By removing the legal and regulatory barriers currently impeding the free flow of actionable information, the Cyber Intelligence Sharing and Protection Act (CISPA) will promote nimble, adaptive innovation--the best strategy for defending against a rapidly evolving threat landscape. This growing number and complexity of cyber attacks on private and government computers has provided an opportunity for us to join together and pass bipartisan legislation to address the problem. I am committed to finding a workable solution with the Senate and White House, and I believe this bill provides a solid framework on a critical issue for national and economic security. I look forward to considering any amendments my colleagues put forth today to help improve the legislation of this bill. And though I realize this is not a perfect bill, I think the time to act is now to protect our national security. I urge members to vote for this legislation. Mr. RUPPERSBERGER. Madam Chair, I yield myself as much time as I may consume. First thing, we've heard testimony today about how serious the cyber attacks are to our country. We know what has occurred already. We know that our banks have been attacked, our major banks. We know that our newspapers, New York Times, Washington Post, have been attacked. We know that news reports have said that Iran attacked Aramco, Saudi Arabia's largest oil company. They took out 30,000 computers, which means we are subjected to those attacks also. We also know that Cyber Command has said that we, in the United States, [[Page H2096]] have lost, from the attacks on our businesses, approximately $200 billion. Just think what that equates to in jobs, stealing information about trade secrets, about competing globally with a country like China where they have all of our information, where they're able to shut down banks. This is a very serious issue, and we need to do a better job to educate the public on how serious it is. And we just hope that we can pass this bill today in the House, a bill in the Senate, and the President signs the bill, so that we can protect our citizens, we can protect our businesses from these attacks. If we knew that Iran was sending over an airplane with a bomb we would take it out. And yet we have to make sure that we deal with the issue in the United States of America to protect ourselves. Now, there was a major issue raised, and that issue was privacy. And believe me, I want to say this over and over again. You don't have security if you don't have privacy. And we feel very strongly that this bill provides privacy. But we also know, Chairman Rogers and I know, that if we pass a bill here, we need to pass a bill in the Senate, and we need the President to sign it. So we got together, and even though we passed our bill in a bipartisan effort last year and it stalled in the Senate, we now have made the bill what we feel is a lot stronger as it deals with the perception of privacy. And we've added oversight. We have four categories of oversight, privacy. We've made sure that minimization--taking out any privacy information that might pass--we made sure that that is 100 percent minimization so that no one's private information will pass. But the most important thing is that we have to make sure that we pass a bill because of the fact that 80 percent of our network is controlled by 10 companies in the United States of America. And all of our experts in this area have said that if government and business can't share information about these attacks, zeros and ones, if they can't share information, they cannot protect our country from these ongoing attacks that are occurring as we speak right now. So let's act. Let's not wait until we have another catastrophic attack like 9/11. Let's deal with this now. Let's pass the bill and make sure that we protect, again, our citizens. And I want to say it one more time. The issue that you can't have security if you don't have privacy. I do want to also say, I want to thank all those individuals in our government, in the private sector. The privacy groups have all come together. This has been a good debate. It's been a debate about issues that the public needed to know. And I also want to thank the chairman for his leadership, and the fact that he was willing, even though we had our bill passed a year ago, he was willing to deal with the issue of perception and to make sure we made privacy an element that we could deal with, and that we could change our bill to deal with certain perceptions. I feel that we've done that. I also want to thank Chairman McCaul from Homeland Security and Ranking Member Bennie Thompson from Homeland Security, who've worked with us to get an amendment that was very important, as you heard from Jan Schakowsky. That amendment basically says that the point of entry for any communication is on the civil side of our government, Homeland Security, and we hope to pass that amendment. And I feel very strongly that if we do that, we will have addressed the majority of the issues that are so important to this bill and to our security and to our privacy. I yield back the balance of my time. Mr. ROGERS of Michigan. Madam Chair, I yield myself the remaining time. I just want to quickly, Madam Chair, address some of the moving targets on the bill. When we move to change something in the bill, the 19 privacy amendments, people who still decide they don't like it for, again, whatever reason, move their challenges of why they don't like it. The newest, I think, straw man is that this somehow would violate contract law. Nothing in this bill allows you to avoid contract law. Nothing. {time} 1530 It's a red herring. It is not accurate. Nothing in this bill would allow this to happen. The fact that someone who was in the technical business would say this hurts job growth, that's interesting. The sheer number of companies who support this, from the Business Roundtable to the Financial Services Business Group to TechNet, who has companies like Intel Corporation, Symantec, Juniper, Oracle, EMC, social media, all stand up and say this is the right approach. It will allow us to protect our consumers of our product from foreign governments stealing their private information. We need to understand what this bill is and what it is not. It is not a surveillance bill. Nothing in here authorizes surveillance. We're going to have an amendment to clarify that, to say it in the law so people can regain that confidence. We argue, Read the bill. It's 27 pages. It is very clear. It is predominantly protections of your civil liberties, and it also allows companies to voluntarily share malicious source code--and that's source code that's committing a crime against their consumers and their company--with the Federal Government so they can go back overseas and find the Chinese or the Iranians or the Russians or the North Koreans who are perpetrating that crime. This bill is nothing more. It does do that. Thanks to the ranking member and all who have gotten to this point. I look forward, Madam Chair, to the debate on the amendments, and I yield back the balance of my time. Mr. CONYERS. Madam Chair, this week, the House of Representatives is scheduled to take up the Cyber Intelligence Sharing and Protection Act (CISPA). Among other things, the legislation would authorize open-ended sharing of threat information between certain private companies and the federal government, and grant those companies unlimited legal immunity. I--along with more than 30 civil liberties and privacy groups ranging from the ACLU to the Competitive Enterprise Institute--believe the bill is badly flawed, and will harm the privacy and civil liberties of our citizens. While the Intelligence Committee amended CISPA last week, purporting to address privacy-related issues, the changes do not ameliorate the core concerns I have with the bill. CISPA would create a ``Wild West'' of information-sharing, where any ``certified'' private-sector entity could share information with any federal government agency for various ill-defined purposes. By allowing for the direct sharing of information between the private sector and the National Security Agency, as well as other Defense Department agencies, the legislation hastily casts aside time-tested legal prohibitions against intelligence agencies and the military from operating on U.S. soil. The bill should be amended to prevent this direct sharing with non-civilian agencies. CISPA would also create duplicative information-sharing processes with no central oversight or accountability. Successive administrations have expended enormous resources building proper information-sharing programs at the Department of Homeland Security and the FBI; these efforts should be enhanced, not clouded by permitting the proliferation of redundant programs across the federal government. The legislation also removes current legal protections applicable to companies that facilitate and process our private communications and share them with the government and one another. Companies sharing information would be exempt from all privacy statutes and would be relieved of liability for recklessly sharing, or deciding not to share information. Without narrowly defining the information that may be shared, limiting to whom it may be shared and why, and preserving mechanisms to provide accountability for wrongdoing, the privacy of our citizens and confidence in the trustworthiness of our electronic communications networks would be weakened. For example, the bill would not prevent a company sharing cyber threat information from including data not necessary to understanding the threat, such as private emails between family members or personal information such as medical records, in a data dump to the government. The bill should narrowly define the categories of information that may be shared, such as malicious code or methods of defeating cybersecurity controls, and require that companies sharing the data take reasonable steps to remove information identifying individuals not involved in the threat. It is not enough to require government recipients of the data to remove the private information because it should never be sent to the government in the first place. The bill therefore should be amended to require that companies sharing cyber threat information make reasonable efforts to [[Page H2097]] remove such personally identifiable information from the data they share with other companies and the government. The bill's liability protection provisions are also unnecessarily broad and eliminate the ability of aggrieved citizens and companies to protect and secure their privacy, as well as their property and physical well-being. Regardless of whether a company acted recklessly or negligently, the bill would prevent civil or criminal actions for decisions made for cybersecurity purposes ``based on'' cyber threat information. In effect, the legislation removes critical incentives for industry to act reasonably concerning cyber threat information. Consider a situation in which a telecommunications company through its operations becomes aware of a cyber threat directed toward a utility but fails to notify the critical infrastructure company of the threat, denying the utility the opportunity to engage in defensive measures and resulting in a catastrophic event producing substantial property damage and loss of life. Under the legislation, the telecommunications company characterizing its decision not to notify as one made for a cybersecurity purpose would be able to avoid legal liability. The bill's exemption from liability should therefore be narrowed to exclude protection for such decisions. The cyber threats our nation faces are serious, and we need to take action. The president's recent executive order directing the enhanced sharing of cyber threat information by the government to industry is a significant step in the right direction. Legislation encouraging information-sharing by the private sector is also required, but it must be carefully crafted and limited to actual threats. The House version of CISPA is not the right solution to this real problem, and it must be fixed before it reaches the president's desk. The CHAIR. All time for general debate has expired. Pursuant to the rule, the bill shall be considered for amendment under the 5-minute rule. In lieu of the amendment in the nature of a substitute recommended by the Permanent Select Committee on Intelligence, printed in the bill, it shall be in order to consider as an original bill for the purpose of amendment under the 5-minute rule an amendment in the nature of a substitute consisting of the text of Rules Committee Print 113-7. That amendment in the nature of a substitute shall be considered as read. The text of the amendment in the nature of a substitute is as follows: Be it enacted by the Senate and House of Representatives of the United States of America in Congress assembled, H.R. 624 SECTION 1. SHORT TITLE. This Act may be cited as the ``Cyber Intelligence Sharing and Protection Act''. SEC. 2. CYBER THREAT INTELLIGENCE AND INFORMATION SHARING. (a) In General.--Title XI of the National Security Act of 1947 (50 U.S.C. 442 et seq.) is amended by adding at the end the following new section: ``cyber threat intelligence and information sharing ``Sec. 1104. (a) Intelligence Community Sharing of Cyber Threat Intelligence With Private Sector and Utilities.-- ``(1) In general.--The Director of National Intelligence shall establish procedures to allow elements of the intelligence community to share cyber threat intelligence with private-sector entities and utilities and to encourage the sharing of such intelligence. ``(2) Sharing and use of classified intelligence.--The procedures established under paragraph (1) shall provide that classified cyber threat intelligence may only be-- ``(A) shared by an element of the intelligence community with-- ``(i) a certified entity; or ``(ii) a person with an appropriate security clearance to receive such cyber threat intelligence; ``(B) shared consistent with the need to protect the national security of the United States; and ``(C) used by a certified entity in a manner which protects such cyber threat intelligence from unauthorized disclosure. ``(3) Security clearance approvals.--The Director of National Intelligence shall issue guidelines providing that the head of an element of the intelligence community may, as the head of such element considers necessary to carry out this subsection-- ``(A) grant a security clearance on a temporary or permanent basis to an employee or officer of a certified entity; ``(B) grant a security clearance on a temporary or permanent basis to a certified entity and approval to use appropriate facilities; and ``(C) expedite the security clearance process for a person or entity as the head of such element considers necessary, consistent with the need to protect the national security of the United States. ``(4) No right or benefit.--The provision of information to a private-sector entity or a utility under this subsection shall not create a right or benefit to similar information by such entity or such utility or any other private-sector entity or utility. ``(5) Restriction on disclosure of cyber threat intelligence.--Notwithstanding any other provision of law, a certified entity receiving cyber threat intelligence pursuant to this subsection shall not further disclose such cyber threat intelligence to another entity, other than to a certified entity or other appropriate agency or department of the Federal Government authorized to receive such cyber threat intelligence. ``(b) Use of Cybersecurity Systems and Sharing of Cyber Threat Information.-- ``(1) In general.-- ``(A) Cybersecurity providers.--Notwithstanding any other provision of law, a cybersecurity provider, with the express consent of a protected entity for which such cybersecurity provider is providing goods or services for cybersecurity purposes, may, for cybersecurity purposes-- ``(i) use cybersecurity systems to identify and obtain cyber threat information to protect the rights and property of such protected entity; and ``(ii) share such cyber threat information with any other entity designated by such protected entity, including, if specifically designated, the Federal Government. ``(B) Self-protected entities.--Notwithstanding any other provision of law, a self-protected entity may, for cybersecurity purposes-- ``(i) use cybersecurity systems to identify and obtain cyber threat information to protect the rights and property of such self-protected entity; and ``(ii) share such cyber threat information with any other entity, including the Federal Government. ``(2) Sharing with the federal government.-- ``(A) Information shared with the national cybersecurity and communications integration center of the department of homeland security.--Subject to the use and protection of information requirements under paragraph (3), the head of a department or agency of the Federal Government receiving cyber threat information in accordance with paragraph (1) shall provide such cyber threat information in as close to real time as possible to the National Cybersecurity and Communications Integration Center of the Department of Homeland Security. ``(B) Request to share with another department or agency of the federal government.--An entity sharing cyber threat information that is provided to the National Cybersecurity and Communications Integration Center of the Department of Homeland Security under subparagraph (A) or paragraph (1) may request the head of such Center to, and the head of such Center may, provide such information in as close to real time as possible to another department or agency of the Federal Government. ``(3) Use and protection of information.--Cyber threat information shared in accordance with paragraph (1)-- ``(A) shall only be shared in accordance with any restrictions placed on the sharing of such information by the protected entity or self-protected entity authorizing such sharing, including appropriate anonymization or minimization of such information and excluding limiting a department or agency of the Federal Government from sharing such information with another department or agency of the Federal Government in accordance with this section; ``(B) may not be used by an entity to gain an unfair competitive advantage to the detriment of the protected entity or the self-protected entity authorizing the sharing of information; ``(C) may only be used by a non-Federal recipient of such information for a cybersecurity purpose; ``(D) if shared with the Federal Government-- ``(i) shall be exempt from disclosure under section 552 of title 5, United States Code (commonly known as the `Freedom of Information Act'); ``(ii) shall be considered proprietary information and shall not be disclosed to an entity outside of the Federal Government except as authorized by the entity sharing such information; ``(iii) shall not be used by the Federal Government for regulatory purposes; ``(iv) shall not be provided by the department or agency of the Federal Government receiving such cyber threat information to another department or agency of the Federal Government under paragraph (2)(A) if-- ``(I) the entity providing such information determines that the provision of such information will undermine the purpose for which such information is shared; or ``(II) unless otherwise directed by the President, the head of the department or agency of the Federal Government receiving such cyber threat information determines that the provision of such information will undermine the purpose for which such information is shared; and ``(v) shall be handled by the Federal Government consistent with the need to protect sources and methods and the national security of the United States; and ``(E) shall be exempt from disclosure under a State, local, or tribal law or regulation that requires public disclosure of information by a public or quasi-public entity. ``(4) Exemption from liability.-- ``(A) Exemption.--No civil or criminal cause of action shall lie or be maintained in Federal or State court against a protected entity, self-protected entity, cybersecurity provider, or an officer, employee, or agent of a protected entity, self-protected entity, or cybersecurity provider, acting in good faith-- ``(i) for using cybersecurity systems to identify or obtain cyber threat information or for sharing such information in accordance with this section; or ``(ii) for decisions made for cybersecurity purposes and based on cyber threat information [[Page H2098]] identified, obtained, or shared under this section. ``(B) Lack of good faith.--For purposes of the exemption from liability under subparagraph (A), a lack of good faith includes any act or omission taken with intent to injure, defraud, or otherwise endanger any individual, government entity, private entity, or utility. ``(5) Relationship to other laws requiring the disclosure of information.--The submission of information under this subsection to the Federal Government shall not satisfy or affect-- ``(A) any requirement under any other provision of law for a person or entity to provide information to the Federal Government; or ``(B) the applicability of other provisions of law, including section 552 of title 5, United States Code (commonly known as the `Freedom of Information Act'), with respect to information required to be provided to the Federal Government under such other provision of law. ``(6) Rule of construction.--Nothing in this subsection shall be construed to provide new authority to-- ``(A) a cybersecurity provider to use a cybersecurity system to identify or obtain cyber threat information from a system or network other than a system or network owned or operated by a protected entity for which such cybersecurity provider is providing goods or services for cybersecurity purposes; or ``(B) a self-protected entity to use a cybersecurity system to identify or obtain cyber threat information from a system or network other than a system or network owned or operated by such self-protected entity. ``(c) Federal Government Use of Information.-- ``(1) Limitation.--The Federal Government may use cyber threat information shared with the Federal Government in accordance with subsection (b)-- ``(A) for cybersecurity purposes; ``(B) for the investigation and prosecution of cybersecurity crimes; ``(C) for the protection of individuals from the danger of death or serious bodily harm and the investigation and prosecution of crimes involving such danger of death or serious bodily harm; or ``(D) for the protection of minors from child pornography, any risk of sexual exploitation, and serious threats to the physical safety of minors, including kidnapping and trafficking and the investigation and prosecution of crimes involving child pornography, any risk of sexual exploitation, and serious threats to the physical safety of minors, including kidnapping and trafficking, and any crime referred to in section 2258A(a)(2) of title 18, United States Code. ``(2) Affirmative search restriction.--The Federal Government may not affirmatively search cyber threat information shared with the Federal Government under subsection (b) for a purpose other than a purpose referred to in paragraph (1). ``(3) Anti-tasking restriction.--Nothing in this section shall be construed to permit the Federal Government to-- ``(A) require a private-sector entity or utility to share information with the Federal Government; or ``(B) condition the sharing of cyber threat intelligence with a private-sector entity or utility on the provision of cyber threat information to the Federal Government. ``(4) Protection of sensitive personal documents.--The Federal Government may not use the following information, containing information that identifies a person, shared with the Federal Government in accordance with subsection (b) unless such information is used in accordance with the policies and procedures established under paragraph (7): ``(A) Library circulation records. ``(B) Library patron lists. ``(C) Book sales records. ``(D) Book customer lists. ``(E) Firearms sales records. ``(F) Tax return records. ``(G) Educational records. ``(H) Medical records. ``(5) Notification of non-cyber threat information.--If a department or agency of the Federal Government receiving information pursuant to subsection (b)(1) determines that such information is not cyber threat information, such department or agency shall notify the entity or provider sharing such information pursuant to subsection (b)(1). ``(6) Retention and use of cyber threat information.--No department or agency of the Federal Government shall retain or use information shared pursuant to subsection (b)(1) for any use other than a use permitted under subsection (c)(1). ``(7) Privacy and civil liberties.-- ``(A) Policies and procedures.--The Director of National Intelligence, in consultation with the Secretary of Homeland Security and the Attorney General, shall establish and periodically review policies and procedures governing the receipt, retention, use, and disclosure of non-publicly available cyber threat information shared with the Federal Government in accordance with subsection (b)(1). Such policies and procedures shall, consistent with the need to protect systems and networks from cyber threats and mitigate cyber threats in a timely manner-- ``(i) minimize the impact on privacy and civil liberties; ``(ii) reasonably limit the receipt, retention, use, and disclosure of cyber threat information associated with specific persons that is not necessary to protect systems or networks from cyber threats or mitigate cyber threats in a timely manner; ``(iii) include requirements to safeguard non-publicly available cyber threat information that may be used to identify specific persons from unauthorized access or acquisition; ``(iv) protect the confidentiality of cyber threat information associated with specific persons to the greatest extent practicable; and ``(v) not delay or impede the flow of cyber threat information necessary to defend against or mitigate a cyber threat. ``(B) Submission to congress.--The Director of National Intelligence shall, consistent with the need to protect sources and methods, submit to Congress the policies and procedures required under subparagraph (A) and any updates to such policies and procedures. ``(C) Implementation.--The head of each department or agency of the Federal Government receiving cyber threat information shared with the Federal Government under subsection (b)(1) shall-- ``(i) implement the policies and procedures established under subparagraph (A); and ``(ii) promptly notify the Director of National Intelligence, the Attorney General, and the congressional intelligence committees of any significant violations of such policies and procedures. ``(D) Oversight.--The Director of National Intelligence, in consultation with the Attorney General, the Secretary of Homeland Security, and the Secretary of Defense, shall establish a program to monitor and oversee compliance with the policies and procedures established under subparagraph (A). ``(d) Federal Government Liability for Violations of Restrictions on the Disclosure, Use, and Protection of Voluntarily Shared Information.-- ``(1) In general.--If a department or agency of the Federal Government intentionally or willfully violates subsection (b)(3)(D) or subsection (c) with respect to the disclosure, use, or protection of voluntarily shared cyber threat information shared under this section, the United States shall be liable to a person adversely affected by such violation in an amount equal to the sum of-- ``(A) the actual damages sustained by the person as a result of the violation or $1,000, whichever is greater; and ``(B) the costs of the action together with reasonable attorney fees as determined by the court. ``(2) Venue.--An action to enforce liability created under this subsection may be brought in the district court of the United States in-- ``(A) the district in which the complainant resides; ``(B) the district in which the principal place of business of the complainant is located; ``(C) the district in which the department or agency of the Federal Government that disclosed the information is located; or ``(D) the District of Columbia. ``(3) Statute of limitations.--No action shall lie under this subsection unless such action is commenced not later than two years after the date of the violation of subsection (b)(3)(D) or subsection (c) that is the basis for the action. ``(4) Exclusive cause of action.--A cause of action under this subsection shall be the exclusive means available to a complainant seeking a remedy for a violation of subsection (b)(3)(D) or subsection (c). ``(e) Reports on Information Sharing.-- ``(1) Inspector general report.--The Inspector General of the Intelligence Community, in consultation with the Inspector General of the Department of Justice, the Inspector General of the Department of Defense, and the Privacy and Civil Liberties Oversight Board, shall annually submit to the congressional intelligence committees a report containing a review of the use of information shared with the Federal Government under this section, including-- ``(A) a review of the use by the Federal Government of such information for a purpose other than a cybersecurity purpose; ``(B) a review of the type of information shared with the Federal Government under this section; ``(C) a review of the actions taken by the Federal Government based on such information; ``(D) appropriate metrics to determine the impact of the sharing of such information with the Federal Government on privacy and civil liberties, if any; ``(E) a list of the departments or agencies receiving such information; ``(F) a review of the sharing of such information within the Federal Government to identify inappropriate stovepiping of shared information; and ``(G) any recommendations of the Inspector General for improvements or modifications to the authorities under this section. ``(2) Privacy and civil liberties officers report.--The Civil Liberties Protection Officer of the Office of the Director of National Intelligence and the Chief Privacy and Civil Liberties Officer of the Department of Justice, in consultation with the Privacy and Civil Liberties Oversight Board, the Inspector General of the Intelligence Community, and the senior privacy and civil liberties officer of each department or agency of the Federal Government that receives cyber threat information shared with the Federal Government under this section, shall annually and jointly submit to Congress a report assessing the privacy and civil liberties impact of the activities conducted by the Federal Government under this section. Such report shall include any recommendations the Civil Liberties Protection Officer and Chief Privacy and Civil Liberties Officer consider appropriate to minimize or mitigate the privacy and civil liberties impact of the sharing of cyber threat information under this section. ``(3) Form.--Each report required under paragraph (1) or (2) shall be submitted in unclassified form, but may include a classified annex. ``(f) Federal Preemption.--This section supersedes any statute of a State or political subdivision of a State that restricts or otherwise expressly regulates an activity authorized under subsection (b). ``(g) Savings Clauses.-- [[Page H2099]] ``(1) Existing authorities.--Nothing in this section shall be construed to limit any other authority to use a cybersecurity system or to identify, obtain, or share cyber threat intelligence or cyber threat information. ``(2) Limitation on military and intelligence community involvement in private and public sector cybersecurity efforts.--Nothing in this section shall be construed to provide additional authority to, or modify an existing authority of, the Department of Defense or the National Security Agency or any other element of the intelligence community to control, modify, require, or otherwise direct the cybersecurity efforts of a private-sector entity or a component of the Federal Government or a State, local, or tribal government. ``(3) Information sharing relationships.--Nothing in this section shall be construed to-- ``(A) limit or modify an existing information sharing relationship; ``(B) prohibit a new information sharing relationship; ``(C) require a new information sharing relationship between the Federal Government and a private-sector entity or utility; ``(D) modify the authority of a department or agency of the Federal Government to protect sources and methods and the national security of the United States; or ``(E) preclude the Federal Government from requiring an entity to report significant cyber incidents if authorized or required to do so under another provision of law. ``(4) Limitation on federal government use of cybersecurity systems.--Nothing in this section shall be construed to provide additional authority to, or modify an existing authority of, any entity to use a cybersecurity system owned or controlled by the Federal Government on a private-sector system or network to protect such private-sector system or network. ``(5) No liability for non-participation.--Nothing in this section shall be construed to subject a protected entity, self-protected entity, cyber security provider, or an officer, employee, or agent of a protected entity, self- protected entity, or cybersecurity provider, to liability for choosing not to engage in the voluntary activities authorized under this section. ``(6) Use and retention of information.--Nothing in this section shall be construed to authorize, or to modify any existing authority of, a department or agency of the Federal Government to retain or use information shared pursuant to subsection (b)(1) for any use other than a use permitted under subsection (c)(1). ``(h) Definitions.--In this section: ``(1) Availability.--The term `availability' means ensuring timely and reliable access to and use of information. ``(2) Certified entity.--The term `certified entity' means a protected entity, self-protected entity, or cybersecurity provider that-- ``(A) possesses or is eligible to obtain a security clearance, as determined by the Director of National Intelligence; and ``(B) is able to demonstrate to the Director of National Intelligence that such provider or such entity can appropriately protect classified cyber threat intelligence. ``(3) Confidentiality.--The term `confidentiality' means preserving authorized restrictions on access and disclosure, including means for protecting personal privacy and proprietary information. ``(4) Cyber threat information.-- ``(A) In general.--The term `cyber threat information' means information directly pertaining to-- ``(i) a vulnerability of a system or network of a government or private entity or utility; ``(ii) a threat to the integrity, confidentiality, or availability of a system or network of a government or private entity or utility or any information stored on, processed on, or transiting such a system or network; ``(iii) efforts to deny access to or degrade, disrupt, or destroy a system or network of a government or private entity or utility; or ``(iv) efforts to gain unauthorized access to a system or network of a government or private entity or utility, including to gain such unauthorized access for the purpose of exfiltrating information stored on, processed on, or transiting a system or network of a government or private entity or utility. ``(B) Exclusion.--Such term does not include information pertaining to efforts to gain unauthorized access to a system or network of a government or private entity or utility that solely involve violations of consumer terms of service or consumer licensing agreements and do not otherwise constitute unauthorized access. ``(5) Cyber threat intelligence.-- ``(A) In general.--The term `cyber threat intelligence' means intelligence in the possession of an element of the intelligence community directly pertaining to-- ``(i) a vulnerability of a system or network of a government or private entity or utility; ``(ii) a threat to the integrity, confidentiality, or availability of a system or network of a government or private entity or utility or any information stored on, processed on, or transiting such a system or network; ``(iii) efforts to deny access to or degrade, disrupt, or destroy a system or network of a government or private entity or utility; or ``(iv) efforts to gain unauthorized access to a system or network of a government or private entity or utility, including to gain such unauthorized access for the purpose of exfiltrating information stored on, processed on, or transiting a system or network of a government or private entity or utility. ``(B) Exclusion.--Such term does not include intelligence pertaining to efforts to gain unauthorized access to a system or network of a government or private entity or utility that solely involve violations of consumer terms of service or consumer licensing agreements and do not otherwise constitute unauthorized access. ``(6) Cybersecurity crime.--The term `cybersecurity crime' means-- ``(A) a crime under a Federal or State law that involves-- ``(i) efforts to deny access to or degrade, disrupt, or destroy a system or network; ``(ii) efforts to gain unauthorized access to a system or network; or ``(iii) efforts to exfiltrate information from a system or network without authorization; or ``(B) the violation of a provision of Federal law relating to computer crimes, including a violation of any provision of title 18, United States Code, created or amended by the Computer Fraud and Abuse Act of 1986 (Public Law 99-474). ``(7) Cybersecurity provider.--The term `cybersecurity provider' means a non-Federal entity that provides goods or services intended to be used for cybersecurity purposes. ``(8) Cybersecurity purpose.-- ``(A) In general.--The term `cybersecurity purpose' means the purpose of ensuring the integrity, confidentiality, or availability of, or safeguarding, a system or network, including protecting a system or network from-- ``(i) a vulnerability of a system or network; ``(ii) a threat to the integrity, confidentiality, or availability of a system or network or any information stored on, processed on, or transiting such a system or network; ``(iii) efforts to deny access to or degrade, disrupt, or destroy a system or network; or ``(iv) efforts to gain unauthorized access to a system or network, including to gain such unauthorized access for the purpose of exfiltrating information stored on, processed on, or transiting a system or network. ``(B) Exclusion.--Such term does not include the purpose of protecting a system or network from efforts to gain unauthorized access to such system or network that solely involve violations of consumer terms of service or consumer licensing agreements and do not otherwise constitute unauthorized access. ``(9) Cybersecurity system.-- ``(A) In general.--The term `cybersecurity system' means a system designed or employed to ensure the integrity, confidentiality, or availability of, or safeguard, a system or network, including protecting a system or network from-- ``(i) a vulnerability of a system or network; ``(ii) a threat to the integrity, confidentiality, or availability of a system or network or any information stored on, processed on, or transiting such a system or network; ``(iii) efforts to deny access to or degrade, disrupt, or destroy a system or network; or ``(iv) efforts to gain unauthorized access to a system or network, including to gain such unauthorized access for the purpose of exfiltrating information stored on, processed on, or transiting a system or network. ``(B) Exclusion.--Such term does not include a system designed or employed to protect a system or network from efforts to gain unauthorized access to such system or network that solely involve violations of consumer terms of service or consumer licensing agreements and do not otherwise constitute unauthorized access. ``(10) Integrity.--The term `integrity' means guarding against improper information modification or destruction, including ensuring information nonrepudiation and authenticity. ``(11) Protected entity.--The term `protected entity' means an entity, other than an individual, that contracts with a cybersecurity provider for goods or services to be used for cybersecurity purposes. ``(12) Self-protected entity.--The term `self-protected entity' means an entity, other than an individual, that provides goods or services for cybersecurity purposes to itself. ``(13) Utility.--The term `utility' means an entity providing essential services (other than law enforcement or regulatory services), including electricity, natural gas, propane, telecommunications, transportation, water, or wastewater services.''. (b) Procedures and Guidelines.--The Director of National Intelligence shall-- (1) not later than 60 days after the date of the enactment of this Act, establish procedures under paragraph (1) of section 1104(a) of the National Security Act of 1947, as added by subsection (a) of this section, and issue guidelines under paragraph (3) of such section 1104(a); (2) in establishing such procedures and issuing such guidelines, consult with the Secretary of Homeland Security to ensure that such procedures and such guidelines permit the owners and operators of critical infrastructure to receive all appropriate cyber threat intelligence (as defined in section 1104(h)(5) of such Act, as added by subsection (a)) in the possession of the Federal Government; and (3) following the establishment of such procedures and the issuance of such guidelines, expeditiously distribute such procedures and such guidelines to appropriate departments and agencies of the Federal Government, private-sector entities, and utilities (as defined in section 1104(h)(13) of such Act, as added by subsection (a)). (c) Privacy and Civil Liberties Policies and Procedures.-- Not later than 60 days after the date of the enactment of this Act, the Director of National Intelligence, in consultation with the Secretary of Homeland Security and the Attorney General, shall establish the policies and procedures required under section 1104(c)(7)(A) of the National Security Act of 1947, as added by subsection (a) of this section. (d) Initial Reports.--The first reports required to be submitted under paragraphs (1) and (2) of subsection (e) of section 1104 of the National Security Act of 1947, as added by subsection (a) of this section, shall be submitted not later than 1 year after the date of the enactment of this Act. (e) Table of Contents Amendment.--The table of contents in the first section of the National Security Act of 1947 is amended by adding at the end the following new item: [[Page H2100]] ``Sec. 1104. Cyber threat intelligence and information sharing.''. SEC. 3. SUNSET. Effective on the date that is 5 years after the date of the enactment of this Act-- (1) section 1104 of the National Security Act of 1947, as added by section 2(a) of this Act, is repealed; and (2) the table of contents in the first section of the National Security Act of 1947, as amended by section 2(d) of this Act, is amended by striking the item relating to section 1104, as added by such section 2(d). The CHAIR. No amendment to that amendment in the nature of a substitute shall be in order except those printed in House Report 113- 41. Each such amendment may be offered only in the order printed in the report, by a Member designated in the report, shall be considered as read, shall be debatable for the time specified in the report equally divided and controlled by the proponent and an opponent, shall not be subject to amendment, and shall not be subject to a demand for division of the question. Amendment No. 1 Offered by Mr. Rogers of Michigan The CHAIR. It is now in order to consider amendment No. 1 printed in House Report 113-41. Mr. ROGERS of Michigan. Madam Chair, I have an amendment at the desk. The CHAIR. The Clerk will designate the amendment. The text of the amendment is as follows: Page 12, beginning line 15, strike ``unless such information is used in accordance with the policies and procedures established under paragraph (7)''. The CHAIR. Pursuant to House Resolution 164, the gentleman from Michigan (Mr. Rogers) and a Member opposed each will control 5 minutes. The Chair recognizes the gentleman from Michigan. Mr. ROGERS of Michigan. I offer this amendment to ensure that library records, firearm sales records, medical records, and tax returns are not included in any information voluntarily shared with the government under CISPA. Though the underlying bill would not permit this information unless it was cyber threat information, I will support this amendment, as it is a clarification amendment that settles some Members' concerns and reflects an amendment that was passed last year overwhelmingly. With that, Madam Chair, I urge this body's support of this clarification amendment, and I reserve the balance of my time. Mr. RUPPERSBERGER. Madam Chair, I rise to claim the time in opposition, even though I am not opposed. The CHAIR. Without objection, the gentleman from Maryland is recognized for 5 minutes. There was no objection. Mr. RUPPERSBERGER. I support Chairman Rogers' amendment to make a technical change to correct our personal records provision and retain the privacy protections that we had in our bill upon the introduction. I yield back the balance of my time. Mr. ROGERS of Michigan. I yield back the balance of my time. The CHAIR. The question is on the amendment offered by the gentleman from Michigan (Mr. Rogers). The question was taken; and the Chair announced that the ayes appeared to have it. Mr. ROGERS of Michigan. Madam Chair, I demand a recorded vote. The CHAIR. Pursuant to clause 6 of rule XVIII, further proceedings on the amendment offered by the gentleman from Michigan will be postponed. Amendment No. 2 Offered by Mr. Connolly The CHAIR. It is now in order to consider amendment No. 2 printed in House Report 113-41. Mr. CONNOLLY. Madam Chairwoman, I have an amendment at the desk. The CHAIR. The Clerk will designate the amendment. The text of the amendment is as follows: Page 2, line 15, strike ``and''. Page 2, line 18, strike the period and insert ``; and''. Page 2, after line 18, insert the following: ``(D) used, retained, or further disclosed by a certified entity for cybersecurity purposes.''. The CHAIR. Pursuant to House Resolution 164, the gentleman from Virginia (Mr. Connolly) and a Member opposed each will control 5 minutes. The Chair recognizes the gentleman from Virginia. Mr. CONNOLLY. Madam Chairwoman, this amendment represents a commonsense improvement to H.R. 624, which I support, that simply narrows the scope of the authorization for the intelligence community to share classified--I stress, classified--cyber threat intelligence with private sector entities and utilities. As my colleagues are aware, the administration and some leading voices from the civil liberties and privacy rights communities have raised serious concerns with CISPA as reported out of the Permanent Select Committee on Intelligence. These concerns revolve around the fact that many provisions of CISPA are perhaps perceived as overly vague, or outright silent, with respect to limiting the scope of information sharing and mitigating the risk of unintended consequences. For example, section 2 of CISPA, titled ``Cyber Threat Intelligence and Information Sharing,'' is silent on what specific purposes classified cyber threat intelligence may be used, retained, or further disclosed by a certified entity. As reported, section 2 only requires that the DNI's procedures governing the sharing of classified cyber threat intelligence between the intelligence community and private sector entities be ``consistent with the need to protect the national security of the United States'' and used by certified entities ``in a manner which protects cyber threat intelligence from unauthorized disclosure.'' In this particular instance, I believe the concerns raised over the potential unintentional consequences from vagueness are real, valid, and ought to be addressed. I also believe it's a false choice that we must somehow choose between effective cybersecurity initiatives on the one hand and preserving the sacred civil liberties and privacy rights we hold so dear as a Nation on the other. In many cases, defining or limiting the scope of authority would go a long way toward addressing the privacy concerns that have been raised with respect to this legislation. To be clear, I want to recognize that the sponsors of CISPA have already engaged in good faith efforts to incorporate and address outstanding concerns with respect to the legislation that were held by the administration and other stakeholders, and I think that needs to be recognized. On that note, I am pleased that my amendment that was made in order represents a straightforward improvement, I hope, to CISPA that's consistent with the sponsor's stated commitment to enhancing cybersecurity, safeguarding privacy rights and civil liberties, and ensuring oversight of activity. The amendment simply establishes that, with respect to CISPA's requirements, the DNI establish procedures to govern the sharing of classified cyber threat intelligence--that this classified cyber threat intelligence may only be used, retained, or further disclosed by a certified entity for cybersecurity purposes. As noted by the ACLU in its statement of support for the amendment, it's consistent with similar restrictions limiting the scope of other information sharing activities addressed in other parts of the bill. The straightforward enhancement will be one of many needed improvements to the bill that will ensure it is a targeted, well-defined bill that directly--and only--strengthens our national cybersecurity. With that, I reserve the balance of my time. Mr. ROGERS of Michigan. Madam Chair, while I do not oppose the amendment, I ask unanimous consent to claim the time in opposition. The CHAIR. Without objection, the gentleman is recognized for 5 minutes. Mr. ROGERS of Michigan. Madam Chair, I do not oppose this amendment, which clarifies that classified intelligence shared by the government with a certified cybersecurity entity may only be used, retained, or further disclosed for cybersecurity purposes. The amendment is consistent with language that is already in the bill requiring the DNI, the Director of National Intelligence, to ensure that such classified information is carefully protected. I appreciate the gentleman's working with us and the ACLU to find an amendment that we could all agree on. I do not oppose this further clarification and would urge support by this body of the amendment. I reserve the balance of my time. [[Page H2101]] Mr. CONNOLLY. I would inquire of the Chair how much time is remaining. The CHAIR. The gentleman from Virginia has 2 minutes remaining. Mr. CONNOLLY. Madam Chairwoman, I yield 1 minute to the distinguished ranking member of the committee, the gentleman from Maryland (Mr. Ruppersberger). {time} 1540 Mr. RUPPERSBERGER. I thank the gentleman for yielding. This amendment increases the privacy and civil liberties protections in our bill; therefore, I urge a ``yes'' on Congressman Connolly's amendment. Mr. ROGERS of Michigan. I continue to reserve the balance of my time. Mr. CONNOLLY. Madam Chairwoman, I yield 1 minute to my distinguished colleague and our friend from Georgia (Mr. Johnson). Mr. JOHNSON of Georgia. Madam Chair, I rise in support of this amendment. I would also argue that, in addition to it being vague, it's also overbroad in that it includes investigations for child pornography and child abductions and computer crimes. This means that under CISPA, the NSA could share data with law enforcement to investigate computer crimes, which is so broad and includes even lying about your age on your Facebook page. Are these really cyber threats that this bill claims to fix? We must defend against cyber attacks while protecting the liberties and privacy of Americans. Mr. ROGERS of Michigan. Madam Chair, I yield myself such time as I may consume to clarify that this doesn't call for investigations of those crimes based on this material, but only protection of the individuals that may--and I want to stress ``may,'' because, again, the PII, the personal identifying information, is stripped clean. But in some rare, rare cases, you might find that you have located the child who has been subjugated to child pornography. In those cases, you don't want to throw that away. There are parents out there begging for us to find this child. It's very rare, it's exceptional, doesn't happen often, but in that very rare case--and, remember, there's no personally identifiable information. It would allow for the protection, not investigation. I reserve the balance of my time. Mr. CONNOLLY. Madam Chairwoman, I just want to thank the distinguished chairman and the distinguished ranking member of the committee for their leadership and for their cooperation, and I yield back the balance of my time. Mr. ROGERS of Michigan. Madam Chair, I yield back the balance of my time. The CHAIR. The question is on the amendment offered by the gentleman from Virginia (Mr. Connolly). The question was taken; and the Chair announced that the ayes appeared to have it. Mr. ROGERS of Michigan. Madam Chair, I demand a recorded vote. The CHAIR. Pursuant to clause 6 of rule XVIII, further proceedings on the amendment offered by the gentleman from Virginia will be postponed. Amendment No. 3 Offered by Mr. Schneider The CHAIR. It is now in order to consider amendment No. 3 printed in House Report 113-41. Mr. SCHNEIDER. Madam Chairman, I have an amendment at the desk. The CHAIR. The Clerk will designate the amendment. The text of the amendment is as follows: Page 3, beginning on line 2, strike ``employee or officer'' and insert ``employee, independent contractor, or officer''. The CHAIR. Pursuant to House Resolution 164, the gentleman from Illinois (Mr. Schneider) and a Member opposed each will control 5 minutes. The Chair recognizes the gentleman from Illinois. Mr. SCHNEIDER. Every day, U.S. Web sites, databases, and operating networks are threatened by foreign governments, criminal organizations, and other groups trying to hack into our systems and wreak havoc. Daily we read about infiltrations of the networks of our banks, newspapers, and even Federal agencies putting sensitive information at risk. These cyber attacks are real, and they can have devastating consequences: billions of dollars a year in stolen intellectual property and the potential to shut down our power grids and financial systems. The Cyber Intelligence Sharing and Protection Act gives the private sector the necessary tools to protect itself and its customers against these cyber attacks. Currently, the intelligence community has the ability to detect cyber threats, but Federal law prohibits the sharing of this information with the very companies whose firewalls are under attack. By sharing this information, private companies can actually prevent these attacks. The amendment I'm offering makes a small, clarifying change to the underlying bill, simply allowing independent contractors to be eligible for security clearances to perform the critical work of handling cyber threat intelligence. This clarification will allow companies--in particular, small and medium-sized businesses without the resources to employ full-time experts--to hire the most capable individuals and organizations to analyze network information, coordinate with the Federal Government, and protect ordinary Americans. We cannot allow ourselves to be in a situation where the Federal Government has available the information to prevent or mitigate a cyber attack, but companies remain defenseless because there was no legal framework to share that critical information. The networks at risk power our homes, our small businesses, and are what allow our banking systems to function. They facilitate nearly every aspect of our daily lives. These networks must be protected as best and responsibly as possible. I urge my colleagues to support both my amendment and final passage of this critically important bill. I reserve the balance of my time. Mr. ROGERS of Michigan. Madam Chairman, while I do not oppose the amendment, I ask unanimous consent to control the time in opposition. The CHAIR. Without objection, the gentleman is recognized for 5 minutes. There was no objection. Mr. ROGERS of Michigan. Madam Chairman, I will support the clarification in this amendment. The amendment clarifies that independent contractors are eligible to receive security clearances to handle cyber threat intelligence and cyber threat information shared under the bill, an important clarification amendment. I appreciate the gentleman's work and effort in offering this amendment; And because the bill was not intended to exclude independent contractors, I will support this important clarification and would reserve the balance of my time. Mr. SCHNEIDER. I yield such time as he may consume to the gentleman from California (Mr. Schiff). Mr. SCHIFF. I thank the gentleman for yielding, and I rise in opposition to the overall measure. There are three concerns that have been raised by the administration about this bill that I share. The first is that it does not include a provision requiring the private sector to make reasonable efforts to remove personal information before they share it with each other or before they share it with the government. This is a bedrock necessity for those who are concerned about the privacy of Americans who may be implicated in this cyber sharing. Second, it's very important that a civilian agency, like the Department of Homeland Security, be the main intake--really, the sole intake--for this domestic data. There was one form of amendment offered in Rules to try to address this problem yesterday, yet another form of that amendment that was ultimately adopted by Rules, and yet a third form of that amendment that was adopted here this morning. None of us know exactly what it does because it has been a moving object. But it is very unclear whether this amendment would make a civilian agency, such as DHS, the sole intake for this domestic data. It should not be a military agency. We shouldn't have the private sector interacting directly with a military agency when it comes to domestic data that may involve the privacy of the American people. Finally, the immunity provisions are very broad and need to be reined in so as to encourage the private sector to take reasonable steps to make sure it [[Page H2102]] does not compromise privacy interests when it is not necessary to do so to protect cybersecurity. Those three issues still must be addressed. I want to compliment the chairman and the ranking member for the work they have done. They have made a very good-faith effort to make progress on many of these issues and in fact have made progress, but the bill still falls short and I must urge a ``no'' vote. Mr. SCHNEIDER. Madam Chairman, may I inquire as to how much time I have remaining. The CHAIR. The gentleman from Illinois has 2 minutes remaining. Mr. SCHNEIDER. I yield such time as he may consume to the ranking member. Mr. RUPPERSBERGER. Madam Chair, our bill now enables companies and the government to have the option to hire independent contractors to handle cyber threat information. It helps bring talented people into our cybersecurity workforce; it provides jobs; it is good for our economy; and it is good for our national security. Therefore, I urge a ``yes'' vote on this amendment. I also want to acknowledge Congressman Schneider for his involvement in this issue. Mr. SCHNEIDER. I reserve the balance of my time. Mr. ROGERS of Michigan. I yield myself such time as I may consume. I just want to address my friend from California, who is a thoughtful member of the intelligence community. This is a position that much has been debated about: Should the government regulate into the private sector their use of the Internet? I argue that is a dangerous place to go. They will have to promulgate rules; they will have to set what reasonable standards are; they will have to determine what the private sector does on the Internet. That's government in the Internet. One of the things that we decided to avoid in this bill was not to make that mandate, the burden to make sure that no PII, personal identifying information, is mandated in this bill; and it's stripped out at the place where the burden should be: on the government. To make sure it happens, we have four different layers of oversight built in just to make sure what we say that they're supposed to do according to the law, they follow the law--four levels of review. {time} 1550 We shouldn't put the burden on the victims. We don't do it if somebody sticks a gun in your face on the street or robs the bank or robs your home. What's the difference if they're robbing your Internet or stealing your blueprints that steals American jobs? The difference? There is none. Theft is theft. Let us not move to get the government into regulating. Aspects of the Internet between private to private has been the explosion of growth in one-sixth of our economy. Keep the government out of it. That's what we decided to do. We came to a very sensible place that protects that PII, that personal identifying information, and allows the government to stay out of regulating the Internet. I think that's the right prudent course. I think most Americans are with us. Certainly the broad specter of industries who have joined this, from the high-tech industry to the financial services to manufacturing, have said, This is the right way to go. You stay out of our business. We'll share with you when we're victims of a crime. With that, I reserve the balance of my time. Mr. SCHNEIDER. Madam Chairman, I just want to thank the ranking member and the chairman for the way you have approached this in a bipartisan effort, and I yield back the balance of my time. Mr. ROGERS of Michigan. I yield back the balance of my time. The CHAIR. The question is on the amendment offered by the gentleman from Illinois (Mr. Schneider). The amendment was agreed to. Amendment No. 4 Offered by Mr. Langevin The CHAIR. It is now in order to consider amendment No. 4 printed in House Report 113-41. Mr. LANGEVIN. Madam Chair, I rise to offer an amendment, No. 35, listed as No. 4 in the rule. The CHAIR. The Clerk will designate the amendment. The text of the amendment is as follows: Page 8, line 16, strike ``a State, local, or tribal law or regulation'' and insert ``a law or regulation of a State, political subdivision of a State, or a tribe''. The CHAIR. Pursuant to House Resolution 164, the gentleman from Rhode Island (Mr. Langevin) and a Member opposed each will control 5 minutes. The Chair recognizes the gentleman from Rhode Island. Mr. LANGEVIN. Madam Chair, I yield myself such time as I may consume. My amendment ensures that utility districts are not unnecessarily and unintentionally limited from protecting their own information and ultimately will lead to a broader and more effective information sharing structure, leading to better cybersecurity across all critical infrastructure. Specifically, the amendment replaces the word ``local,'' which is typically interpreted to mean city, town, and county by the courts. Such a definition, I believe, could potentially leave out special districts that provide utility services, like the Salt River Project, the Central Arizona Project, the Metropolitan Water District of Southern California, and other smaller special districts. My amendment, Madam Chair, which is supported by the American Public Power Association, changes the bill to read, ``political subdivision,'' allowing more utilities to receive the protections built into our bill. In doing so, it also makes the language consistent with the preemption provision in the bill. If not amended, this legislation could subject utility districts to additional requirements if they share threat information, effectively creating a deterrent to participation--precisely what we want to avoid. We know that myriad threats are arrayed against the networks that run our critical infrastructure, and we must ensure that the utilities, which are the front lines in the cybersecurity fight, are properly protected. I have long advocated for minimum standards for utilities, but absent such standards, I believe that we have to make sure that as many utilities as possible have access to the best possible information to defend their networks and are able to share information about the attacks that they experience. This is an important bill overall. I really do want to applaud, again, Chairman Rogers and Ranking Member Ruppersberger for their outstanding work on the underlying bill. Obviously, the challenges of the threats that we face in cyberspace are growing exponentially every day. It seems like there's not a week that goes by that you don't hear of a new major attack on the critical infrastructure or, in particular, our banking system or major corporations with intellectual property theft, and obviously we have got to take action and do so now. Failure to do so would be a great abdication of our responsibility. I'm disappointed the bill didn't pass last year. I know how hard the chairman and ranking member worked on this legislation, but clearly our adversaries, or enemies, have not taken a hiatus. They are actively engaged in cyber attacks or threats of intellectual property or identity theft, and the list goes on and on. The underlying bill is a major step forward in protecting our cyber networks, allowing classified information to be shared with the private sector, allowing threat information to be shared back with the government to give broader situation awareness, as well as information sharing between both in the private sector among companies. So, again, the underlying bill is a major step forward. I believe this amendment that I'm offering makes the bill even better for making sure that broader utilities are included in allowing for information sharing. I urge my colleagues to support this commonsense amendment and the underlying legislation, and I reserve the balance of my time. Mr. ROGERS of Michigan. Madam Chair, while I do not oppose the amendment, I ask unanimous consent to control the time in opposition. The CHAIR. Without objection, the gentleman is recognized for 5 minutes. Mr. ROGERS of Michigan. Madam Chair, I yield myself such time as I may consume. [[Page H2103]] I want to thank the gentleman from Rhode Island (Mr. Langevin), who has been a tremendous leader on cybersecurity efforts on the Intelligence Committee. Much of our work there is classified and it goes unnoticed, and rightly so. I think it would be wrong for us not to commend in public your great leadership and efforts and work with us to try to make sure that this bill does what we say we want it to do. It has been a great privilege and pleasure to work with you throughout that process, and without that leadership, we wouldn't be standing on the floor today. I want to thank the gentleman for that. I will support the amendment, which clarifies that entities located across multiple localities are intended to be covered by provisions in the bill exempting information shared under the bill from certain disclosures otherwise required of public or quasi-public entities. The amendment replaces the term ``local'' with ``political subdivision.'' Because there is no intention to exclude such entities, this is intended as a clarification, an important clarification, and I will gladly support the amendment, and again thank the gentleman for his work on the totality of both national security issues and cybersecurity. I reserve the balance of my time. Mr. LANGEVIN. Madam Chair, I yield such time as he may consume to the ranking member of the Intelligence Committee, the gentleman from Maryland (Mr. Ruppersberger). Mr. RUPPERSBERGER. I thank the gentleman for yielding. Madam Chair, first, I want to agree with our chairman, and I said it before, that you have been one of the key players in developing legislation to protect our country. From the beginning, when those of us started working on this issue, probably 2006, you were there. You have a tremendous amount of expertise. You have been a great adviser to all of us, and also not only the Intelligence Committee, but the Armed Services Committee, and I appreciate all your work. I also support your amendment to include political subdivisions within the information, use, and protection requirements in our bill. Your amendment ensures that utility districts are not unnecessarily and unintentionally limited from protecting their own information. Therefore, I urge a ``yes'' vote on your amendment. Mr. LANGEVIN. Madam Chair, before I close, I just wanted to thank, again, the chairman and the ranking member for their comments, but, more importantly, their extraordinary collaborative work in trying to protect our Nation's cybersecurity. The work that they did in putting this legislation together, it is a real service to the country what you have done, and I am grateful to have played a part in it with you, and thank you for your friendship. With that, I urge my colleagues to support the amendment, and I yield back the balance of my time. Mr. ROGERS of Michigan. I yield back the balance of my time. The CHAIR. The question is on the amendment offered by the gentleman from Rhode Island (Mr. Langevin). The question was taken; and the Chair announced that the ayes appeared to have it. Mr. ROGERS of Michigan. Madam Chair, I demand a recorded vote. The CHAIR. Pursuant to clause 6 of rule XVIII, further proceedings on the amendment offered by the gentleman from Rhode Island will be postponed. {time} 1600 Mr. ROGERS of Michigan. Madam Chair, I move that the Committee do now rise. The motion was agreed to. Accordingly, the Committee rose; and the Speaker pro tempore (Mr. Marchant) having assumed the chair, Ms. Ros-Lehtinen, Chair of the Committee of the Whole House on the state of the Union, reported that that Committee, having had under consideration the bill (H.R. 624) to provide for the sharing of certain cyber threat intelligence and cyber threat information between the intelligence community and cybersecurity entities, and for other purposes, had come to no resolution thereon. ____________________ [Congressional Record Volume 159, Number 52 (Wednesday, April 17, 2013)] [House] [Pages H2103-H2105] CYBER INTELLIGENCE SHARING AND PROTECTION ACT The SPEAKER pro tempore. Pursuant to House Resolution 164 and rule XVIII, the Chair declares the House in the Committee of the Whole House on the state of the Union for the further consideration of the bill, H.R. 624. Will the gentleman from Texas (Mr. Marchant) kindly take the chair. {time} 1631 In the Committee of the Whole Accordingly, the House resolved itself into the Committee of the Whole House on the state of the Union for the further consideration of the bill (H.R. 624) to provide for the sharing of certain cyber threat intelligence and cyber threat information between the intelligence community and cybersecurity entities, and for other purposes, with Mr. Marchant (Acting Chair) in the chair. The Clerk read the title of the bill. The Acting CHAIR. When the Committee of the Whole rose earlier today, a request for a recorded vote on amendment No. 4 printed in House Report 113-41 offered by the gentleman from Rhode Island (Mr. Langevin) had been postponed. Pursuant to clause 6 of rule XVIII, proceedings will now resume on those amendments printed in House Report 113-41 on which further proceedings were postponed, in the following order: Amendment No. 1 by Mr. Rogers of Michigan. Amendment No. 2 by Mr. Connolly of Virginia. Amendment No. 4 by Mr. Langevin of Rhode Island. The Chair will reduce to 2 minutes the minimum time for any electronic vote after the first vote in this series. Amendment No. 1 Offered by Mr. Rogers of Michigan The Acting CHAIR. The unfinished business is the demand for a recorded vote on the amendment offered by the gentleman from Michigan (Mr. Rogers) on which further proceedings were postponed and on which the ayes prevailed by voice vote. The Clerk will redesignate the amendment. The Clerk redesignated the amendment. Recorded Vote The Acting CHAIR. A recorded vote has been demanded. A recorded vote was ordered. The vote was taken by electronic device, and there were--ayes 418, noes 0, not voting 14, as follows: [Roll No. 110] AYES--418 Aderholt Alexander Amash Amodei Andrews Bachus Barber Barletta Barr Barrow (GA) Barton Bass Beatty Becerra Benishek Bentivolio Bera (CA) Bilirakis Bishop (GA) Bishop (NY) Bishop (UT) Black Blumenauer Bonamici Bonner Boustany Brady (PA) Brady (TX) Braley (IA) Bridenstine Brooks (AL) Brooks (IN) Broun (GA) Brown (FL) Brownley (CA) Buchanan Bucshon Burgess Bustos Butterfield Calvert Camp Campbell Cantor Capito Capps Capuano Cardenas Carney Carson (IN) Carter Cartwright Cassidy Castor (FL) Castro (TX) Chabot Chaffetz Chu Cicilline Clarke Clay Cleaver Clyburn Coble Coffman Cohen Cole Collins (GA) Collins (NY) Conaway Connolly Conyers Cook Cooper Costa Cotton Courtney Cramer Crawford Crenshaw Crowley Cuellar Culberson Cummings Daines Davis (CA) Davis, Danny Davis, Rodney DeFazio DeGette Delaney DeLauro DelBene Denham Dent DeSantis DesJarlais Deutch Diaz-Balart Dingell Doggett Doyle Duckworth Duffy Duncan (SC) Duncan (TN) Edwards Ellison [[Page H2104]] Ellmers Engel Enyart Eshoo Esty Farenthold Farr Fattah Fincher Fitzpatrick Fleischmann Fleming Flores Forbes Fortenberry Foster Foxx Frankel (FL) Franks (AZ) Frelinghuysen Fudge Gabbard Gallego Garamendi Garcia Gardner Garrett Gerlach Gibbs Gibson Gingrey (GA) Gohmert Goodlatte Gosar Gowdy Granger Graves (GA) Graves (MO) Grayson Green, Al Griffin (AR) Griffith (VA) Grijalva Grimm Guthrie Gutierrez Hahn Hall Hanabusa Hanna Harper Harris Hartzler Hastings (FL) Hastings (WA) Heck (NV) Heck (WA) Hensarling Herrera Beutler Higgins Himes Hinojosa Holt Honda Horsford Hoyer Hudson Huelskamp Huffman Huizenga (MI) Hultgren Hunter Hurt Israel Issa Jeffries Jenkins Johnson (GA) Johnson (OH) Johnson, E. B. Johnson, Sam Jones Jordan Joyce Kaptur Keating Kelly (IL) Kelly (PA) Kildee Kilmer Kind King (IA) King (NY) Kingston Kinzinger (IL) Kirkpatrick Kline Kuster Labrador LaMalfa Lamborn Lance Langevin Lankford Larsen (WA) Larson (CT) Latham Latta Lee (CA) Levin Lewis Lipinski LoBiondo Loebsack Lofgren Long Lowenthal Lowey Lucas Luetkemeyer Lujan Grisham (NM) Lujan, Ben Ray (NM) Lummis Maffei Maloney, Carolyn Maloney, Sean Marchant Marino Massie Matheson Matsui McCarthy (CA) McCarthy (NY) McCaul McClintock McCollum McDermott McGovern McHenry McIntyre McKeon McKinley McMorris Rodgers McNerney Meadows Meehan Meeks Meng Messer Mica Michaud Miller (FL) Miller (MI) Miller, George Moran Mullin Mulvaney Murphy (FL) Murphy (PA) Nadler Napolitano Neal Negrete McLeod Neugebauer Noem Nolan Nunes Nunnelee O'Rourke Olson Owens Palazzo Pallone Pascrell Pastor (AZ) Paulsen Payne Pearce Pelosi Perlmutter Perry Peters (CA) Peters (MI) Peterson Petri Pingree (ME) Pittenger Pitts Pocan Poe (TX) Polis Pompeo Posey Price (GA) Price (NC) Quigley Radel Rahall Rangel Reed Reichert Renacci Ribble Rice (SC) Richmond Rigell Roby Roe (TN) Rogers (AL) Rogers (KY) Rogers (MI) Rohrabacher Rokita Rooney Ros-Lehtinen Roskam Ross Rothfus Roybal-Allard Royce Ruiz Runyan Ruppersberger Ryan (OH) Ryan (WI) Salmon Sanchez, Linda T. Sanchez, Loretta Sarbanes Scalise Schakowsky Schiff Schneider Schock Schrader Schwartz Schweikert Scott (VA) Scott, Austin Scott, David Sensenbrenner Serrano Sessions Sewell (AL) Shea-Porter Sherman Shuster Simpson Sinema Sires Slaughter Smith (NE) Smith (NJ) Smith (TX) Smith (WA) Southerland Speier Stewart Stivers Stockman Stutzman Swalwell (CA) Takano Terry Thompson (CA) Thompson (MS) Thompson (PA) Thornberry Tiberi Tierney Tipton Titus Tonko Turner Upton Valadao Van Hollen Vargas Veasey Vela Velazquez Visclosky Wagner Walberg Walden Walorski Walz Wasserman Schultz Waters Watt Waxman Weber (TX) Webster (FL) Welch Wenstrup Westmoreland Whitfield Williams Wilson (FL) Wilson (SC) Wittman Wolf Womack Woodall Yarmuth Yoder Yoho Young (AK) Young (FL) Young (IN) NOT VOTING--14 Bachmann Blackburn Green, Gene Holding Jackson Lee Kennedy Lynch Markey Miller, Gary Moore Nugent Rush Shimkus Tsongas {time} 1656 Mrs. LOWEY and Mr. RANGEL changed their vote from ``no'' to ``aye.'' So the amendment was agreed to. The result of the vote was announced as above recorded. Stated for: Mr. GENE GREEN of Texas. Mr. Chair, on rollcall No. 110, had I been present, I would have voted ``aye.'' Amendment No. 2 Offered by Mr. Connolly The Acting CHAIR. The unfinished business is the demand for a recorded vote on the amendment offered by the gentleman from Virginia (Mr. Connolly) on which further proceedings were postponed and on which the ayes prevailed by voice vote. The Clerk will redesignate the amendment. The Clerk redesignated the amendment. Recorded Vote The Acting CHAIR. A recorded vote has been demanded. A recorded vote was ordered. The Acting CHAIR. This will be a 2-minute vote. The vote was taken by electronic device, and there were--ayes 418, noes 0, not voting 14, as follows: [Roll No. 111] AYES--418 Aderholt Alexander Amash Amodei Andrews Bachus Barber Barletta Barr Barrow (GA) Barton Bass Beatty Becerra Benishek Bentivolio Bera (CA) Bilirakis Bishop (GA) Bishop (NY) Black Blumenauer Bonamici Bonner Boustany Brady (PA) Brady (TX) Braley (IA) Bridenstine Brooks (AL) Brooks (IN) Broun (GA) Brown (FL) Brownley (CA) Buchanan Bucshon Burgess Bustos Butterfield Calvert Camp Campbell Cantor Capito Capps Capuano Cardenas Carney Carson (IN) Carter Cartwright Cassidy Castor (FL) Castro (TX) Chabot Chaffetz Chu Cicilline Clarke Clay Cleaver Clyburn Coble Coffman Cohen Cole Collins (GA) Collins (NY) Conaway Connolly Conyers Cook Cooper Costa Cotton Courtney Cramer Crawford Crenshaw Crowley Cuellar Culberson Cummings Daines Davis (CA) Davis, Danny Davis, Rodney DeFazio DeGette Delaney DeLauro DelBene Denham Dent DeSantis DesJarlais Deutch Diaz-Balart Dingell Doggett Doyle Duckworth Duffy Duncan (SC) Duncan (TN) Edwards Ellison Ellmers Engel Enyart Eshoo Esty Farenthold Farr Fattah Fincher Fitzpatrick Fleischmann Fleming Flores Forbes Fortenberry Foster Foxx Frankel (FL) Franks (AZ) Frelinghuysen Fudge Gabbard Gallego Garamendi Garcia Gardner Garrett Gerlach Gibbs Gibson Gingrey (GA) Gohmert Goodlatte Gosar Gowdy Granger Graves (MO) Grayson Green, Al Green, Gene Griffin (AR) Griffith (VA) Grijalva Grimm Guthrie Gutierrez Hahn Hall Hanabusa Hanna Harper Harris Hartzler Hastings (FL) Hastings (WA) Heck (NV) Heck (WA) Hensarling Herrera Beutler Higgins Himes Hinojosa Holt Honda Horsford Hoyer Hudson Huelskamp Huffman Huizenga (MI) Hultgren Hunter Hurt Israel Issa Jeffries Jenkins Johnson (GA) Johnson (OH) Johnson, E. B. Johnson, Sam Jones Jordan Joyce Kaptur Keating Kelly (IL) Kelly (PA) Kildee Kilmer Kind King (IA) King (NY) Kingston Kinzinger (IL) Kirkpatrick Kline Kuster Labrador LaMalfa Lamborn Lance Langevin Lankford Larsen (WA) Larson (CT) Latham Latta Lee (CA) Levin Lewis Lipinski LoBiondo Loebsack Lofgren Long Lowenthal Lowey Lucas Luetkemeyer Lujan Grisham (NM) Lujan, Ben Ray (NM) Lummis Maffei Maloney, Carolyn Maloney, Sean Marchant Marino Massie Matheson Matsui McCarthy (CA) McCarthy (NY) McCaul McClintock McCollum McDermott McGovern McHenry McIntyre McKeon McKinley McMorris Rodgers McNerney Meadows Meehan Meeks Meng Messer Mica Michaud Miller (FL) Miller (MI) Miller, George Moore Moran Mullin Mulvaney Murphy (FL) Murphy (PA) Nadler Napolitano Neal Negrete McLeod Neugebauer Noem Nolan Nunes Nunnelee O'Rourke Olson Owens Palazzo Pallone Pascrell Pastor (AZ) Paulsen Payne Pearce Pelosi Perlmutter Perry Peters (CA) Peters (MI) Peterson Petri Pingree (ME) Pittenger Pitts Pocan Poe (TX) Polis Pompeo Posey Price (GA) Price (NC) Quigley Radel Rahall Rangel Reed Reichert Renacci Ribble Rice (SC) Richmond Rigell Roby Roe (TN) Rogers (AL) Rogers (KY) Rogers (MI) Rohrabacher Rokita Rooney Ros-Lehtinen Roskam Ross Rothfus Roybal-Allard Royce Ruiz Runyan Ruppersberger Ryan (OH) Ryan (WI) Salmon Sanchez, Linda T. Sanchez, Loretta Sarbanes Scalise Schakowsky Schiff Schneider Schock Schrader Schwartz Schweikert Scott (VA) Scott, Austin Scott, David Sensenbrenner Serrano Sessions Sewell (AL) Shea-Porter Sherman Shuster Simpson Sinema Sires Slaughter Smith (NE) Smith (NJ) Smith (TX) Smith (WA) Southerland Speier Stewart Stivers Stockman Stutzman Swalwell (CA) Takano Terry Thompson (CA) Thompson (MS) Thompson (PA) Thornberry Tiberi Tierney Tipton Titus Tonko Turner Upton Valadao Van Hollen Vargas Veasey Vela Velazquez Visclosky Wagner Walberg Walden Walorski Walz Wasserman Schultz Waters Watt Waxman Weber (TX) Webster (FL) Welch Wenstrup Westmoreland Whitfield Williams Wilson (FL) Wilson (SC) Wittman Wolf Womack [[Page H2105]] Woodall Yarmuth Yoder Yoho Young (AK) Young (FL) Young (IN) NOT VOTING--14 Bachmann Bishop (UT) Blackburn Graves (GA) Holding Jackson Lee Kennedy Lynch Markey Miller, Gary Nugent Rush Shimkus Tsongas {time} 1701 So the amendment was agreed to. The result of the vote was announced as above recorded. Amendment No. 4 Offered by Mr. Langevin The Acting CHAIR. The unfinished business is the demand for a recorded vote on the amendment offered by the gentleman from Rhode Island (Mr. Langevin) on which further proceedings were postponed and on which the ayes prevailed by voice vote. The Clerk will redesignate the amendment. The Clerk redesignated the amendment. Recorded Vote The Acting CHAIR. A recorded vote has been demanded. A recorded vote was ordered. The Acting CHAIR. This is a 2-minute vote. The vote was taken by electronic device, and there were--ayes 411, noes 3, not voting 18, as follows: [Roll No. 112] AYES--411 Aderholt Alexander Amodei Andrews Bachus Barber Barletta Barr Barrow (GA) Barton Bass Beatty Becerra Benishek Bentivolio Bera (CA) Bilirakis Bishop (GA) Bishop (NY) Bishop (UT) Black Blumenauer Bonamici Bonner Boustany Brady (PA) Brady (TX) Braley (IA) Bridenstine Brooks (AL) Brooks (IN) Broun (GA) Brown (FL) Brownley (CA) Buchanan Bucshon Burgess Bustos Butterfield Calvert Camp Campbell Cantor Capito Capps Capuano Cardenas Carney Carson (IN) Carter Cartwright Cassidy Castor (FL) Castro (TX) Chabot Chaffetz Chu Cicilline Clarke Clay Cleaver Clyburn Coble Coffman Cohen Cole Collins (GA) Collins (NY) Conaway Connolly Conyers Cook Cooper Costa Cotton Courtney Cramer Crawford Crenshaw Crowley Cuellar Culberson Cummings Daines Davis (CA) Davis, Danny Davis, Rodney DeFazio DeGette Delaney DeLauro DelBene Denham Dent DeSantis DesJarlais Deutch Diaz-Balart Dingell Doggett Doyle Duckworth Duffy Duncan (SC) Duncan (TN) Edwards Ellison Ellmers Engel Enyart Eshoo Esty Farenthold Farr Fincher Fitzpatrick Fleischmann Fleming Flores Forbes Fortenberry Foster Foxx Frankel (FL) Franks (AZ) Frelinghuysen Fudge Gabbard Gallego Garamendi Garcia Gardner Garrett Gerlach Gibbs Gibson Gingrey (GA) Goodlatte Gosar Gowdy Granger Graves (GA) Graves (MO) Grayson Green, Al Green, Gene Griffin (AR) Griffith (VA) Grijalva Grimm Guthrie Gutierrez Hahn Hall Hanabusa Hanna Harper Harris Hartzler Hastings (FL) Hastings (WA) Heck (NV) Heck (WA) Hensarling Herrera Beutler Higgins Himes Hinojosa Holt Honda Horsford Hoyer Hudson Huelskamp Huffman Huizenga (MI) Hultgren Hunter Hurt Israel Issa Jeffries Jenkins Johnson (GA) Johnson (OH) Johnson, E. B. Johnson, Sam Jones Jordan Joyce Kaptur Keating Kelly (IL) Kelly (PA) Kildee Kilmer Kind King (IA) King (NY) Kingston Kinzinger (IL) Kirkpatrick Kline Kuster Labrador LaMalfa Lamborn Lance Langevin Lankford Larsen (WA) Larson (CT) Latham Latta Lee (CA) Levin Lipinski LoBiondo Loebsack Lofgren Long Lowenthal Lowey Luetkemeyer Lujan Grisham (NM) Lujan, Ben Ray (NM) Lummis Maffei Maloney, Carolyn Maloney, Sean Marchant Marino Massie Matheson Matsui McCarthy (CA) McCarthy (NY) McCaul McCollum McDermott McGovern McHenry McIntyre McKeon McKinley McMorris Rodgers McNerney Meadows Meehan Meeks Meng Messer Mica Michaud Miller (FL) Miller (MI) Miller, George Moore Moran Mulvaney Murphy (FL) Murphy (PA) Nadler Napolitano Neal Negrete McLeod Neugebauer Noem Nolan Nunes Nunnelee O'Rourke Olson Owens Palazzo Pallone Pascrell Pastor (AZ) Paulsen Payne Pearce Pelosi Perlmutter Perry Peters (CA) Peters (MI) Peterson Petri Pingree (ME) Pittenger Pitts Pocan Poe (TX) Polis Pompeo Posey Price (GA) Price (NC) Quigley Radel Rahall Rangel Reed Reichert Renacci Ribble Rice (SC) Richmond Rigell Roby Roe (TN) Rogers (AL) Rogers (KY) Rogers (MI) Rohrabacher Rokita Rooney Ros-Lehtinen Roskam Ross Rothfus Roybal-Allard Royce Ruiz Runyan Ruppersberger Ryan (OH) Ryan (WI) Salmon Sanchez, Linda T. Sanchez, Loretta Sarbanes Scalise Schakowsky Schiff Schneider Schock Schrader Schwartz Schweikert Scott (VA) Scott, Austin Sensenbrenner Serrano Sessions Sewell (AL) Shea-Porter Sherman Shuster Simpson Sinema Sires Slaughter Smith (NE) Smith (NJ) Smith (TX) Smith (WA) Southerland Speier Stewart Stockman Stutzman Swalwell (CA) Takano Terry Thompson (CA) Thompson (MS) Thompson (PA) Thornberry Tiberi Tierney Tipton Titus Tonko Turner Upton Valadao Van Hollen Vargas Veasey Vela Velazquez Visclosky Wagner Walberg Walden Walorski Walz Wasserman Schultz Waters Watt Waxman Weber (TX) Webster (FL) Welch Wenstrup Westmoreland Whitfield Williams Wilson (FL) Wilson (SC) Wittman Wolf Womack Woodall Yarmuth Yoder Yoho Young (AK) Young (FL) Young (IN) NOES--3 Amash Gohmert McClintock NOT VOTING--18 Bachmann Blackburn Fattah Holding Jackson Lee Kennedy Lewis Lucas Lynch Markey Miller, Gary Mullin Nugent Rush Scott, David Shimkus Stivers Tsongas {time} 1707 So the amendment was agreed to. The result of the vote was announced as above recorded. personal explanation Mrs. BACHMANN. Mr. Chair, on April 17, 2013, I was not able to vote on rollcall votes 110, 111 and 112. At the time, I was performing my duties as a designee of the U.S. House of Representatives attending the funeral of Baroness Margaret Thatcher in London. Had I been present for the vote, I would have voted ``aye'' on all three votes.- Mr. SESSIONS. Mr. Chairman, I move that the Committee do now rise. The motion was agreed to. Accordingly, the Committee rose; and the Speaker pro tempore (Mrs. Wagner) having assumed the chair, Mr. Marchant, Acting Chair of the Committee of the Whole House on the state of the Union, reported that that Committee, having had under consideration the bill (H.R. 624) to provide for the sharing of certain cyber threat intelligence and cyber threat information between the intelligence community and cybersecurity entities, and for other purposes, had come to no resolution thereon. ____________________