Tip:
Highlight text to annotate it
X
HISTORY TO IT AND
PRIZE WINNER AND ALL THE
STUDENTCAM WINNERS AND THE
COMPETITORS THIS YEAR.
THANKS FOR ALL YOUR HARD WORK.
WE WILL HAVE THE NEXT
COMPETITION ANNOUNCED SOON.
NOW FOR THE HOUSE OF
REPRESENTATIVES LIVE SESSION.
THANKS FOR THIS NEW DAY OF WHAT
IS AND WHAT IS TO BECOME.
WE PRAY THAT YOU HELP US DRAW
CLOSER TO YOU THAT WE MAY BEAR
WITNESS TO YOUR PRESENCE AMONG
US AND FACE THE DAY WITH COURAGE
AND CONFIDENCE.
SEND YOUR SPIRIT UPON THE
MEMBERS OF THIS ASSEMBLY.
MAY YOUR GRACE DESCEND UPON THEM
AS THEY MEET THE DIFFICULT TASK
OF WORKSING FOR THE COMMON GOOD.
THEY MAY -- WORKING FOR THE
COMMON GOOD.
MAY THEY BE BLESSED WITH WISDOM
AND COMPASSION, ENOUGH TO SERVE
THEIR FELLOW CITIZENS WITH
DIGNITY AND HUMILITY.
PROVIDE THEM WITH THE STRENGTH
TO BE FAITHFUL TO THEIR DUTIES
AND TO SERVE HONORABLY, ALWAYS
REMEMBERING THE SACRED TRUST
THEY HAVE WITH THEIR FELLOW
CITIZENS.
MAY ALL THAT IS DONE THIS DAY BE
FOR YOUR GREATER GLORY AND HONOR
, AMEN.
THE CHAIR HAS
EXAMINED THE JOURNAL OF THE LAST
DAY'S PROCEEDINGS AND ANNOUNCES
TO THE HOUSE HIS APPROVAL
THEREOF.
PURSUANT TO CLAUSE 1 OF RULE 1,
THE JOURNAL STANDS APPROVED.
THE PLEDGE OF ALLEGIANCE TODAY
WILL BE LED BY THE GENTLEMAN
FROM PENNSYLVANIA.
I PLEDGE
ALLEGIANCE TO THE FLAG OF THE
UNITED STATES OF AMERICA AND TO
THE REPUBLIC FOR WHICH IT
STANDS, ONE NATION UNDER GOD,
INDIVISIBLE, WITH LIBERTY AND
JUSTICE FOR ALL.
THE CHAIR WILL
ENTERTAIN UP TO FIVE ONE-MINUTE
REQUESTS ON EACH SIDE.
RISE?
PERMISSION TO ADDRESS THE
HOUSE FOR ONE MINUTE.
ASK UNANIMOUS CONSENT TO ADDRESS
THE HOUSE?
DOES THE GENTLEMAN ASK UNANIMOUS
CONSENT TO ADDRESS THE HOUSE?
SO ORDERED.
IN A MINUTE OR SO
I AM SPEAKING THIS MORNING TWO
MORE ILLEGAL ALIENS WILL BE
ADDED TO OUR NATION.
MAYBE THEY'LL SNEAK OFF A BOAT,
SKWLOFERE STAY AN EXPIRED VISA.
ALL EXPECT TO FIND A BETTER LIFE
HERE IN THE UNITED STATES, BUT
ALL ARE BREAKING THE LAW.
ALIENS
IN COUNTRY RIGHT NOW IMPOSE A
HUGE BURDEN ON THEIR CITIES, ONE
PENNSYLVANIA.
THAT'S WHY I WAS ONE OF THE
FIRST MAYORS TO CRACK DOWN ON
ILLEGAL IMMIGRATION.
NOW OTHER STATES HAVE TAKEN UP
THAT FIGHT.
I'M REMINDED HOW THE FEDERAL
GOVERNMENT HAS FAILED TO STOP
ILLEGAL IMMIGRATION.
STATES LIKE ARIZONA AND CITIES
LIKE HAZELTON ARE FORCED TO ACT
BECAUSE THIS ADMINISTRATION AND
PRIOR ADMINISTRATIONS REFUSED TO
ENFORCE IMMIGRATION LAWS.
ON WEDNESDAY, CHIEF JUSTICE JOHN
ROBERTS SAID IT BEST, QUOTE, IT
SEEMS TO ME THE FEDERAL
GOVERNMENT JUST DOESN'T WANT TO
KNOW WHO IS HERE ILLEGALLY OR
NOT.
WELL, MR. SPEAKER, TAKE IT FROM
SOMEONE WHO HAS BEEN FIGHTING
AGAINST ILLEGAL IMMIGRATION FOR
SIX YEARS NOW, SADLY THAT SOUNDS
JUST ABOUT RIGHT.
I YIELD BACK.
THE
GENTLEMAN'S TIME HAS EXPIRED.
FOR WHAT PURPOSE DOES THE
GENTLEMAN FROM GEORGIA EKE WRECK
-- SEEK RECOGNITION?
TO ADDRESS THE HOUSE FOR ONE
MINUTE.
REVISE AND EXTEND.
WITHOUT
OBJECTION, THE GENTLEMAN IS
RECOGNIZED FOR ONE MINUTE.
MR. SPEAKER, IT'S WITH
SADNESS I RISE TO HONOR THE LIFE
OF OTIS BROCK III WHO PASSED
AWAY TUESDAY AT THE AGE OF 41.
OTIS' TIME WITH US WAS TOO
BRIEF, BUT HIS LIFE SERVES AS A
SHINING EXAMPLE TO OTHERS.
A LEADER FROM THE BEGINNING,
OTIS WAS INSPIRED BY THE
EXAMPLES SET BY HIS PARENTS,
BOTH EDUCATORS.
AFTER GRADUATING FROM HIGH
SCHOOL, OTIS ROSE TO BECOME THE
SAVANNAH CHATAM PUBLIC COUNTY
SCHOOLS SYSTEMS OPERATION CHIEF.
MR. BAR ROW --
THE ROLE HE ENJOYED
THE MOST WAS FATHER.
THEY ARE THE PROUD PARENTS OF
TWO YOUNG DAUGHTERS AND ARE
AWAITING THE BIRTH OF THEIR
THIRD CHILD.
OTIS, WE THANK YOU FOR YOUR LIFE
AND LEGACY.
YOU'LL BE MISSED W THAT, MR.
SPEAKER, I YIELD BACK THE
BALANCE OF MY TIME.
FOR
WHAT PURPOSE DOES THE GENTLEMAN
FROM ARKANSAS SEEK RECOGNITION?
PERMISSION TO ADDRESS THE
WITHOUT
OBJECTION, THE GENTLEMAN IS
RECOGNIZED FOR ONE MINUTE.
THANK YOU, MR. SPEAKER.
I RISE TODAY TO RECOGNIZE JOHN
ALLEN AND HIS LIFETIME OF
SERVICE TO HIS COMMUNITY AND THE
STATE OF ARKANSAS AND OUR
COUNTRY.
JOHN CURRENTLY SERVES ON THE
BOARD OF DIRECTORS FOR THE
LAWRENCE COUNTY CHILDREN'S
SHELTER.
IN THE PAST HE SERVED AS AN
ALDERMAN, CHAIRMAN OF THE
LAWRENCE COUNTY CHAMBER, A LAY
LEADER AT THE UNITED METHODIST
CHURCH AND PRESIDENT OF THE
LION'S CLUB.
IN 1980 HE SERVED ON THE
ARKANSAS TRANSPORTATION
COMMISSION AND NATIONAL MOTOR
SAFETY REGULATORY REVIEW PANEL.
DURING THIS TIME HE WAS
INSTRUMENTAL IN OBTAINING
FUNDING FOR ARKANSAS STATE
UNIVERSITY TO START A
TRANSPORTATION RELATED PROGRAM
WITH THE COLLEGE OF BUSINESS.
THANKS TO JOHN'S EFFORTS, A.S.U.
NOW HAS LOGISTICS AND SUPPLY
CHAIN MANAGEMENT PROGRAM.
ADDITIONALLY JOHN SERVED AS
DIRECTOR OF THE ARKANSAS
ASSESSMENT COORDINATION
DEPARTMENT AND ARKANSAS STATE
DIRECTOR FOR USDA WORLD
JOHN HAS ACHIEVED MUCH AS A
PUBLIC SERVANT, BUT HE'LL BE THE
FIRTS TO SAY HIS FAMILY IS
CENTER OF HIS LIFE.
MARRIED FOR 49 YEARS.
TOGETHER THEY HAVE THREE
MATT.
HE'S ALSO THE PROUD GRANDFATHER
OF ANNA AND ELLA.
MR. SPEAKER, TODAY I HONOR HIM
FOR HIS LIFETIME OF SERVICE,
ARKANSAS AND OUR NATION IS A
HIS EFFORTS.
THE
GENTLEMAN YIELDS BACK.
FOR WHAT PURPOSE DOES THE
GENTLEMAN FROM CALIFORNIA SEEK
RECOGNITION?
TO ADDRESS THE HOUSE FOR ONE
EXTEND.
GENTLEMAN ASK UNANIMOUS CONSENT?
WITHOUT OBJECTION, THE GENTLEMAN
IS RECOGNIZED FOR ONE MINUTE.
THANK YOU VERY MUCH,
MR. SPEAKER.
I RISE TODAY IN OPPOSITION OF
H.R. 4628, KNOWN AS THE INTEREST
RATE REDUCTION ACT.
KEEPING STUDENT LOANS RATES AT A
CURRENT LEVEL SHOULD BE AN EASY,
BIPARTISAN BILL.
HOWEVER IT SHOULD NOT BE AT THE
COST OF AN ASSAULT ON WOMEN'S
HEALTH.
OF ALL THE OFFSETS AVAILABLE TO
THE MAJORITY, THEY CHOSE TO
UNDERMINE THE WELL-BEING OF
AMERICA'S WOMEN AND CHILDREN BY
GUTTING INVESTMENTS IN SCREENING
FOR BREAST AND CERVICAL CANCER,
IN CHILDHOOD IMMUNIZATIONS.
IN INITIATIVES TO REDUCE BIRTH
DEFECTS.
I REMAIN COMMITTED TO PREVENTING
AN INCREASE TO STUDENT COSTS FOR
OVER 7.4 MILLION AMERICANS.
I'D LIKE TO SEE A NEW,
BIPARTISAN BILL SENT TO THE
PRESIDENT'S DESK WELL IN ADVANCE
OF JULY 1 DEADLINE WHERE THE
RATES ARE SCHEDULED TO GO UP.
ANY STUDENT LOAN RELIEF SHOULD
NOT COME AT THE EXPENSE OF
FUNDING FOR CHILDHOOD
IMMUNIZATION, SCREENING PROGRAMS
FOR BREAST AND CERVICAL CANCER,
AND BIRTH DEFECTS.
I URGE MY COLLEAGUES TO VOTE NO
ON THIS FLAWED LEGISLATION.
THE
GENTLEMAN YIELDS BACK.
FOR WHAT PURPOSE DOES THE
GENTLEMAN FROM PENNSYLVANIA SEEK
RECOGNITION?
MR. SPEAKER, REQUEST
UNANIMOUS CONSENT TO ADDRESS THE
HOUSE FOR ONE MINUTE, REVISE AND
WITHOUT
OBJECTION, THE GENTLEMAN IS
RECOGNIZED FOR ONE MINUTE.
MR. SPEAKER, I
RISE TODAY TO RECOGNIZE THOMAS
C. DEBT WILER, A CONSTITUENT
FROM RIDGEWAY, PENNSYLVANIA.
HE'S THE MAIL MANAGER OF JOHN
TAR'S MILL AND HE WAS AWARDED
THE MILL MACKER OF THE YEAR
AWARD FROM THE PAPER MANAGEMENT
ASSOCIATION AT THEIR
INTERNATIONAL CONFERENCE.
HE WAS NAMED VICE PRESIDENT AND
MAIL MANAGER ON JULY 1, 2006,
THE PINNACLE OF A PROFESSIONAL
JOURNEY THAT BEGAN OVER 38 YEARS
AGO AT THE SAME FACILITY WHEN HE
WAS HIRED.
OVER THE YEARS HE BECAME A
RECOGNIZED LEADER IN THE
HIS WORK AND DEDICATION IS AN
INSPIRATION TO ALL OF US AND HIS
CONCERN FOR THE MILL AND
EMPLOYEES OFFER THE YEARS IS
COMMENDABLE.
WHILE BEING DIAGNOSED WITH A
SEVERE HEALTH ISSUE THAT BEGAN
SIX YEARS AGO, THOMAS DEVOTED TO
THE MILL AND ESPECIALLY THE 378
A GRADUATE OF JOHNSONBURG HIGH
SCHOOL, HE HOLDS A BACHELOR OF
SCIENCE DEGREE IN MEDICAL
TECHNOLOGY FROM PENN STATE
UNIVERSITY.
HE RESIDES WITH HIS WIFE, THEY
HAVE TWO GROWN DAUGHTERS.
I WANT TO THANK TOM FOR HIS
SERVICE TO THE COMMUNITY AND
CONGRATULATE HIM ON THIS HE
ESTEEMED AWARD.
I YIELD BACK.
FOR
WHAT PURPOSE DOES THE GENTLEMAN
FROM FLORIDA SEEK RECOGNITION?
I ASK UNANIMOUS CONSENT TO
MINUTE.
WITHOUT
OBJECTION, THE GENTLEMAN IS
RECOGNIZED FOR ONE MINUTE.
MR. SPEAKER, WHEN THE DOOR
BELL RANG AT 5:00 A.M., KIMBERLY
MET CALF OF FLORIDA KNEW HER
WORST FEAR HAD COME TRUE.
HER ONLY CHILD,
22-YEAR-OLD MICHAEL, U.S. ARMY
PRIVATE FIRST CLASS, DIED IN
AFGHANISTAN ON SUNDAY FOLLOWING
AN IED ATTACK.
HE WAS KILLED AT THE WHEEL OF
HIS VEHICLE WHILE TRYING TO
RESCUE OTHER SOLDIERS.
DESCRIBED BY HIS MOTHER AS TOUGH
AND STRONG WITH A SENSITIVE
SIDE, HE PERFORMED THIS ONE LAST
ACT OF BRAVERY CAME AS NO
SURPRISE TO ALL WHO KNEW HIM.
HE ATTENDED PARK VISTA HIGH
SCHOOL AND GRADUATED FROM ST.
JOHN'S NORTHWESTERN MILITARY
ACADEMY.
HE LOVED SERVING, SKIM BOARDING,
AND SPENDING TIME BY THE WATER.
ON MONDAY HIS FRIENDS AND FAMILY
GATHERED AT THE INLET TO LIGHT
CANS ON THE SUR BOARD.
WINDS BLEW ALL OUT BUT ONE.
THE CANDLE WOULDN'T GO OUT, HE
WANTED TO HANG OUT WITH US ALL
NIGHT.
WE'LL NEVER FORGET HIS SACRIFICE
AND THE NATION IS GRATEFUL FOR
HIS SERVICE.
THE
GENTLEMAN YIELDS BACK.
GENTLEMAN FROM ILLINOIS SEEK
RECOGNITION?
MR. SPEAKER, REQUEST
UNANIMOUS CONSENT TO ADDRESS THE
REVISE AND EXTEND.
WITHOUT
RECOGNIZED FOR ONE MINUTE.
THANK YOU.
MR. SPEAKER, MOST PEOPLE CAN
POINT TO AT LEAST ONE OR TWO
YEARS HISTORICAL FIGURES OR
PERSONAL MENTORS WHO
SIGNIFICANTLY AFFECTED THEIR
LIVES OR CALLING.
CHUCK COLESON WAS ALL THREE OF
THESE THINGS TO ME AND MANY
CHARLES W. COLESON WENT TO BE
WITH HIS LORD ON APRIL 21, 2012.
CHUCK WAS A PROFOUND EXAMPLE OF
ONE SAVED BY GRACE.
AS A SLATE LEGISLATOR, I WAS
GREEFED BY OILER RECIDIVISM RACE
AND GOT INVOLVED IN SEVERAL
PRISON MINISTRIES.
THE YEAR BEFORE I
RAN FOR CONGRESS, I WAS PART OF
PROGRAM.
MY WIFE AND I CHOSE TO NAME OUR
YOUNGEST SON COLESON.
COLE THAT HIS LIFE
LIKE CHUCK'S WOULD REFLECT THE
LIFE CHANGING GRACE AND
REDEMPTION OFFERED TO US BY THE
I YIELD BACK.
THE
GENTLEMAN YIELDS BACK.
FOR WHAT PURPOSE DOES THE
GENTLEMAN FROM CALIFORNIA SEEK
RECOGNITION?
UNANIMOUS CONSENT TO ADDRESS
THE HOUSE FOR ONE MINUTE, REVISE
WITHOUT
RECOGNIZED FOR ONE MINUTE.
MR. SPEAKER, I RISE
TODAY NO RECOGNITION OF NATIONAL
CRIME VICTIMS RIGHTS WEEK.
AS CO-FOUNDER AND CO-CHAIR WITH
CONGRESSMAN TED POE OF THE
BIPARTISAN CONGRESSIONAL VICTIMS
RIGHTS CAUCUS, WE ARE WELL AWARE
FAR TOO OFTEN THAT THE VICTIMS
OF CRIME SUFFER IN SILENCE.
JUST LAST WEEK MEMBERS OF THE
CAUCUS HONORED ADVOCATES
NATIONWIDE FOR THEIR WORK IN
SUPPORTING CRIME VICTIMS,
INCLUDING THE UNIVERSITY OF
CALIFORNIA MERCED.
CANDY OWE DONALD BROWN OF THE
MOUNTAIN SERVICES CENTER AND THE
GOOD WORK THAT SHE AND HER FOLKS
HAVE DONE.
EVERY DAY THESE ADVOCATES WORKED
TIRELESSLY TO GUARANTEE EVERY
SURVIVOR HAS A PLACE TO TURN FOR
SUPPORT IN THE AFTERMATH OF
THOUGH WE WISH THAT
COMMEMORATIVE WEEKS SUCH AS THIS
WERE NOT NECESSARY, THEY HELP
EDUCATE THE PUBLIC AND REMIND
SURVIVORS THAT THEY ARE NOT AND
NEVER WILL BE FORGOTTEN.
ALL OF US HAVE A RESPONSIBILITY
TO GIVE VOICE TO THE CHALLENGES
CRIME VICTIMS FACE.
NOT JUST THIS WEEK, BUT FOR
EVERY WEEK OF THE YEAR.
I YIELD BACK THE BALANCE OF MY
TIME.
THE
GENTLEMAN YIELDS BACK.
FOR WHAT PURPOSE DOES THE
RECOGNITION?
REQUEST PERMISSION TO ADDRESS
THE HOUSE FOR ONE MINUTE, REVISE
AND EXTEND.
WITHOUT
RECOGNIZED FOR ONE MINUTE.
THANK YOU.
I RISE TODAY WITH A HEAVY HEART
AS THE DELIVERY CEREMONY OF THE
LAST F-22 RAPTOR WILL TAKE PLACE
NEXT WEDNESDAY IN MARIETTA,
GEORGIA, MY HOMETOWN.
TAIL NUMBER 195, FAR SHORT OF
WHAT OUR AIR FORCE NEEDS.
OVER THE LAST THREE DECADES THE
COULD BE COUNTY COMMUNITY HAS
WATCHED THE F-22 GRACE THE SKIES
AS THOUSANDS OF OUR CITIZENS
HAVE WORKED STEADFASTLY TO MAKE
THE PRODUCTION A MODEL OF
MANY OF OUR NEIGHBORS HAD A
DIRECT HAND IN PRODUCING MOST
CAPABLE FIGHTER JET IN HISTORY.
THE PROGRAM HAS BEEN A CRITICAL
COMPONENT OF AMERICA'S
INDUSTRIAL BASE AND A SOURCE OF
ECONOMIC STRENGTH CREATING
25,000 AMERICAN JOBS IN 44
STATES AND REPRESENTING MORE
THAN $112 BILLION IN ANNUAL
ECONOMIC ACTIVITY.
THE F-22 PROJECTS OUR CITIZENS
AND OUR SOLDIERS AND DETERS
AMERICANS -- AMERICA'S ENEMIES.
ITS LEGACY WILL BE A CREDIT TO
OUR COMMUNITY FOR YEARS TO COME.
MR. SPEAKER, I ASK MY COLLEAGUES
JOIN ME IN RECOGNIZING LOCKHEED
MARTIN AND THE F-22 PROGRAM.
THE
GENTLEMAN YIELDS BACK.
GENTLEMAN FROM CONNECTICUT SEEK
RECOGNITION?
TO ADDRESS THE HOUSE FOR ONE
REVISE AND EXTEND.
WITHOUT
RECOGNIZED FOR ONE MINUTE.
I RISE TODAY ON
WORKERS MEMORIAL DAY BECAUSE 25
BRIDGE PORT,
CONNECTICUT, 28 CONSTRUCTION
WORKERS LOST THEIR LIVES.
BUILDING A BUILDING USING THE
CONTROVERSIAL LIFT SLAB
CONSTRUCTION TECHNIQUE WHICH
EVEN AT THE TIME WAS SUBJECT TO
CONTROVERSY AND IS NOW SUBJECT
TO VERY SIGNIFICANT REGULATION.
THIS SAD ACCIDENT COULD EASILY
HAVE BEEN AVOIDED, BUT BECAUSE
THE PROPER SAFETY REGULATIONS
WERE NOT IN PLACE, 28 MEN DID
NOT GO HOME THAT DAY.
WHEN I ATTENDED A CEREMONY
EARLIER THIS WEEK TO COMMEMORATE
IT, I MET WITH SOME OF THE
FAMILIES, THE MEN WERE HUSBANDS,
NEIGHBORS.
DAY IN AND DAY OUT IN THIS
CHAMBER WE HEAR ABOUT
JOB-KILLING REGULATIONS FROM THE
OTHER SIDE.
AND, YES, WE MUST MAKE SURE OUR
REGULATIONS ARE FINELY BALANCED,
IT HAS BECOME RELIGIOUS IN THIS
CHAMBER THAT ALL REGULATIONS
WHETHER THEY ARE THERE TO
PRESERVE THE LIVES OF
CONSTRUCTION WORKERS OR KEEP
CHILDREN FROM DYING OF ASTHMA
ARE JOB-KILLING REGULATIONS.
STAYS IDEOLOGICAL AND
THIS RELIGIOUS, WE WILL SEE MORE
KILLING OF THE REAL KIND.
THANK YOU, MR. SPEAKER.
I YIELD BACK THE BALANCE OF MY
TIME.
THE
GENTLEMAN YIELDS BACK.
PURSUANT TO CLAUSE 8 OF RULE
20, THE CHAIR WILL POSTPONE
QUESTIONS IF THE VOTE INCURS
OBJECTION UNDER CLAUSE 6 OF
RULE 20.
VOTES WILL BE TAKEN LATER
TODAY.
FOR WHAT PURPOSE DOES THE
GENTLEMAN RISE?
I ASK UNANIMOUS CONSENT THAT
THE HOUSE SUSPEND THE RULES
H.R. 2096, THE CYBERSECURITY
ENHANCEMENT ACT OF 2011, AS
AMENDED.
THE
CLERK WILL REPORT THE TITLE OF
THE BILL.
H.R. 2096, A BILL TO
ADVANCE CYBERSECURITY RESEARCH,
DEVELOPMENT, AND TECHNICAL
STANDARDS, AND FOR OTHER
PURSUANT TO THE RULE, THE
GENTLEMAN FROM TEXAS, MR.
MCCAUL, AND THE GENTLEMAN FROM
WILL CONTROL 20 MINUTES.
THE CHAIR RECOGNIZES THE
GENTLEMAN FROM TEXAS.
I ASK UNANIMOUS
CONSENT THAT ALL MEMBERS MAY
HAVE FIVE LEGISLATIVE DAYS TO
REVISE AND EXTEND THEIR REMARKS
AND TO INCLUDE EXTRANEOUS
MATERIAL IN THIS BILL, AS
CONSIDERATION.
WITHOUT OBJECTION, SO ORDERED.
SPEAKER.
I YIELD MYSELF SUCH TIME AS I
MAY CONSUME.
THE
GENTLEMAN IS RECOGNIZED FOR
SUCH TIME AS HE MAY CONSUME.
MR. SPEAKER, TODAY
CONGRESS HAS HISTORIC
OPPORTUNITY TO LAY THE
GROUNDWORK TO DEFEND OUR NATION
AGAINST CYBERATTACKS.
WE ARE NOT TALKING ABOUT
MISCHIEVOUS ONLINE ACTIVITY BUT
ACTION THAT CAN BRING AMERICA
TO ITS KNEES.
UNFORTUNATELY, THIS IS NOT
SCIENCE FICTION.
AMERICA IS UNDER ATTACK, NOT BY
ARMYS ADVANCING ON OUR BEACHES
OR PLANES OVERHEAD, BUT IN THE
VIRTUAL WORLD WHERE THOSE WHO
INTEND TO DO US HARM HAVE
ALREADY PENETRATED OUR FEDERAL
AND PRIVATE COMPUTER NETWORKS
AND CONTINUE TO PLOT
RELENTLESSLY TO BRING DOWN OUR
CRITICAL INFRASTRUCTURE, OUR
WATER SUPPLY, NUCLEAR
FACILITIES, AIR TRAFFIC CONTROL
SYSTEMS, ELECTRICAL GRID AND
DEFENSE AND BANKING SYSTEMS ARE
ALL VULNERABLE TO A CRIPPLING
ATTACK.
GENERAL KEITH ALEXANDER,
DIRECTOR OF THE NATIONAL
SECURITY AGENCY, SAID IT IS NOT
A MATTER OF IF BUT WHEN A
CYBERPEARL HARBOR OCCURS.
WE ARE SIMPLY FORTUNATE THAT A
COMPUTER-BASED ATTACK HAS NOT
YET BROUGHT PHYSICAL HARM TO
BUT THAT IS NOT FOR LACK OF
TRYING.
CHINA HAS ALREADY SUCCESSFULLY
STOLEN SOME OF OUR BIGGEST
MILITARY SECRETS SUCH AS
INFORMATION ABOUT THE F-35
JOINT STRYKE FIGHTER, THE
WEAPON EVER.
NOW THEY KNOW THE PROGRAM WELL
ENOUGH NOT ONLY TO COPY IT BUT
TO GUARD AGAINST IT.
SIMILAR ATTACKS CONTINUE
UNABATED ON OUR MILITARY'S
COMPUTER SYSTEMS.
TRICK SOLDIERS INTO
DOWNLOADING SOFTWARE INTO THEIR
COMPUTERS.
IMAGINE IF AGENTS OF A FOREIGN
GOVERNMENT WERE BREAKING INTO
THE PENTAGON AND STEALING
TOP-SECRET DOCUMENTS, PAPER
IT WOULD NOT BE TOLERATED.
IT WOULD BE ALL OVER THE FRONT
PAGE OF "THE WASHINGTON POST,"
AND YET IN THE VIRTUAL WORLD
THAT IS OCCURRING.
IN FACT, OCTOBER, 2011, REPORT
TO CONGRESS ON FOREIGN ECONOMIC
COLLECTION AND INDUSTRIAL
ESPIONAGE STATES AS PART OF
CHINA AND RUSSIA'S NATIONAL
POLICY TO TRY TO IDENTIFY AND
TAKE SENSITIVE TECHNOLOGY WHICH
THEY NEED FOR THEIR OWN
DEVELOPMENT.
IN FACT, THEY TRAIN AND HAVE A
CYBERWARFARE COLLEGE.
THE DEGRADATION OF OUR
INTELLECTUAL PROPERTY THREATENS
TO WEAKEN US WHERE WE HAVE
HISTORICALLY BEEN STRONG.
THE N.S.A. CALCULATES THAT
STOLEN $1
TRILLION IN AMERICAN
INTELLECTUAL PROPERTY, THE
BIGGEST TRANSFER OF WEALTH IN
HISTORY.
THEIR PHILOSOPHY IS WHY INVENT
IF YOU CAN STEAL IT?
GROUPS SUCH AS UNANIMOUS,
ANTI-SEC WHO INDULGE IN
NONSTATE HACKTAVISM, THEY STEAL
FROM THOSE WHOM THEY DISAGREE
WITH.
THEY THINK OF NOTHING OF
CLOSING DOWN WEBSITES, HACKING
INTO EMAIL AND VOICEMAILS,
TAKING SENSITIVE INFORMATION
FROM THOSE WHO DON'T DO THEIR
BIDDING.
THERE'S BEEN A LOT OF HARD WORK
GOING INTO THIS WEEK, THIS
CYBERWEEK AND A LOT OF THOUGHT
TO FIND SOLUTIONS.
AS CO-CHAIR OF THE CENTER FOR
STRATEGIC AND INTERNATIONAL
STUDIES COMMISSION ON
CYBERSECURITY FOR THE 44TH
PRESIDENT, I HELPED DRAFT
RECOMMENDATIONS FOR SECURING
THE COUNTRY'S GOVERNMENT
NETWORKS AND CRITICAL
AS A MEMBER OF THE SPEAKER'S
CYBERTASK FORCE AND CHAIRMAN OF
THE HOUSE CYBERSECURITY CAUCUS,
I HELPED PRESENT THOSE
RECOMMENDATIONS TO CONGRESS IN
THE LEGISLATION WE HAVE SEEN
THIS WEEK.
THE HISTORIC LEGISLATION THE
HOUSE VOTES ON THIS WEEK
INCORPORATES MANY OF THESE
RECOMMENDATIONS.
THIS BILL, THE CYBERSECURITY
ENHANCEMENT ACT, GIVES THE
NATIONAL INSTITUTE OF STANDARDS
AND TECHNOLOGY THE AUTHORITY TO
SET SECURITY STANDARDS FOR
FEDERAL COMPUTER SYSTEMS AND
DEVELOP CHECKLISTS FOR AGENCIES
TO FOLLOW.
WHY IS THAT IMPORTANT?
IT HARDENS OUR FEDERAL
NETWORKS.
EVERY FEDERAL AGENCY HAS BEEN
HACKED INTO BY AGENTS OF A
FOREIGN POWER, BY HACTAVISTS,
EVERY FEDERAL AGENCY, INCLUDING
THE PENTAGON, HAS BEEN HACKED
INTO.
THIS BILL WILL MAKE THEM LESS
VULNERABLE TO SUCH AN ATTACK.
IT ALSO CREATES A FEDERAL
UNIVERSITY PRIVATE SECTOR TASK
FORCE TO COORDINATE RESEARCH
AND DEVELOPMENT.
IT ESTABLISHES CYBERSECURITY
RESEARCH AND DEVELOPMENT GRANT
PROGRAMS AND IMPROVES THE
QUALITY OF OUR CYBERWORK FORCE
PROGRAM.
IMPORTANTLY, IT CREATES AN
EDUCATION AND AWARENESS PROGRAM
FOR COMPUTER HYGIENE.
WHEN YOU TALK TO THE N.S.A.,
THEY TELL YOU THAT COMPUTER
HYGIENE ACCOUNTS FOR THE
MAJORITY OF CYBERATTACKS.
THIS WOULD REMEDY THE MAJORITY
OF VULNERABILITIES THAT WE
AND FINALLY, IT SETS FORTH
PROCUREMENT STANDARDS FOR
HARDWARE AND SOFTWARE THAT WILL
MINIMIZE SECURITY RISKS.
THIS WILL ALSO HAVE A RIPPLE
EFFECT IN THE PRIVATE SECTOR SO
THAT THEY WILL ALSO ADOPT SUCH
PROCUREMENT STANDARDS.
OTHER LEGISLATION WE SAW THAT
PASSED YESTERDAY FACILITATES
THE SHARING OF INFORMATION, OF
THREAT INFORMATION BETWEEN THE
PUBLIC AND PRIVATE SECTOR WHICH
CONTROLS MOST OF OUR CRITICAL
INFRASTRUCTURE.
I THINK IT'S IMPORTANT TO MAKE
THE ANALOGY THAT WHAT WE DID
YESTERDAY WAS SIMPLY -- SIMPLY
ALLOW THE FEDERAL GOVERNMENT TO
SHARE SIGNATURE THREAT
SECTOR.
SIMILAR TO A POLICE OFFICER
SHARING WITH A HOMEOWNER A
THREAT THAT THEY SEE OF SOMEONE
BREAKING INTO THEIR HOUSE AND
THEN TELLING THEM HOW THEY CAN
BETTER PROTECT THEIR HOUSE AND
LOCK THE DOOR WITHOUT THE DOOR
BEING OPENED.
THESE COMMONSENSE REFORMS ARE A
BASELINE OF WHAT WE NEED TO
SECURE OUR INFRASTRUCTURE.
WE MUST TAKE ACTION BEFORE LIFE
IS LOST AND OUR ECONOMY AND
DEFENSES HAVE BEEN WEAKENED TO
THE POINT OF DAMAGING OUR
COUNTRY.
ONE OF THE BIGGEST FAILURES
AFTER 9/11 WAS THE KNOWLEDGE
THAT THE ATTACKS COULD HAVE
BEEN PREVENTED WITH BETTER
INTELLIGENCE INFORMATION
SHARING AND PROTECTIVE
MEASURES.
IT IS ALSO LACK OF IMAGINATION.
AND WHILE WE CAN'T CHANGE THE
PAST, WE CAN USE IT AS A LESSON
AS WE GO FORWARD IN OUR MODERN
CYBERWORLD, A WORLD IN WHICH
OUR WATER SUPPLY, DEFENSE
SYSTEMS, NUCLEAR POWER PLANTS,
ELECTRICAL GRID, BANKING
SYSTEMS, F.A.A. AND OTHER
CRITICAL INFRASTRUCTURES ARE
VULNERABLE TO CYBERTHIEVES,
ATTACKS AND TERRORISTS.
WE KNOW WHAT HAS TO BE DONE.
NOW.
AND WITH THAT I RESERVE THE
BALANCE OF MY TIME.
THE
GENTLEMAN RESERVES.
FOR WHAT PURPOSE DOES THE
RECOGNITION?
MR. SPEAKER, I
YIELD MYSELF SUCH TIME AS I MAY
THE
GENTLEMAN IS RECOGNIZED FOR
SUCH TIME AS HE MAY CONSUME.
I RISE IN SUPPORT
OF H.R. 2096, THE CYBERSECURITY
ENHANCEMENT ACT.
I WOULD LIKE TO THANK MY
COLLEAGUE, MR. MCCAUL, FOR HIS
HARD WORK ON THIS CRITICAL
POLICY.
AS CO-FOUNDER OF THE HOUSE
CYBERSECURITY CAUCUS, MR.
MCCAUL HAS BECOME INCREASINGLY
IMPORTANT TO OUR NATION.
OUR WORK TOGETHER ON THIS
LEGISLATION, WHICH BEGAN LAST
CONGRESS, DEMONSTRATES THAT
THIS BILL IS GOOD BIPARTISAN
PUBLIC POLICY THAT SHOULD
RECEIVE OVERWHELMING SUPPORT IN
THIS HOUSE.
IN 2009 THE PRESIDENT CALLED
FOR A COMPREHENSIVE 60-DAY
REVIEW OF U.S. CYBERSPACE
POLICY.
THAT CALL IN THE SUBSEQUENT
EXPERT RECOMMENDATIONS
CONTAINED IN THE REPORT LED TO
A SERIES OF HEARINGS ON
CYBERSECURITY R&D, AND IT
RESULTED IN THE CYBERSECURITY
ENHANCEMENT ACT OF 2010 WHICH I
SPONSOR AND WORKED ON WITH MR.
MCCAUL IN THE SCIENCE AND
TECHNOLOGY COMMITTEE LAST
THAT BILL PASSED THIS CHAMBER
BY A VOTE OF 422-5.
UNFORTUNATELY, IT WAS NOT TAKEN
UP BY THE SENATE.
SINCE THAT TIME, CYBERTHREATS
HAVE ONLY INCREASED.
SO LAST MAY, MR. MCCAUL AND I
INTRODUCED THIS BILL ONCE AGAIN
TO ADDRESS THE PRESSING
EDUCATION, RESEARCH AND
DEVELOPMENT AND STANDARDS AND
PRACTICES ASPECTS OF
CYBERSECURITY.
IN AMERICA EVERY INDIVIDUAL AND
EVERY ORGANIZATION, INCLUDING
THE FEDERAL GOVERNMENT, IS
VULNERABLE TO CYBERCRIME.
OUR MOST SENSITIVE DATA IS
THERE ARE COUNTLESS
INDIVIDUALS, GROUPS AND NATIONS
RELENTLESSLY FOCUSED ON
EXPLOITING GAPS IN OUR
CYBERSECURITY SYSTEM.
THE FEDERAL TRADE COMMISSION
ESTIMATES THAT IDENTITY THEFT
COSTS CONSUMERS $50 BILLION
ANNUALLY.
THERE WAS A CYBERATTACK THAT
DEVELOPMENT ADMINISTRATION TO
UNPLUG FROM THE NETWORK.
AND JUST YESTERDAY, THE
HOMELAND SECURITY COMMITTEE
HEARD FROM WITNESSES ABOUT
IRAN'S DEVELOPMENT OF A
CYBERARMY.
CYBERCRIME EVOLVES AS QUICKLY
AZTEC NOTHING ITSELF.
IT WILL TAKE A COLLECTIVE
EFFORT BY THE FEDERAL
GOVERNMENT, THE PRIVATE SECTOR,
OUR SCIENTISTS AND ENGINEERS
IT.
AND H.R. 2096 WILL HELP TO DO
THIS.
THE FIRST STOP IS EDUCATION.
THIS BILL BUILDS ON EXISTING
PARTNERSHIPS SUCH AS THE N.S.F.
CENTER FOR SYSTEM SECURITY AND
INFORMATION INSURANCE AT MARINE
VALLEY COMMUNITY COLLEGE IN
THIS COMMUNITY COLLEGE HAS
TRAINED HUNDREDS OF TEACHERS
AND COLLEGE FACULTY IN
CYBERSECURITY RELATED AREAS
SINCE 2003.
INDIVIDUALS WHO ARE NOW
TEACHING AT COLLEGES AND
TECHNICAL TRAINING PROGRAMS
NATIONWIDE.
H.R. 2096 ALSO PROVIDES
SCHOLARSHIPS TO STUDENTS
PURSUING A DEGREE IN
CYBERSECURITY IN EXCHANGE FOR
THEIR SERVICE IN THE FEDERAL
I.T. WORK FORCE.
THIS APPROACH NOT ONLY PROVIDES
FOR THE IMMEDIATE NETWORK NEEDS
FOR THE FEDERAL GOVERNMENT BUT
ALSO BUILDS ALINE FOR PRIVATE
INDUSTRY.
NOW, IN ADDITION TO THE SKILLED
FORCE, OUR NATION
ALSO NEEDS ADVANCEMENTS IN
BASIC R&D.
CYBERTHREATS ARE CONSTANTLY
EVOLVING AND CYBERSECURITY R&D
MUST REFLECT A COMPREHENSIVE
EFFORT THAT BUILDS TOWARDS A
MORE SECURE FOUNDATION IN THE
SHORT AND LONG TERM.
SO THIS LEGISLATION REQUIRES
RELEVANT FEDERAL AGENCIES TO
WORK WITH THE NATIONAL SCIENCE
AND TECHNOLOGY COUNCIL TO
DEVELOP A NATIONAL STRATEGIC
PLAN FOR CYBERSECURITY R&D THAT
SETS PRIORITIES BASED ON RISK
ASSESSMENTS, FOCUSES ON
TRANSFORMATIONAL TECHNOLOGIES
AND TECHNOLOGY PROGRAMS.
IT WILL BUILD ON INFRASTRUCTURE
THAT WE NEED TO GET THE BEST
IDEAS OUT OF THE LAB AND INTO
THE MARKETPLACE.
AND BECAUSE PEOPLE ARE PERHAPS
THE WEAKEST LINK IN MANY I.T.
SYSTEMS, THE REERCH STRATEGY
WILL INCLUDE THE SOCIAL
SCIENCES TO HELP US BETTER
UNDERSTAND HOW HUMANS INTERACT
WITH TECHNOLOGY.
PROMOTING PUBLIC AWARENESS OF
GOOD COMPUTER HYGIENE CAN GO A
LONG WAY TO PROTECTING OUR
SYSTEMS.
THE DISSEMINATION OF SIMPLE
CONCEPTS, SUCH AS INSTALLING
ANTI-VIRUS SOFTWARE AND NOT
OPENING EMAIL FROM UNKNOWN
SOURCES CAN GO A LONG WAY IN
REDUCING THE THREAT OF
CYBERCRIME.
THE LEGISLATION ALSO CALLS ON
THE NATIONAL INSTITUTES OF
STANDARDS AND TECHNOLOGY TO BE
THE LEADER IN BOTH THE DOMESTIC
STANDARDS.
AS MR. MCCAUL SAID, H.R. 2096
PASSED -- DEVELOPING A
COMPREHENSIVE INTERNATIONAL
CYBERSECURITY STRATEGY THAT
DEFINES WHAT WORKING AND I.T.
TECHNICAL STANDARDS WE NEED
DETERMINES WHERE THEY'RE BEING
DEVELOPED, IT ENSURES THE
UNITED STATES IS REPRESENTED.
AND FINALLY, RECOGNITION OF THE
FEDERAL GOVERNMENT'S INCREASING
EFFORTS TO UTILIZE REMOTE DATA
CENTERS.
IN THIS COPING, I WORKED TO ADD
SO THAT THE BILL NOW
DIRECTS THEM TO WORK WITH OTHER
AGENCIES AND WITH EXPERTS IN
THE PRIVATE SECTOR TO ENSURE
THAT CONSISTENT AND SECURE
STANDARDS ON CLOUD COMPUTING
ARE PUT IN PLACE ACROSS THE
FEDERAL GOVERNMENT.
AS CLOUD COMPUTING IS USED MORE
AND MORE BY THE FEDERAL
GOVERNMENT, WE MUST MAKE SURE
THAT THIS DATA IS SAFE.
MR. SPEAKER, THIS BILL IS A
NECESSARY AND VITALLY IMPORTANT
STEP TOWARD SECURING A
PUBLIC-PRIVATE AND PERSONAL
I.T. SYSTEMS.
IT IS A GOOD BIPARTISAN BILL,
AND I URGE MY COLLEAGUES TO
SUPPORT IT.
I RESERVE THE BALANCE OF MY
TIME.
THE
RESERVES.
FOR WHAT PURPOSE DOES THE
RECOGNITION?
MR. SPEAKER, I RISE
TO YIELD TO MY GOOD FRIEND AND
COLLEAGUE, THE CHAIRMAN OF THE
SCIENCE AND TECHNOLOGY
COMMITTEE, THE GENTLEMAN FROM
TEXAS, MR. HALL, FOR THREE
THE
GENTLEMAN FROM TEXAS IS
RECOGNIZED FOR THREE MINUTES.
I THANK YOU.
I WANT TO THANK MY FELLOW
TEXAN, REPRESENTATIVE MICHAEL
MCCAUL, FOR HIS VERY CAPABLE
LEADERSHIP, FOR HIS WONDERFUL
OPENING STATEMENT.
IT ALLOWS ME TO EXPECT LESS
TIME.
HIS KNOWLEDGE OF CYBERSECURITY
ISSUES IS A VERY IMPORTANT ASSET
TO THIS CONGRESS AND BENEFIT TO
THE NATION AND I'M PLEASED TO
JOIN HIM AS A CO-SPONSOR OF H.R.
2096, THE CYBERSECURITY
ENHANCEMENT ACT OF 2012.
AS HE STATED SO ELOQUENTLY, AS I
RELY ON INFORMATION TECHNOLOGY
EXPANDS, SO DO OUR
VULNERABILITIES.
PROTECTING THE NATION'S
CYBERINFRASTRUCTURE IS A
RESPONSIBILITY SHARED BY A
NUMBER OF DIFFERENT FEDERAL
AGENCIES, INCLUDING THE NATIONAL
SCIENCE FOUNDATION AND NATIONAL
INSTITUTE OF STANDARDS AND
TECHNOLOGY.
H.R. 2096 PRIMARILY ADDRESSES
CYBERSECURITY RESEARCH AND
DEVELOPMENT EFFORTS CONDUCTED AT
OR LED BY THESE AGENCIES.
IT RE-AUTHORIZES EXISTING BY
EXPIRED RESEARCH AND EDUCATION
PROGRAMS AT N.S.F. WHILE
ELIMINATING TWO UNNECESSARY
PROGRAMS AND ENHANCES
SCHOLARSHIPS TO INCREASE THE
SIZE AND SKILL TO THE FEDERAL
CYBERSECURITY WORK FORCE.
IT STRENGTHENS THE CYBERSECURITY
R&D EDUCATION, AND AWARENESS OF
NIST AND IT PROVIDES FOR
STRATEGY PLANNING FOR
CYBERSECURITY R&D ACROSS THE
THIS IS A GOOD FISCALLY
RESPONSIBLE BILL THAT ENJOYS
BROAD BIPARTISAN SUPPORT.
IT REPRESENTS A MODEST BUT
CRITICAL OF CONGRESS' OVERALL
EFFORTS TO ADDRESS THE
STATES.
THIS BILL HAS THE SUPPORT OF
NUMEROUS ORGANIZATIONS,
INCLUDING THE U.S. CHAMBER OF
COMMERCE, WHICH CAUSED H.R.
2096, AN IMPORTANT STEP TOWARD
IMPROVING FEDERAL CYBERSECURITY
R&D ACTIVITIES TO IMPROVE THE
SECURITY, RELIABILITY, OF
AMERICA'S DIGITAL INFRASTRUCTURE
UNQUOTE.
I SUPPORT THE PASSAGE OF H.R.
2096 AND ENCOURAGE MY COLLEAGUES
TO DO THE SAME.
I THANK YOU AGAIN.
I YIELD BACK THE BALANCE OF MY
TIME.
FOR
WHAT PURPOSE DOES THE GENTLEMAN
FROM ILLINOIS SEEK RECOGNITION?
I'D LIKE TO YIELD
TO THE GENTLEMAN FROM RHODE
ISLAND, FIVE MINUTES.
THE
GENTLEMAN FROM RHODE ISLAND IS
RECOGNIZED FOR FIVE MINUTES.
WITHOUT OBJECTION.
I THANK THE
GENTLEMAN FOR YIELDING.
MR. SPEAKER, I'M PLEASED TO RISE
TODAY IN STRONG SUPPORT OF THE
CYBERSECURITY ENHANCEMENT ACT
OFFERED BY MY GOOD FRIEND AND
COLLEAGUE, THE CO-CHAIR OF THE
CYBERSECURITY CAUCUS, MR.
MCCAUL.
THE GENTLEMAN AND I HAVE BEEN AT
THIS ISSUE FOR SEVERAL YEARS
NOW, WHEN WE FIRST BEGAN THE
EFFORT BACK IN 2006 OR 2007, I
THINK FOR THE MOST PART MOST
PEOPLE WE TALKED ABOUT
WHAT?
OH, HOW THINGS HAVE CHANGED.
I THINK WE CERTAINLY
COLLECTIVELY BETWEEN HE AND I
AND MANY OTHERS HAVE RAISED THE
AWARENESS OF THIS ISSUE AND
IMPORTANCE AND CHALLENGES WE
FACE IN SECURING OUR NATION IN
CYBERSPACE.
I'M DEEPLY GRATEFUL FOR HIS
IT IS IMPOSSIBLE TO OVERSTATE
THE IMPORTANCE OF A CYBERDOMAIN
TO OUR NATIONAL SECURITY
INFRASTRUCTURE AND OUR ECONOMIC
COMPETITIVENESS.
CLEARLY WE ALL RECOGNIZE HOW
MUCH WE USE THE INTERNOMINATE
EVERY DAY IN OUR DAILY LIVES,
WHETHER IT'S FOR OUR COMMERCE,
OUR COMMUNICATION, SOCIAL
NETWORKING, OR NATIONAL SECURITY
IT REALLY HAS BECOME PART OF OUR
DAILY LIVES.
BUT IN SECURING THE CYBERDOMAIN,
WE ALSO FACE IMMENSE CHALLENGES.
CYBERTHREATS ARE CLEARLY GROWING
MORE NUMEROUS, SOPHISTICATED,
AND SUCCESSFUL.
WE ALL KNOW OF SOMEONE WHO
PERHAPS HAS HAD THEIR BANK
STOLEN
OR THEIR IDENTITY STOLEN OR
THEIR CREDIT CARD NUMBER OR
SOCIAL SECURITY NUMBER STOLEN
BECAUSE OF A CYBERATTACK ON A
COMPANY OR GOVERNMENT
INSTITUTION.
WE ALSO HAVE HEARD NUMEROUS
ATTACKS, WE SEE THEM DAILY, ON
CYBERESPIONAGE.
THE GENTLEMAN DID -- FROM TEXAS
DID A GREAT JOB OF OUTLINING
SOME OF THE SPECIFIC CHALLENGES,
THE F-35 IS ONE CASE IN
PARTICULAR THAT COMES TO MIND.
BILLIONS OF DOLLARS IN R&D IS
STOLEN ON A DAILY OR WEEKLY
BASIS BY OUR ADVERSARIES.
OF COURSE WE HAVE HEARD AND
DOCUMENTED NUMEROUS ISSUES OF
CYBERATTACKS.
THANKFULLY NOTHING MAJOR YET IN
THIS COUNTRY.
AS THE DIRECTOR OF THE N.S.A.
HAS OUTLINED, THESE DAYS PERHAPS
ARE COMMON.
RENEED TO DO ALL WE CAN TO AVOID
THEM.
WELL-INTENTIONED TECHNOLOGY --
TECHNOLOGICAL CHANGES THAT
CREATE EFFICIENCIES THROUGH AUTO
MIIZATION CAN LEAVE US FOR
VULNERABLE TO CYBEREXPLOITATION.
CLEARLY THESE EFISHENSCIES --
EFFICIENCIES HAVE HELPED US TO
AS THE TEST FROM IDAHO NATIONAL
LABS, WHICH SEW SHOWED HOW
EASILY -- EASY IT WOULD BE TO
CONDUCT A SCARE ATTACK THAT
PENETRATED SYSTEMS THAT ARE
GOVERNMENT SAFETY SYSTEMS ON
PUMPS, VAL FLS -- VALVES, AND
GENERATORS COULD CAUSE THE
GENERATOR TO BLOW ITSELF UP.
THESE THINGS CAN HAPPEN AND WE
THEM.
MAKE SURE THAT DAY NEVER COMES.
OBVIOUSLY WE HAVE TO TAP INTO
OUR CREATIVE AND INNOVATIVE
SPIRIT TO ADDRESS TODAY'S
AGILE FACING TOMORROW'S THREATS.
I'M PLEASED THIS BILL HELPS US
TO MAKE THIS NEED A REALITY BY
STRENGTHENING THE COORDINATION
AND COOPERATION AMONG THE
VARIOUS RESEARCH AND DEVELOPMENT
GOVERNMENT.
THE FRUITS OF THAT RESEARCH WILL
BE CRITICAL TO OUR NATION'S
FUTURE DEFENSE AND CYBERDOMAIN.
ADDITIONALLY I'M PLEASED TO
HIGHLIGHT THIS BILL ENHANCES
PROGRAMS THAT INCREASES SIZE AND
SKILLS OF OUR NATION'S
CYBERSECURITY WORK FORCE.
WE HAVE A CRITICAL SHORTAGE OF
QUALIFIED CYBEREXPERTS AND WE
NEED TO ADDRESS THAT NEED.
THE DIRECTOR OF THE C.I.A.
CLANDESTINE INFORMATION
TECHNOLOGY OFFICE ESTIMATES THAT
WE ONLY HAVE ABOUT 1,000 PEOPLE
THAT CAN OPERATE IN THE COUNTRY
AT WORLD CLASS LEVELS IN
CYBERSPACE.
WHAT HE SAYS IS WE NEED SOMEONE
BETWEEN 20 AND 30,000 PEOPLE.
WE ALL HEARD ABOUT THE SKILLS
GAP WE FACE IN THIS COUNTRY.
WE ARE TAKING HIGH TECH
COMPANIES HAVING A REAL
DIFFICULT TIME FINDING QUALIFIED
WORKERS TO FILL THOSE JOBS OF
THE 21ST CENTURY.
WE NEED TO DO BETTER IN CLOSING
OUR SKILLS GAP.
TO THIS END LAST YEAR THE
NATIONAL DEFENSE AUTHORIZATION
ACT COMMISSIONED A STUDY THAT
THE PENTAGON HAD TO CONDUCT TO
DETERMINE ITS CYBERWORK FORCE
NEEDS, AND GIVE THEM A
SITUATIONAL AWARENESS ABOUT WHO
THEY HAVE WITH THOSE
CAPABILITIES AND WHAT THOSE
NEEDS WILL BE NOW AND IN THE
FUTURE.
THERE'S BEEN A SUCCESSFUL STUDY,
THE PENTAGON IS PUTTING THAT
PLAN AND INFORMATION INTO ACTION
TO CLOSE THAT GAP.
AT THE HIGH SCHOOL LEVEL IN
RHODE ISLAND AND SEVERAL OTHER
STATES WE HAVE WORKED WITH THE
STANDARDS INSTITUTE TO CREATE A
CYBERCHALLENGE.
WE NEED TO FOCUS ON OUR YOUNG
POTENTIAL CAREER IN
CYBERSECURITY.
AND THAT PROGRAM HAS BEEN
INCREDIBLY SUCCESSFUL.
IN CLOSING THAT GAP AND
DEVELOPING CYBERWORK FORCE, THIS
LEGISLATION IS AN IMPORTANT STEP
I WANT TO THANK THE GENTLEMAN
FROM TEXAS FOR HIS LEADERSHIP ON
THIS ISSUE AND I'M PLEASED TO
SUPPORT THIS BIPARTISAN
TIME.
THE
GENTLEMAN'S TIME HAS EXPIRED.
THE GENTLEMAN FROM TEXAS.
THANK YOU, MR.
SPEAKER.
LET ME POINT OF PERSONAL
PRIVILEGE GIVE ME THANKS TO THE
GENTLEMAN FROM RHODE ISLAND, MR.
LANGEVIN, MY GOOD FRIEND,
COLLEAGUE, CO-CHAIR OF THE
CYBERSECURITY CAUCUS.
THROUGH YOUR VISION, YOUR
LEADERSHIP ON THIS VERY, VERY
IMPORTANT ISSUE AS YOU AND I
KNOW, WE WERE INTO THIS ISSUE OF
CYBERSECURITY SIX YEARS AGO
BEFORE IT WAS REALLY COOL TO BE
INTO CYBERSECURITY.
THANK YOU SO MUCH FOR YOUR
LEADERSHIP.
WITH THAT, MR. SPEAKER, I YIELD
TO THE GENTLEMAN FROM TEXAS, MY
GOOD FRIEND AND COLLEAGUE AND
ALSO THE CHAIRMAN OF THE
SPEAKER'S CYBERSECURITY CAUCUS,
MR. THORNBERRY, FOR TWO MINUTES.
THE
GENTLEMAN FROM TEXAS IS
RECOGNIZED FOR TWO MINUTES.
I THANK THE
GENTLEMAN FOR YIELDING.
I APPRECIATE THE CHAIRMAN OF THE
SCIENCE COMMITTEE, MR. HALL, AND
THE RANKING MEMBER, MS. JOHNSON,
FOR BRINGING THIS BILL AND THE
NEXT BILL TO THE FLOOR.
THIS WILL MEAN THE HOUSE WILL
HAVE PASSED FOUR BILLS THIS WEEK
RELATED TO CYBERSECURITY, TAKING
IMPORTANT STEPS IN THE RIGHT
DIRECTION.
I PARTICULARLY APPRECIATE THE
WORK OF THE GENTLEMAN FROM
TEXAS, MR. MCCAUL, MR. LIPINSKI,
FOR BRINGING THIS BILL TO THE
FLOOR.
AS THEY HAVE SAID THEY HAVE BEEN
WORKING ON IT FOR A WHILE, AND I
APPRECIATE THEIR PERSISTENCE AND
ALSO THE SUBSTANCE OF THE BILL.
OF COURSE THE GENTLEMAN FROM
TEXAS, MR. MCCAUL, AS YOU HAVE
HEARD HAS BEEN WORKING IN THIS
AREA FOR A NUMBER OF YEARS AND
THE STUDY THAT HE CO-CHAIRED
WITH MR. LANGEVIN WITH REMAINS
ONE OF THE LEADING STUDIES IN
THIS FIELD.
MR. SPEAKER, THIS BILL IS
YOU HAVE HEARD ABOUT THE
EDUCATION AND AWARENESS.
IT ALSO HELPS MAKE SURE THAT THE
RESEARCH AND DEVELOPMENT IS
COORDINATED SO THAT WE DON'T
DUPLICATE WITHIN THE FEDERAL
GOVERNMENT BUT ALSO THAT IT IS
COMPLEMENTARY TO WHAT THE
PRIVATE SECTOR IS DOING BECAUSE
I THINK IT'S IMPORTANT TO FAMILY
SIZE THAT THE ANSWER TO
CYBERSECURITY IS NOT A
GOVERNMENT PROGRAM, IT IS OUR
PEOPLE AND INNOVATION.
THAT IS REALLY THE KEY.
AND SO OTHERS MAY STEAL
INFORMATION FROM US.
THEY MAY EVEN COPY SOME OF THE
THINGS THEY STEAL, BUT WHAT THEY
CAN'T DO IS PRODUCE THE SORT OF
INNOVATION AND NEW APPROACHES
THAT ARE ABSOLUTELY ESSENTIAL TO
OUR FUTURE.
THAT'S WHY -- THAT'S PART OF THE
REASON THIS BILL IS IMPORTANT.
IT'S PART OF THE REASON WE HAVE
TO BE CAREFUL ABOUT NEW
REGULATIONS AND OTHER THINGS
THAT SOME PEOPLE WANT TO DO
BECAUSE NURTURING THE INNOVATION
THAT COMES FROM THIS COUNTRY AT
THE PRIVATE SECTOR AND
GOVERNMENT, IS ABSOLUTELY
ESSENTIAL TO OUR FUTURE.
SO SO I APPRECIATE ALL OF THE
WORK THE GENTLEMAN FROM TEXAS
AND OTHERS HAVE DONE NOT ONLY
THIS BILL BUT THE LARGER SCHEME
OF THINGS AS IT CUTS ACROSS A
IT TAKES OUR COUNTRY A FEW STEPS
IN THE RIGHT DIRECTION, BUT IT'S
IMPORTANT THAT WE TAKE THOSE
STEPS AND -- FOR OUR FUTURE
SECURITY.
THE
GENTLEMAN'S TIME HAS EXPIRED.
FROM ILLINOIS.
MR. SPEAKER, I
YIELD AS MUCH TIME AS SHE MAY
CONSUME TO THE GENTLELADY FROM
TEXAS, THE RANKING MEMBER OF THE
COMMITTEE, MS. JOHNSON.
GENTLELADY FROM TEXAS IS
RECOGNIZED FOR SUCH TIME AS SHE
MAY CONSUME.
THANK YOU VERY
MUCH.
LET ME EXPRESS MY APPRECIATION
TO THE LEADERS ON THIS BILL.
THIS IS A GOOD BIPARTISAN BILL
AND IT IS NEARLY IDENTICAL TO
THE LEGISLATION THAT PASSED THE
HOUSE BY AN OVERWHELMING
MAJORITY LAST CONGRESS.
AND I'D LIKE TO CERTAINLY CITE
MR. LIPINSKI AND MR. MCCAUL FOR
THEIR LEADERSHIP AND WORK ON
THIS BILL.
THE INTERNET AND OUR ACCESS TO
THE INTERNET THROUGH COMPUTERS,
TABLETS, SMART PHONES, ETC. HAS
GREATLY INCREASED OUR
PRODUCTIVITY AND OUR
CONNECTIVITY.
UNFORTUNATELY THIS CONNECTIVITY
AND DEPENDENCE ON OUR
INFRASTRUCTURE, OUR COMMERCE,
AND GREAT DEAL OF OUR DAY-TO-DAY
LIVES ON INFORMATION TECHNOLOGY
HAS INCREASED OUR VULNERABILITY
TO CYBERATTACK.
FOR EXAMPLE, YOU MAY RECALL LAST
YEAR THE NETWORKS OF 48
COMPANIES WERE PENETRATED FOR AT
LEAST SIX MONTHS BY A HACKER AND
WHO WAS LOOKING FOR INTELLECTUAL
PROPERTY TO STEAL.
AND IT WAS REPORTED THAT THE
PERSONAL INFORMATION OF NEARLY
80 MILLION VIDEO GAME USERS WAS
COMPROMISED.
SO WE NEED TO DO WHAT WE CAN TO
HELP ENSURE THAT THESE SORTS OF
INTRUSIONS ARE MINIMIZED.
TO DO THIS WE NEED TO BUILD A
STRONG PARTNERSHIP BETWEEN US
ALLOWING AGENCIES, BUSINESSES,
NONGOVERNMENTAL ORGANIZATIONS,
AND EDUCATIONAL INSTITUTIONS.
SO I'M PLEASED THAT H.R. 2096
STRENGTHENS THE PUBLIC-PRIVATE
PARTNERSHIPS, GUARANTEES THE
COMPREHENSIVE SEVERAL
CYBERSECURITY PORTFOLIO, TRAINS
THE NEXT GENERATION OF
CYBERSECURITY PROFESSIONALS, AND
ENSURES THE DEVELOPMENT OF
CYBERSECURITY TECHNICAL
STANDARDS.
THESE ACTIVITIES ARE ESSENTIAL
TO OUR EFFORTS TO ADVANCE THE
SECURITY OF OUR CURRENT
INFORMATION AND COMMUNICATION
SYSTEMS AND TO BUILD FUTURE
SYSTEMS THAT ARE MORE SECURITY
FROM THE OUTSET.
I WOULD ASK AT THIS TIME, MR.
SPEAKER, THAT THE REMAINDER OF
MY STATEMENT BE PLACED IN THE
RECORD AND SIMPLY CLOSE BY
SAYING THANK YOU, MR. MCCAUL AND
MR. LIPINSKI.
GENTLELADY YIELDS BACK.
THE GENTLEMAN FROM TEXAS.
MR. SPEAKER, DOES
THE GENTLEMAN FROM ILLINOIS HAVE
ANY ADDITIONAL SPEAKERS?
JUST MYSELF TO
CLOSE.
I'M READY.
I WILL CLOSE AS
WELL.
I YIELD TO YOU FOR YOUR CLOSING.
THE
GENTLEMAN FROM TEXAS RESERVES.
THE GENTLEMAN FROM ILLINOIS IS
MR. SPEAKER, I
WANT TO THANK MR. LANGEVIN, THE
OTHER CO-CHAIR OF THE
CYBERSECURITY CAUCUS, FOR ALL
HIS WORK.
THANK RANKING MEMBER JOHNTON --
JOHNSON FOR HER WORK, CHAIRMAN
HALL, ESPECIALLY MR. MCCAUL FOR
WE STARTED THIS LAST CONGRESS,
HOPEFULLY WE'LL GET IT FINISHED
IN THIS CONGRESS.
WE KNOW THAT CYBERTHREATS ARE
EVERYWHERE FROM CYBERARMY
THREATENING OUR NATION TO
CYBERCRIME THAT THREATENS THE
FINANCIAL SECURITY OF ALL
AMERICANS.
THIS BILL ADDRESSES THREE KEY
PIECES OF PROTECTING OUR NATION.
IMPROVING EDUCATION, R&D, AND
DEVELOPMENT OF STANDARDS.
ALL OF THESE ARE KEY PIECES.
WE HAVE TO CONTINUE TO DEVELOP
AS THE THREATS DEVELOP.
THAT.
SO I WANT TO URGE MY COLLEAGUES
TO VOTE FOR THIS BILL.
TIME.
THE
GENTLEMAN FROM ILLINOIS YIELDS
BACK.
THE GENTLEMAN FROM TEXAS.
FIRST --
THE
MUCH TIME AS HE MAY CONSUME.
I WANT TO THANK MR.
LIPINSKI FOR HIS GREAT
LEADERSHIP.
WE'VE BEEN PUSHING THIS BILL,
THE SECOND CONGRESS WE'VE
PUSHED THIS.
I HOPE THIS GOES TO THE SENATE
AND GETS SIGNED INTO LAW.
BUT YOU'VE BEEN A REAL LEADER
ON CYBERSECURITY.
IT'S BEEN AN HONOR TO SERVE
WITH YOU ON THE SCIENCE AND
TECHNOLOGY COMMITTEE TOGETHER,
AND JUST LET ME AGAIN THANK YOU
FOR ALL YOUR GREAT EFFORTS.
AT A TIME WITH INTENSE
PARTISANSHIP WHERE THERE'S SO
MUCH ACURA MOANY ON BOTH -- SO
MUCH ACK ROW MOANY ON --
ACRAMONY ON BOTH SIDES, WE CAN
COME TOGETHER AND DO SOMETHING
THAT'S RIGHT.
CYBERSECURITY IS IN THE BEST
INTEREST OF THE NATION.
DEFENDING THE UNITED STATES IS
A FUNDAMENTAL ELEMENT UNDER THE
CONSTITUTION, AND SO FOR ME
PERSONALLY TO SEE US COME
TOGETHER LIKE WE HAVE TODAY IS,
AGAIN, A VERY REFRESHING THING.
YOU KNOW, MY FATHER FLEW IN A
MISSIONS.
HE WAS A BOMBADDER.
AT THE TIME THE STATE OF
WARFARE WAS VERY KINETIC.
THEY HAD -- WE ARE FACED WITH A
NEW THREAT.
THERE ARE NOT BOMBS OF HIS ERA,
OF HIS DAY, BUT RATHER DIGITAL
BOMBS.
TIME.
THEY HAVE DROPPED ON THIS
GOVERNMENT, ON THE FEDERAL
GOVERNMENT, IN OUR PRIVATE
SECTOR.
BOMBS THAT HAVE STROLLEN $1
TRILLION OF INTELLECTUAL
PROPERTY, BOMBS THAT HAVE
COMMITTEDIES PEENAGE AND STOLEN
OUR -- COMMITTED ESPIONAGE AND
STOLEN OUR MILITARY SECRETS,
AND BOMBS THAT COULD BE
CONDUCTED IN A CYBERWARFARE
ATTACK.
I THINK THE THING THAT KEEPS ME
MOST AT NIGHT IS CYBERWARFARE
BECAUSE WE KNOW WHAT OUR
OFFENSIVE CAPABILITY IS.
WE KNOW WHAT WE CAN DO AND
CONDUCT AS A NATION AGAINST
ANOTHER NATION.
THAT TECHNOLOGY IN THE WRONG
HANDS LIKE A COUNTRY LIKE IRAN
COULD CAUSE GREAT DEVASTATION
AGAINST THE INTEREST OF THE
UNITED STATES, BRINGING DOWN
POWER GRIDS, BRING DOWN
FINANCIAL INSTITUTIONS.
EVERY CRITICAL INFRASTRUCTURE
TIED TO THE INTERNET IS
VULNERABLE TO THIS TYPE OF
ATTACK.
SO I BELIEVE THAT THIS
LEGISLATION WILL PROTECT THIS
NATION IN SUCH -- FROM SUCH
ATTACKS.
YOU KNOW, WE ALL CAME UP HERE
TO SERVE NOT FOR EGO, NOT FOR
TITLE, BUT AT THE END OF THE
DAY TO MAKE A DIFFERENCE, TO
MAKE A FUNDAMENTAL DIFFERENCE
IN THE LIVES OF AMERICANS.
SO I BELIEVE A MOMENT LIKE THIS
IS A GREAT MOMENT THAT WE CAN
REFLECT BACK LATER IN OUR LIVES
DIFFERENCE.
THIS BILL PROTECTS AMERICANS
AND FUTURE GENERATIONS, AND SO
WITH THAT, LET ME THANK ALL
THOSE WHO HAVE BEEN INVOLVED IN
THIS CRITICAL LEGISLATION AND
PARTICULARLY MR. LIPINSKI, FOR
YOUR PATRIOTISM TO THIS COUNTRY
AND WHAT YOU'VE DONE GETTING
FORWARD.
AND WITH THAT, MR. SPEAKER, I
YIELD BACK THE BALANCE OF MY
GENTLEMAN YIELDS BACK.
ALL TIME HAS BEEN YIELDED BACK.
THE QUESTION IS WILL THE HOUSE
SUSPEND THE RULES AND PASS H.R.
2096.
ALL THOSE IN FAVOR SAY AYE.
ALL THOSE OPPOSED SAY NO.
THE QUESTION IS WILL THE HOUSE
SUSPEND THE RULES AND PASS H.R.
2096, AS AMENDED.
ALL THOSE IN FAVOR SAY AYE.
ALL THOSE OPPOSED SAY NO.
IN THE OPINION OF THE CHAIR,
2/3 HAVING RESPONDED IN THE
AFFIRMATIVE, THE RULES ARE
SUSPENDED, THE BILL IS PASSED.
MR. SPEAKER.
GENTLEMAN FROM TEXAS.
I REQUEST THE YEAS
AND NAYS.
THE
YEAS AND NAYS ARE REQUESTED.
ALL THOSE IN FAVOR OF TAKING
THIS VOTE BY THE YEAS AND NAYS
WILL RISE AND REMAIN STANDING
UNTIL COUNTED.
A SUFFICIENT NUMBER HAVING
ARISEN, THE YEAS AND NAYS ARE
ORDERED.
PURSUANT TO CLAUSE 8 OF RULE
20, FURTHER PROCEEDINGS ON THIS
QUESTION WILL BE POSTPONED.
FOR WHAT PURPOSE DOES THE
RECOGNITION?
MR. SPEAKER, I MOVE
TO SUSPEND THE RULES AND PASS
THE BILL H.R. 3834, ADVANCING
AMERICA'S NETWORKING AND
INFORMATION TECHNOLOGY RESEARCH
AND DEVELOPMENT ACT OF 2012, AS
AMENDED.
THE
THE BILL.
UNION CALENDAR
NUMBER 289, H.R. 3834, A BILL
TO AMEND THE HIGH-PERFORMANCE
COMPUTING ACT OF 1991 TO
AUTHORIZE ACTIVITIES FOR
SUPPORT OF NETWORKING AND
RESEARCH, AND FOR OTHER
PURPOSES.
PURSUANT TO THE RULE, THE
GENTLEMAN FROM TEXAS, MR. HALL,
AND THE GENTLEWOMAN FROM TEXAS,
MS. JOHNSON, WILL EACH CONTROL
20 MINUTES.
THE CHAIR RECOGNIZES THE
GENTLEMAN FROM TEXAS.
MR. SPEAKER, I ASK
UNANIMOUS CONSENT THAT ALL
MEMBERS MAY HAVE FIVE
LEGISLATIVE DAYS TO REVISE AND
EXTEND THEIR REMARKS AND TO
INCLUDE EXTRANEOUS MATERIAL ON
H.R. 3834, AS AMENDED, THE BILL
NOW UNDER CONSIDERATION.
WITHOUT OBJECTION, SO ORDERED.
MR. SPEAKER, I YIELD
MYSELF SUCH TIME AS I MAY
CONSUME.
THE
GENTLEMAN FROM TEXAS IS
RECOGNIZED FOR SUCH TIME AS HE
MAY CONSUME.
AS SPONSOR OF H.R.
3834, THE ADVANCING AMERICA'S
NETWORKING AND INFORMATION
TECHNOLOGY RESEARCH AND
DEVELOPMENT ACT OF 2012, I RISE
TODAY IN STRONG SUPPORT OF THIS
LEGISLATION.
BEFORE I DIVE INTO THE DETAILS
OF THE BILL, I WANT TO THANK
SERIOUS CYBERSECURITY
CHALLENGES.
THIS TASK FORCE, LED BY
REPRESENTATIVE MAC THORNBERRY,
SET THE DIRECTION FOR ALL THE
WEEK.
THE SCIENCE COMMITTEE STARTED
OUR CYBERSECURITY WORK EARLY IN
CONGRESS, SO I WAS VERY PLEASED
TO SEE THE TASK FORCE EMBRACE
BOTH MR. MCCAUL'S BILL, H.R.
2096, AND H.R. 3834 AS
NECESSARY STEPS TO IMPROVE THE
U.S. CYBERSECURITY.
I'D LIKE TO ALSO THANK MY TEXAS
COLLEAGUE, RANKING MEMBER
JOHNSON, MY NEIGHBOR, FOR
JOINING ME IN CO-SPONSORING
PROGRAM.
THE PROGRAM IS AN IMPORTANT
COMPONENT OF OUR NATION'S
CYBERSECURITY EFFORTS AND IT IS
CRITICAL TO OUR OVERALL
NETWORKING AND INFORMATION
TECHNOLOGY RESEARCH AND
DEVELOPMENT IN GENERAL.
IT'S A PRODUCT OF THE HIGH
PERFORMANCE COMPUTING ACT OF
AND COORDINATES THE
GOVERNMENT'S R&D INVESTMENT IN
UNCLASSIFIED NETWORKING
COMPUTING SOFTWARE,
CYBERSECURITY AND RELATED
INFORMATION TECHNOLOGIES.
THE BILL BEFORE US TODAY
UPDATES THE UNDERLYING
HIGH-PERFORMANCE COMPUTING
STATUTE THAT'S BEEN IN PLACE
FOR 20 YEARS AND CODIFIES THE
WORK NATIONAL COORDINATION
OFFICE ALREADY UNDERTAKES.
SPECIFICALLY H.R. 3834 IMPROVES
PROGRAM STATISTIC PLANNING AND
COORDINATION AND REBALANCES R&D
PORTFOLIOS TO FOCUS LESS ON
SHORT-TERM GOALS AND MORE ON
LONG-SCALE, LONG-TERM
INTERDISCIPLINARY RESEARCH.
IT UPDATES RESEARCH TO REFLECT
NEWER TECHNOLOGIES LIKE, QUOTE,
BIG DATA, UNQUOTE AND
CYBERPHYSICAL SYSTEMS.
ALSO CONVENES AN INTERAGENCY
WORKING GROUP TO IDENTIFY GAPS
IN CLOUD COMPUTING RESEARCH AND
EXAMINES AND THE POTENTIAL FOR
USING THE CLOUD FOR FEDERALLY
AND CODIFIES
AND EMPHASIZES THE ROLE OF THE
NATIONAL COORDINATION OFFICE.
NETWORKING AND INFORMATION
TECHNOLOGY INCLUDES A BROAD
RANGE OF TECHNOLOGIES FROM
SMARTPHONES TO CLOUD COMPUTING.
THESE INNOVATIONS STEMS FROM
MANY DISCIPLINES AND LED
ADVANCE TO SEARCH AND RESCUE
ROBOTS, UNMANNED AERIAL
VEHICLES, NEAR REAL-TIME
WEATHER FORECASTING.
THESE TYPES -- DEVICES FOR
ASSISTED LIVING AND
COMPUTER-BASED EDUCATION AND
TRAINING, R&D IN THIS FIELD
SEEKS TO MINIMIZE AND PREVENT
DISRUPTIONS TO CRITICAL
INFRASTRUCTURE LIKE POWER GRIDS
AND EMERGENCY COMMUNICATION
SYSTEMS.
THIS ESSENTIAL R&D IS PART OF
THE REASON THAT THE HOUSE
REPUBLICAN CYBERSECURITY TASK
FORCE IDENTIFIED THIS PROGRAM
AS IMPORTANT TO OUR NATION.
OTHER CYBERSECURITY AGENCIES IS
RESEARCH TO DETECT, PREVENT,
RESIST, RECOVER FROM ACTIONS
THAT COMPROMISE OUR THREATEN
THE AVAILABILITY, INGENUITY OR
SECURITY OF COMPUTER AND
NETWORK BASIC SYSTEMS.
CURRENTLY 15 FEDERAL AGENCIES
ARE CONTRIBUTING MEMBERS OF
THIS PROGRAM WITH AN ADDITIONAL
20 OR SO PARTICIPATING IN THE
PROGRAM.
COORDINATION INCREASES THE
OVERALL EFFECTIVENESS AND
PRODUCTIVITY OF OUR INFORMATION
TECHNOLOGY AND CYBERSECURITY
R&D, LEVERAGES OUR STRENGTH OF
VOICE DUPLICATION AND IMPROVES
PRODUCT.
MORE IMPORTANTLY, NETWORKING
AND INFORMATION TECHNOLOGY R&D
SUPPORTS AND BOOSTS U.S.
COMPETITIVENESS, ENHANCES
NATIONAL SECURITY AND HELPS
STRENGTHEN THE ECONOMY THROUGH
THE CREATION OF HIGH-LEVEL
JOBS.
H.R. 3834, THE HOUSE PASSED
TWICE IN THE LAST CONGRESS ONLY
TO SEE IT LANGUISH IN THE
SENATE.
I URGE PASSAGE OF THIS AND ONCE
SENATE WILL ACT
ACCORDINGLY.
AS WITH ALL THE CYBERSECURITY
BILLS BEFORE US TODAY, H.R.
3834 ENJOYS THE SUPPORT OF
NUMEROUS INDUSTRY SUPPORTERS
AND TECHNOLOGY STAKEHOLDERS.
I RESERVE THE BALANCE OF MY
TIME.
THE
GENTLEMAN FROM TEXAS RESERVES.
THE GENTLEWOMAN FROM TEXAS IS
THANK YOU VERY
MUCH, MR. SPEAKER.
MAY CONSUME.
THE
GENTLELADY IS RECOGNIZED FOR AS
MUCH TIME AS SHE MAY CONSUME.
I RISE IN SUPPORT
OF H.R. 3834, THE ADVANCING
AMERICA'S NETWORKING AND
INFORMATION TECHNOLOGY RESEARCH
AND DEVELOPMENT ACT OF 2012.
H.R. 3834 IS A GOOD BIPARTISAN
BILL WHICH I WAS PLEASED TO
JOIN CHAIRMAN HALL IN
INTRODUCING.
IT IS LARGELY BASED ON THE 2009
HOUSE-PASSED BILL WHICH WAS
THEN INTRODUCED BY THEN
CHAIRMAN GORDON AND RANKING
HALL, BUT THE CURRENT
BILL ALSO INCLUDES SOME UPDATES
FROM THE 2009 BILL THAT
APPROXIMATELY REFLECT --
APPROPRIATELY REFLECT CHANGES
TO THE NETWORK AND INFORMATION
TECHNOLOGY LANDSCAPE AS WELL AS
POLICY AND MANAGEMENT
RECOMMENDATIONS MADE BY AN
OUTSIDE PANEL OF EXPERTS
MITRD PROGRAM.
IT INVOLVES THE COLLABORATION
OF 15 FEDERAL RESEARCH AND
DEVELOPMENT AGENCIES EACH
EXPERTISE.
TO ENSURE THAT WE MAKE THE MOST
EFFECTIVE USE OF OUR FEDERAL
R&D RESOURCES AND REMAIN A
LEADER IN THESE FIELDS, H.R.
3834 REQUIRES THAT ALL 15
AGENCIES COME TOGETHER TO
DEVELOP AND PERIODICALLY UPDATE
R&D.
H.R. 3834 CALLS FOR INCREASED
SUPPORT FOR LARGE-SCALE,
LONG-TERM INTERDISCIPLINARY
RESEARCH AND N.I.T. THAT WILL
HELP US TACKLE CHALLENGES, SUCH
AS IMPROVING THE EFFECTIVENESS
AND EFFICIENCY OF OUR HEALTH
CARE AND ENERGY DELIVERY
SYSTEM.
THE BILL ALSO PROMOTES
PARTNERSHIPS BETWEEN THE
FEDERAL GOVERNMENT ACADEMIA AND
INDUSTRY TO FOSTER TECHNOLOGY
TRANSFER.
IN PARTICULAR, I'D LIKE TO
HIGHLIGHT THIS BILL'S ROLE IN
ENSURING THAT THE EDUCATION OF
FUTURE N.I.T. WORK FORCE IS A
MAJOR COMPONENT OF THE PROGRAM.
I'M HEARING EVERY DAY FROM
SMALL AND LARGE COMPANIES ALIKE
THAT THE DEMAND FOR SKILLED
AMERICAN I.T. PROFESSIONALS IS
HIGHER THAN THE SUPPLY.
WE HEAR THE SAME MESSAGE FROM
UNIVERSITY FACULTY WHO TELL US
THAT COMPUTER SCIENCE GRADUATES
ARE SNATCHED UP THE MOMENT THEY
GRADUATE.
EVEN WHILE WE ARE IN THE MIDST
OF A RECESSION.
THIS GAP BETWEEN SUPPLY AND
DEMAND EXISTS DESPITE THE FACT
THAT THESE JOBS ARE AMONG THE
HIGHEST PAYING AND THE MOST
STABLE JOBS OUT THERE.
IT IS IMPERATIVE THAT WE
ENCOURAGE MORE YOUNG AMERICANS
TO PURSUE STUDIES IN I.T.
FIELDS.
IN FACT BECAUSE OF THE STARK
GENDER AND RACIAL GAPS WE SEE
IN COMPUTER SCIENCE PROGRAMS,
IT IS IMPERATIVE THAT WE
ENCOURAGE MORE YOUNG WOMEN AND
STUDENTS OF COLOR TO ENTER
THESE FIELDS.
WE SIMPLY CANNOT AFFORD TO
IGNORE MORE THAN 50% OF OUR
NATION'S BRAINPOWER.
H.R. 3834 DOESN'T GO QUITE AS
FARTHER AS I'D LIKE FOR IT TO
GO IN ADDRESSING THESE
EDUCATION CHALLENGES, BUT IT
STILL SENDS AN IMPORTANT
MESSAGE ABOUT THE NEED TO
EDUCATE MORE OF OUR STUDENTS IN
N.I.T. FIELDS AND PROVIDES THE
NATIONAL AUTHORITY FOR THE
AGENCIES TO PLAY AN APPROPRIATE
ROLE HERE.
FINALLY, SINCE THIS IS
CYBERWEEK, I'D LIKE -- I WOULD
BE REMISS NOT TO MENTION THAT
THESE PROGRAMS SERVE AS A
COORDINATING AND PLANNING
UMBRELLA FOR ALL UNCLASSIFIED
FEDERAL CYBERSECURITY R&D.
OUR COMMITTEE ADDRESSED
SPECIFIC NEEDS IN CYBERSECURITY
R&D IN A SEPARATE BILL BEING
CONSIDERED -- JUST CONSIDERED
TODAY, BUT IN DOING SO WE MADE
SURE THAT BOTH THE INTELLECTUAL
AND FINANCIAL RESOURCES FOR
CYBERSECURITY R&D ARE
APPROPRIATELY INTEGRATED INTO
THE REST OF THE N.I.T.
PORTFOLIO.
IT BUILDS ON ALL NETWORK AND
INFORMATION TECHNOLOGIES.
IN CLOSING, N.I.T. TECHNOLOGY
GIS CUT ACROSS EVERY SECTOR OF
OUR ECONOMY AND NATIONAL DEFENSE
INFRASTRUCTURE.
OUR RELATIVELY MODEST 20-YEAR
HAS CONTRIBUTED
IMMEASURABLY TO OUR ECONOMIC AND
NATIONAL SECURITY BY ENABLING
INNOVATION AND JOB CREATION IN
I.T. AND PROVIDING AMERICAN
STUDENTS WITH THE SKILLS WHO
FULFILL THESE JOBS.
LET'S THORS THIS PROGRAM TODAY
AND ENSURE -- AUTHORIZE THIS
REMAINS STRONG.
I WANT TO THANK MY FRIEND,
CHAIRMAN HALL, AND HIS STAFF,
ESPECIALLY ANNETTE FOR WORKING
SO COLLABORATIVELY AND OPENLY
WITH US ON THIS GOOD BIPARTISAN
I'D ALSO LIKE TO THANK MY STAFF
AND IN PARTICULAR DAHLIA FOR
THEIR HARD WORK ON THE BILL.
I URGE MY COLLEAGUES TO SUPPORT
3834.
I RESERVE THE BALANCE OF MY
TIME.
THE
GENTLELADY RESERVES.
THE GENTLEMAN FROM TEXAS.
MR. SPEAKER, I YIELD
THE GENTLELADY FROM ILLINOIS,