[Congressional Record Volume 159, Number 53 (Thursday, April 18, 2013)]
[House]
[Pages H2130-H2139]




             CYBER INTELLIGENCE SHARING AND PROTECTION ACT

  Mr. SESSIONS. Mr. Speaker, I ask unanimous consent that during 
further consideration of H.R. 624 in the Committee of the Whole, 
pursuant to House Resolution 164, the last amendment in House Report 
113-41 be modified in the form that I have placed at the desk.
  The SPEAKER pro tempore. The Clerk will report the modification.
  The Clerk read as follows:

       Page 12, after line 18, insert the following:
       Page 4, line 18, strike ``Federal Government'' and insert 
     ``entities of the Department of Homeland Security and the 
     Department of Justice designated under paragraphs (1) and (2) 
     of section 2(b) of the Cyber Intelligence Sharing and 
     Protection Act''.
       Page 5, line 5, strike ``Federal Government'' and insert 
     ``entities of the Department of Homeland Security and the 
     Department of Justice designated under paragraphs (1) and (2) 
     of section 2(b) of the Cyber Intelligence Sharing and 
     Protection Act''.

  The SPEAKER pro tempore. Is there objection to the request of the 
gentleman from Texas?
  There was no objection.


                             General Leave

  Mr. ROGERS of Michigan. Mr. Speaker, I ask unanimous consent that all 
Members have 5 legislative days to revise and extend their remarks and 
add extraneous material on the bill, H.R. 624.
  The SPEAKER pro tempore (Mr. Sessions). Is there objection to the 
request of the gentleman from Michigan?
  There was no objection.
  The SPEAKER pro tempore. Pursuant to House Resolution 164 and rule 
XVIII, the Chair declares the House in the Committee of the Whole House 
on the state of the Union for the further consideration of the bill, 
H.R. 624.
  Will the gentleman from California (Mr. Denham) kindly take the 
chair.

                              {time}  1023


                     In the Committee of the Whole

  Accordingly, the House resolved itself into the Committee of the 
Whole House on the state of the Union for the further consideration of 
the bill (H.R. 624) to provide for the sharing of certain cyber threat 
intelligence and cyber threat information between the intelligence 
community and cybersecurity entities, and for other purposes, with Mr. 
Denham (Acting Chair) in the chair.
  The Clerk read the title of the bill.
  The Acting CHAIR. When the Committee of the Whole rose on Wednesday, 
April 17, 2013, amendment No. 4 printed in House Report 113-41 offered 
by the gentleman from Rhode Island (Mr. Langevin) had been disposed of.


                 Amendment No. 7 Offered by Ms. Sinema

  The Acting CHAIR. It is now in order to consider amendment No. 7 
printed in House Report 113-41.
  Ms. SINEMA. Mr. Chairman, I have an amendment at the desk.
  The Acting CHAIR. The Clerk will designate the amendment.
  The text of the amendment is as follows:

       Page 17, line 17, insert ``Department of Homeland Security 
     and the Inspector General of the'' before ``Intelligence 
     Community''.

       Page 17, line 21, insert ``jointly and'' before 
     ``annually''.

       Page 17, line 22, strike ``congressional intelligence 
     committees'' and insert ``the Committee on Homeland Security 
     of the House of Representatives, the Committee on Homeland 
     Security and Governmental Affairs of the Senate, and the 
     congressional intelligence committees''.

  The Acting CHAIR. Pursuant to House Resolution 164, the gentlewoman 
from Arizona (Ms. Sinema) and a Member opposed each will control 5 
minutes.
  The Chair recognizes the gentlewoman from Arizona.
  Ms. SINEMA. Mr. Chairman, I yield myself such time as I may consume.
  My amendment is simple and straightforward. Currently, this bill, 
H.R. 624, requires the inspectors general of the intelligence 
community, Departments of Justice and Defense, as well as the Privacy 
and Civil Liberties Board to submit a report to Congress every year 
regarding the use of the information shared with the Federal 
Government. This amendment adds the inspector general of the Department 
of Homeland Security to the list of inspectors general that are 
required to submit the report.
  It also adds the House and Senate Committees on Homeland Security to 
the list of committees that will receive the report. Currently, only 
the House and Senate Intelligence Committee will receive the report. 
Having the Department of Homeland Security, a civilian department, 
included in this reporting requirement adds one more layer of 
accountability to this review and report.
  Allow me to briefly talk about the overall bill and why it has my 
support. I believe we need a 21st century solution for this 21st 
century problem. I've heard from businesses and constituents in Arizona 
who have firsthand knowledge of this issue. It's affecting both large 
corporations and small businesses alike. Our national security, our 
financial security, and our innovations are under very serious threat. 
This bill ensures that research and development, intellectual property, 
and software code is no longer being stolen by China, Iran, and Russia.
  Countries and cyber hackers steal trade secrets and they steal 
innovation and research, but they also steal American jobs. Americans 
are known for their ingenuity and hard work, but we are losing that 
hard work to hackers. One of the biggest cyber threats is to an 
American's personal information--information like bank accounts, health 
records, and Social Security numbers.
  This is very, very serious and a real threat to all Americans, and 
this threat is growing. Terrorist organizations have taken credit for 
taking down the online systems at Wells Fargo, JPMorgan Chase, and Bank 
of America. Three weeks ago, American Express also admitted that they 
were hacked.
  Cyber attacks are becoming more sophisticated. Instead of merely 
disrupting commerce and stealing information, the attacks are focused 
on destroying our Nation's digital systems, destroying our national 
security, our infrastructure and financial systems that Americans 
depend on every day. It is imperative that we partner with private 
companies to discover, and then prevent, more attacks such as these.
  I reserve the balance of my time.
  Mr. ROGERS of Michigan. Mr. Chairman, while I do not oppose the 
amendment, I ask unanimous consent to control the time in opposition.
  The Acting CHAIR. Without objection, the gentleman is recognized or 5 
minutes.
  There was no objection.
  Mr. ROGERS of Michigan. I yield myself such time as I may consume.
  Mr. Chair, I will support this amendment, and I want to thank the 
gentlelady from Arizona for her diligence and work in coming down to 
the briefings and getting well educated on the threat and familiarizing 
herself with the classified material. Thank you for your extra work on 
this issue, and thank you for being a strong voice in advocating our 
solution.
  This amendment is important. It adds the inspector general at the 
Department of Homeland Security to the list of entities responsible for 
creating an annual report reviewing the use of information shared with 
the Federal Government. The amendment also adds the congressional 
Homeland Security Committee to the recipients of the report. This adds 
one more layer of oversight to make sure our civil liberties and 
privacy are protected in the bill.

[[Page H2131]]

  I stand in support and appreciate all the efforts of the gentlelady 
from Arizona, and I reserve the balance of my time.
  Ms. SINEMA. Mr. Chair, how much time do I have remaining?
  The Acting CHAIR. The gentlewoman has 2\1/2\ minutes remaining.
  Ms. SINEMA. Mr. Chair, I yield 2 minutes to the gentleman from New 
York (Mr. Maffei).
  Mr. MAFFEI. I thank the gentlelady from Arizona for offering this 
amendment.
  Mr. Chair, I rise today to speak in support of the Cyber Intelligence 
Sharing and Protection Act. I opposed the PATRIOT Act because many of 
its elements I did feel violated civil liberties and allowed things 
like profiling and abusive wiretapping; and while I don't think this 
was an easy decision, I do feel that this is certainly a different 
case.
  Every day international agents, terrorists, and criminal 
organizations attack the public and private networks of the United 
States, as we speak. They disrupt services, attack newspapers and 
banks, infiltrate government agencies. They can steal intellectual 
property, and most alarmingly, they access private information of 
millions of citizens.

                              {time}  1030

  We've already seen state actors like the People's Republic of China 
pursue widespread data theft from American computer networks. 
Intelligence experts believe that rogue nations like Iran and even 
independent groups like WikiLeaks are pursuing very aggressive measures 
to hack into our Nation's power grid, our air traffic control systems, 
and individuals' personal financial records and other sorts of records 
across the country; and I do believe we should be very concerned. So 
while I do have some concern that the U.S. Government may access our 
private information in the cybersphere, I am more concerned that the 
Chinese Government will access our private information. This is a clear 
and present danger.
  This bill does have protections that strictly prohibit the Federal 
Government from using or retaining any information other than for cyber 
threat purposes. And it remains illegal, after this bill is passed, for 
a company to share its information, except for cybersecurity reasons. 
This amendment will help to further enforce that.
  We must recognize that cybersecurity threats are real and constantly 
changing. This bill is an important measure that allows private 
companies to share the cyber threat information with the Federal 
Government to help protect critical networks and infrastructure from 
attack.
  I support this bill. It is an important step in our United States 
security strategy to protect our country from emerging cyber threats at 
home and abroad. And I support this amendment.
  Mr. ROGERS of Michigan. Mr. Chairman, I yield such time as he might 
consume to the gentleman from Maryland (Mr. Ruppersberger).
  Mr. RUPPERSBERGER. I thank the chairman for yielding.
  First thing, to the Congresswoman from Arizona, I really appreciate 
all of your work on this bill. You came to Congress; you did your 
homework; you decided that it was important to protect our country; and 
you've done a lot of work. I just want to let you know that you've done 
a great job for your district and for America, generally, and I want to 
thank you for that.
  Basically, this amendment really allows the Committee on Homeland 
Security and the Inspector General to oversee and to do reporting. It's 
important that we have oversight. I know the chairman and I have worked 
hard to make sure that we deal with all of the privacy issues, and this 
is just another example of how we're going to protect our privacy. You 
cannot have security if you don't have privacy.
  Ms. SINEMA. Mr. Chairman, I just want to emphasize again that this 
amendment helps add another layer of accountability. It includes the 
Homeland Security Department as a civilian interface for Congress in 
both the Homeland Security Committee and the Intelligence Committee.
  I want to thank, in particular, the chair and the ranking member for 
their leadership on this issue over the course of several years. I know 
in my district it's important not just to consumers, but also to 
industry leaders who are leading the way forward on American 
innovation. I want to thank them for that.
  I encourage Members to support this amendment, and I yield back the 
balance of my time.
  Mr. ROGERS of Michigan. I yield back the balance of my time, Mr. 
Chairman.
  The Acting CHAIR. The question is on the amendment offered by the 
gentlewoman from Arizona (Ms. Sinema).
  The question was taken; and the Acting Chair announced that the ayes 
appeared to have it.
  Ms. SINEMA. Mr. Chairman, I demand a recorded vote.
  The Acting CHAIR. Pursuant to clause 6 of rule XVIII, further 
proceedings on the amendment offered by the gentlewoman from Arizona 
will be postponed.


    Amendment No. 8, as Modified, Offered by Ms. Loretta Sanchez of 
                               California

  The Acting CHAIR. It is now in order to consider amendment No. 8 
printed in House Report 113-41.
  Ms. LORETTA SANCHEZ of California. Mr. Chairman, I have an amendment 
at the desk.
  The Acting CHAIR. The Clerk will designate the amendment.
  The text of the amendment is as follows:

       Page 18, beginning on line 24, strike ``Director of 
     National Intelligence and'' and insert ``Director of National 
     Intelligence,''.
       Page 19, line 1, insert ``and the Privacy Officer and the 
     Officer for Civil Rights and Civil Liberties of the 
     Department of Homeland,'' after ``Justice,''.

  The Acting CHAIR. Pursuant to House Resolution 164, the gentlewoman 
from California (Ms. Loretta Sanchez) and a Member opposed each will 
control 5 minutes.
  The Chair recognizes the gentlewoman from California.
  Ms. LORETTA SANCHEZ of California. Mr. Chairman, I yield myself such 
time as I may consume.
  Mr. Chairman, the challenge of defending our Nation on a constantly 
expanding cyber front continues to grow. I believe that I'm one of 
those Members of the Congress that sits both on the House Armed 
Services Committee and on the Homeland Security Committee and I see it 
from both angles, both from the civilian side and the military side.
  I've constantly tried to improve how we address the need for the 
next-generation technology, public-private cooperation, and ensuring 
that we have the right personnel to counter this 21st-century cyber 
threat. However, I am uncompromising in safeguarding the rights of our 
citizens, and I will never sacrifice our civil liberties for unneeded 
intrusion.
  To this end, the amendment I am offering today would strengthen 
existing provisions in the bill to include the Privacy Officer and the 
Officer for Civil Rights and Civil Liberties of the Department of 
Homeland Security as key stakeholders in the report that would assess 
the impact activity caused by this legislation.
  This report would assess how this legislation affected our civil 
liberties and privacy throughout our Federal Government. The Department 
of Homeland Security is ``the'' key civil Department in our Federal 
Government that develops and implements cybersecurity protocols for the 
rest of the Federal Government. It's crucial that they be part of any 
civil liberty and privacy assessment.
  I have worked closely with both the Privacy Office and the Office of 
Civil Rights and Civil Liberties. The individuals in these offices are 
experts in their fields and they should have a say; they should be in 
the room as we take a look at this.
  Much work needs to be done, but I urge my colleagues to support my 
amendment to continue improving this bill.
  I reserve the balance of my time.
  Mr. ROGERS of Michigan. Mr. Chairman, while I do not oppose the 
amendment, I ask unanimous consent to control the time in opposition.
  The Acting CHAIR. Without objection, the gentleman is recognized for 
5 minutes.
  There was no objection.
  Mr. ROGERS of Michigan. Mr. Chairman, I will support this amendment; 
and I want to thank the gentlelady for her work and interest on this 
very,

[[Page H2132]]

very important issue and her taking the time to be involved in the 
process of making this a better bill and protecting privacy and civil 
liberties.
  What this bill does is add a Privacy Officer and Officer of Civil 
Rights and Civil Liberties of the Department of Homeland Security to 
the list of entities responsible for producing an annual report 
assessing the privacy and civil liberties impact of activities 
conducted by the Federal Government under this bill.
  Because the bill requires the Senior Privacy and Civil Liberties 
Officer of each department or agency receiving information under the 
bill to participate in the report, I will not oppose this effort to 
specifically include these officials from the Department of Homeland 
Security.
  I think this is, again, making more clarification, making our privacy 
and civil liberties protection that much more robust in the bill, and I 
want to thank the gentlelady for her efforts.
  With that, Mr. Chairman, I reserve the balance of my time.
  Ms. LORETTA SANCHEZ of California. Mr. Chairman, I thank the kind 
chairman for his remarks and his support.
  Mr. Chairman, I ask unanimous consent that the amendment be modified 
with the modification that is at the desk.
  The Acting CHAIR. The Clerk will report the modification.
  The Clerk read as follows:

       Insert ``Security'' after ``Homeland'' in the second 
     instruction.

  The Acting CHAIR. Is there objection to the request of the 
gentlewoman from California?
  There was no objection.
  The Acting CHAIR. The amendment is so modified.
  Ms. LORETTA SANCHEZ of California. Mr. Chairman, I yield 1 minute to 
my good friend, the gentleman from California (Mr. McNerney).
  Mr. McNERNEY. I thank my colleague from California, and I rise in 
support of Ms. Sanchez's amendment, but in opposition to the underlying 
bill, H.R. 624.
  This legislation has positive aspects, but I'm concerned with the 
civil protections not required in H.R. 624. Ms. Sanchez's amendment is 
a necessary step toward improving the bill by giving oversight 
authority to a civilian agency.
  Sharing information is absolutely essential; however, in exchange for 
the liabilities protections given to businesses that share cyber threat 
information with the government, it is our responsibility here in 
Congress to protect our constituents' private information. Businesses 
should be required to remove personally identifiable information before 
submitting data to Federal agencies.
  I thank Ms. Sanchez again for her efforts, as well as Mr. Rogers and 
Mr. Ruppersberger for their efforts as leaders of the Intelligence 
Committee.
  Mr. ROGERS of Michigan. I would thank the gentlelady again and yield 
back the balance of my time.
  Ms. LORETTA SANCHEZ of California. Mr. Chairman, I yield back the 
balance of my time.
  The Acting CHAIR. The question is on the amendment, as modified, 
offered by the gentlewoman from California (Ms. Loretta Sanchez).
  The amendment was agreed to.


                 Amendment No. 9 Offered by Mr. LaMalfa

  The Acting CHAIR. It is now in order to consider amendment No. 9 
printed in House Report 113-41.
  Mr. LaMALFA Mr. Chairman, I have an amendment at the desk made in 
order under the rule.
  The Acting CHAIR. The Clerk will designate the amendment.
  The text of the amendment is as follows:

       Page 22, after line 7 insert the following:
       ``(7) Limitation on surveillance.--Nothing in this section 
     shall be construed to authorize the Department of Defense or 
     the National Security Agency or any other element of the 
     intelligence community to target a United States person for 
     surveillance.

  The Acting CHAIR. Pursuant to House Resolution 164, the gentleman 
from California (Mr. LaMalfa) and a Member opposed each will control 5 
minutes.
  The Chair recognizes the gentleman from California.

                              {time}  1040

  Mr. LaMALFA. I yield myself such time as I may consume.
  Mr. Chair, I appreciate the opportunity to rise today and speak in 
favor of my amendment to the Cyber Intelligence Sharing and Protection 
Act. This is an example of the process working. A lot of folks have 
expressed concerns about the measure here, not only on the cyber 
intelligence side but as well the privacy and personal security side. I 
think this amendment and many others that we have seen today, and will 
see, are addressing that issue so we get the right balance between 
cybersecurity and individual liberties and freedoms, Fourth Amendment 
concerns.
  The threat we face today in the cyber realm is nothing short of a 
serious threat to our national security. Nation-states like China and 
Russia are targeting the American government and the American private 
sector alike for cyber espionage, and potentially for cyber attack.
  Chinese espionage targeting the American private sector to steal core 
research and development information--at the very heart of American 
innovations and jobs--represents an unprecedented threat to our very 
way of life.
  While strongly supporting this legislation, I am pleased to have 
worked with Chairman Rogers and Ranking Member Ruppersberger to further 
clarify that nothing in the legislation should be construed to be a 
surveillance program directed at American citizens.
  The amendment is very concise yet extremely important. Titled the 
``Limitation on Surveillance,'' it simply reads as follows:

       Nothing in this section shall be construed to authorize the 
     Department of Defense or the National Security Agency or any 
     other element of the intelligence community to target a 
     United States person for surveillance.

  As we act to protect the United States from cyber attack by foreign 
countries and terrorist groups, we must ensure that our constitutional 
rights and privacy are maintained. The term ``United States person'' 
includes U.S. citizens and legal residents or legal visitors to the 
country, limiting the surveillance powers of this bill to foreign 
nationals and those entering the Nation illegally.
  This amendment helps to strike the balance this measure strives for, 
granting our government the means to defend the Nation while, 
importantly, preventing any inappropriate use of these powers.
  Again, I am pleased to support legislation that creates no new 
regulatory regime and does not create additional Federal bureaucracy or 
require significant additional spending.
  I reserve the balance of my time.
  Mr. RUPPERSBERGER. Mr. Chair, I rise to claim time in opposition, 
even though I am not opposed to the amendment.
  The CHAIR. Without objection, the gentleman from Maryland is 
recognized for 5 minutes.
  There was no objection.
  Mr. RUPPERSBERGER. Mr. Chair, while we never believe that any 
surveillance of Americans was permitted under our bill, we are taking 
any and all precautions to make it entirely clear that no element of 
the intelligence community--which, of course, includes the Department 
of Defense and the National Security Agency--is authorized to target 
any United States person for surveillance. The chairman's amendment 
solidifies the privacy and civil liberties protections that we always 
have intended to have as part of the bill. No American activities or 
communications will be targeted--period. We cannot have security 
without privacy.

  Therefore, I urge a ``yes'' vote on this amendment, and I reserve the 
balance of my time.
  Mr. LaMALFA It is my pleasure to now yield 1 minute to the chairman 
of the Intel Committee, the gentleman from Michigan (Mr. Rogers).
  Mr. ROGERS of Michigan. Mr. Chair, I support this amendment, which 
makes very, very clear that nothing in this bill authorizes the 
government to target an American citizen for surveillance. It's 
incredibly important.
  Though the underlying bill would not allow the surveillance of an 
American citizen under CISPA, I will support this amendment as a 
further clarification that settles some Members' concerns and ensures 
the scope of the bill stays as narrow as we intended it to be.

[[Page H2133]]

  The amendment is an important myth buster about the intentions of 
CISPA. I commend Mr. LaMalfa for his leadership on this issue and urge 
strong support for the LaMalfa amendment.
  Mr. RUPPERSBERGER. I would like to yield to the gentleman from 
Virginia, the chairman of the Judiciary Committee, Congressman 
Goodlatte, as much time as he may consume. And I would also like to 
thank him personally for working closely with us on this bill to have a 
bill that will protect the citizens of the United States of America.
  Mr. GOODLATTE. I thank the gentleman from Maryland, the ranking 
member, for not only yielding me this time, but also for the great work 
that he has done, and also the great work that Chairman Rogers has 
done. They have worked together in a bipartisan fashion to accomplish 
something very, very important to accomplish in terms of fighting cyber 
terrorism, cyber crime, and making sure that we are safe in this 
country from cyber attacks to which we are very vulnerable today.
  I also want to thank the gentleman from California for his amendment. 
I support efforts to make it absolutely clear that this legislation 
does not in any way authorize the surveillance of American citizens.
  I also want to thank Chairman Rogers and Ranking Member Ruppersberger 
for working with me to enhance the liability provisions in the 
legislation, for working with me to address some jurisdictional issues 
in the bill that affected the Department of Justice and the House 
Judiciary Committee.
  I would also like to note that the President's statement in 
opposition to this bill insists on exposing our best technology 
providers to even more lawsuits when they are simply helping to defend 
our Nation against cyber attacks. The President's opposition statement 
expresses a deep distrust of private industry that America has rejected 
since its founding.
  The bill before us today instead welcomes the private sector and 
acknowledges that we need the best minds in the country to help protect 
our citizens from ever-evolving cyber attacks by the likes of China and 
Iran. And the work done by the chairman and the ranking member to 
improve the provision of this bill, working with my committee and my 
staff to make it clear that we have a definite definition of what 
constitutes good faith and what constitutes circumstances under which a 
business that does not act in good faith would be exposed to lawsuits 
and liability, is one that helps protect the privacy of American 
citizens, because those citizens will be assured they will know under 
what circumstances a business has exceeded its authority under the law 
and be protected and have a clear right to bring an action under those 
circumstances. And the businesses themselves will be protected because 
they will not share information if they know they are not acting in 
good faith, because they know what the definition of good faith is in 
the bill.
  So the gentleman from Michigan, the gentleman from Maryland, the 
chairman and ranking member, have done a great job with this 
legislation. I support their efforts and urge my colleagues to do the 
same.
  Mr. LaMALFA Mr. Chair, again, thank you to my colleagues. The ranking 
member from Maryland (Mr. Ruppersberger), I really appreciate your kind 
words and your strong support. To my colleague from Virginia, thank you 
for your kind words on the amendment as well. And to my colleague, Mr. 
Chairman, Mr. Rogers from Michigan, thank you for letting me offer this 
amendment here.
  It does strike the balance I think we need with cybersecurity. The 
great threat to many of our institutions in this Nation is something 
that we do have to act upon, but also finding that balance with 
personal privacy that is so key to the elements of the founding of our 
Nation. I'm proud to be able to carry this amendment. I ask for your 
support, Mr. Chairman, and I yield back the balance of my time.
  Mr. RUPPERSBERGER. I yield back the balance of my time.
  The Acting CHAIR. The question is on the amendment offered by the 
gentleman from California (Mr. LaMalfa).
  The question was taken; and the Acting Chair announced that the ayes 
appeared to have it.
  Mr. ROGERS of Michigan. Mr. Chair, I demand a recorded vote.
  The Acting CHAIR. Pursuant to clause 6 of rule XVIII, further 
proceedings on the amendment offered by the gentleman from California 
will be postponed.

                              {time}  1050


                Amendment No. 10 Offered by Mr. Paulsen

  The Acting CHAIR. It is now in order to consider amendment No. 10 
printed in House Report 113-41.
  Mr. PAULSEN. I offer an amendment, Mr. Chair.
  The Acting CHAIR. The Clerk will designate the amendment.
  The text of the amendment is as follows:

       At the end of the bill, add the following new section:

     SEC. 4. SENSE OF CONGRESS ON INTERNATIONAL COOPERATION.

       It is the sense of Congress that international cooperation 
     with regard to cybersecurity should be encouraged wherever 
     possible under this Act and the amendments made by this Act.

  The Acting CHAIR. Pursuant to House Resolution 164, the gentleman 
from Minnesota (Mr. Paulsen) and a Member opposed each will control 5 
minutes.
  The Chair recognizes the gentleman from Minnesota.
  Mr. PAULSEN. Mr. Chair, I yield myself such time as I may consume.
  Mr. Chair, last month at a Senate hearing outlining the threats 
facing our security, it was the Director of National Intelligence, 
James Clapper, who warned that the intelligence community is seeing 
indications that some terror groups are interested in ``developing 
offensive cyber capabilities, and cyber criminals are using a growing 
black market to sell cyber tools that fall into the hands of both state 
and nonstate actors.''
  Mr. Chair, just last week in Chairman Rogers' committee, it was 
Director Clapper who also said, ``As more and more state and nonstate 
actors gain cyber expertise, its importance and reach as a global 
threat cannot be overstated.''
  Our society has increasingly become reliant on modern technology in 
nearly every aspect of our daily lives, making the possibility of a 
cyber attack that much more dangerous. Under cyber terrorist or cyber 
crime, industries as diverse as financial systems, transportation, 
social media, and even utilities could be negatively impacted. A 
successful attack could disrupt the lives of Americans and result in 
other unpredictable consequences.
  We do know the threat is real. We've already experienced attacks on 
our Nation's financial institutions and have faced hackers trying to 
gain access to the Pentagon and our Nation's critical infrastructure. 
According to the U.S. Government Accountability Office, the number of 
U.S. organizations believed to have been hacked has dramatically 
increased in just the last 6 years. Back in 2006, there were about 
5,500 separate attacks noted, compared to 48,500 in 2012. As a January 
2013 U.S. Government report found, cyber attacks and intrusions in 
critical energy infrastructures rose 52 percent between 2011 and 2012 
alone. That's in a 1-year period, Mr. Chair.
  Cyber weapons will likely continue to be used by a greater number of 
countries and other actors as a form of warfare. Between 20 and 30 
states already have the capability to launch cyber warfare, including 
China, Russia, Iran, and North Korea and others, as has been stated as 
part of the debate on this bill.
  Fortunately, these attacks have so far been thwarted by our 
intelligence before significant and lasting damage could occur, but it 
would be unwise to choose to act alone in the face of the growing fact 
of cyber criminality. In order to produce effective outcomes, our 
intelligence community must continue to promote collaboration among 
experts and across boards.
  Just as we conduct our drills and our training exercises with our 
allies, we need to work together to share our best practices to keep 
our citizens safe from cyber attacks. My amendment would call on 
Congress to encourage international cooperation when it comes to 
cybersecurity.
  This amendment would not bind the United States to working with other

[[Page H2134]]

nations, but it simply does promote doing so in situations that would 
be mutually beneficial. Such collaboration would more effectively allow 
us to combat cyber terrorism and threats by sharing resources and using 
proven security techniques when possible.
  Mr. Chair, in the end, by working together on an issue that poses a 
threat to all of us, the international community will benefit from the 
exchange of experiences and potential solutions.
  Mr. Chair, I just want to thank the gentleman from Michigan and the 
gentleman from Maryland for their leadership on this very challenging 
issue. I know that looking forward we will continue to see success in 
battling these real threats.
  With that, I reserve the balance of my time.
  Mr. RUPPERSBERGER. I rise to claim the time in opposition to this 
amendment even though I'm not opposed.
  The Acting CHAIR. The gentleman from Maryland is recognized for 5 
minutes.
  Mr. RUPPERSBERGER. I thank Congressman Paulsen for his work on this 
bill. I support his amendment with the sense of Congress to encourage 
international cooperation with regard to cybersecurity whenever 
possible under this bill.
  Given that cyber threats are global in nature, as are our networks 
and computer systems, international efforts must work together to 
protect against domestic and foreign actors who seek to destroy our 
industries, government, agencies, and utilities.
  Therefore, I urge a ``yes'' vote on the amendment, and I yield back 
the balance of my time.
  Mr. PAULSEN. Mr. Chair, I yield such time as he may consume to the 
committee chairman.
  Mr. ROGERS of Michigan. Mr. Chairman, I support this amendment and 
agree that we must employ international cooperation to combat the 
scourge of economic cyber espionage and leverage our official state 
relationships and alliances to help stop the bleeding.
  China's economic espionage has reached an intolerable level, and I 
believe U.S. officials should demand that it stop at every meeting and 
engagement we have with Chinese officials. Moreover, the United States 
and our allies in Europe and Asia have an obligation to confront 
Beijing and demand they put a stop to this piracy.
  Beijing is waging a massive trade war on us all, and we should band 
together to pressure them to stop. Combined, the United States and our 
allies in Europe and Asia have significant diplomatic and economic 
leverage over China, and we should use this to our advantage to put an 
end to this activity.
  I commend the gentleman from Minnesota for offering this amendment, 
and I urge my colleagues' strong support for it.
  Mr. PAULSEN. Mr. Chair, I urge support for my amendment, and I yield 
back the balance of my time.
  The Acting CHAIR. The question is on the amendment offered by the 
gentleman from Minnesota (Mr. Paulsen).
  The amendment was agreed to.


                 Amendment No. 11 Offered by Mr. Barton

  The Acting CHAIR. It is now in order to consider amendment No. 11 
printed in House Report 113-41.
  Mr. BARTON. Mr. Chair, I have an amendment at the desk.
  The Acting CHAIR. The Clerk will designate the amendment.
  The text of the amendment is as follows:

       At the end of the bill, add the following new section:

     SEC. 4. RULE OF CONSTRUCTION RELATING TO CONSUMER DATA.

       Nothing in this Act or the amendments made by this Act 
     shall be construed to provide new or alter any existing 
     authority for an entity to sell personal information of a 
     consumer to another entity for marketing purposes.
  The Acting CHAIR. Pursuant to House Resolution 164, the gentleman 
from Texas (Mr. Barton) and a Member opposed each will control 5 
minutes.
  The Chair recognizes the gentleman from Texas.
  Mr. BARTON. Mr. Chair, I yield myself such time as I may consume.
  (Mr. BARTON asked and was given permission to revise and extend his 
remarks.)
  Mr. BARTON. Mr. Chair, when this same bill or bill similar to it was 
on the House floor last year, I had to reluctantly rise in opposition 
to it because it was my opinion that the privacy protections in the 
bill were not sufficient to protect the privacy of the American people. 
I think that surprised a lot of people that I was not for the bill.
  After the bill failed to move in the Senate, I went to Chairman 
Rogers and I told him that I supported the underlying intent of the 
bill and I was hopeful that, if the bill came back up in this session, 
he and myself and our staffs could work together to improve the privacy 
protections. He promised then that he would do it, and Chairman Rogers 
and his staff have been men and women of their word. The result is a 
bill that was reported out of the Intelligence Committee on a 
bipartisan basis with much stronger privacy protections.
  When I went to the Rules Committee, Chairman Rogers supported that 
this amendment I'm about to offer should be made in order, and it has 
been. And if this amendment is accepted--and I'm told that the chairman 
and the ranking member are going to support it, as I'm not aware of any 
organized opposition to it--it is going to be my intent to vote for the 
bill.
  We obviously have a cyber threat that faces the American people, and 
Chairman Rogers and Ranking Member Ruppersberger have talked about that 
in some detail earlier in this debate. We want to combat that threat. 
But in doing it, we do not want to eliminate or weaken the privacy 
protections of the American people that we represent in this body.
  So what my amendment does is make sure that any information that is 
collected is going to be used simply for the purpose of protecting 
against cyber threats. It's a very short amendment. It adds a new 
section to the bill, section 4. Here I will read the amendment since 
it's in clear English and very short.

       Nothing in this act or the amendments made by this act 
     shall be construed to provide new or alter any existing 
     authority for an entity to sell personal information of a 
     consumer to another entity for marketing purposes.

  What this does, Mr. Chair, is simply nail down the fact that when we 
find information that might be necessary to protect against a cyber 
threat, that's all it's going to be used for. It can't be used for any 
other purpose.
  As I said earlier, Chairman Rogers has worked very closely with 
myself, and his staff has worked with my staff. Congressman Markey of 
Massachusetts, who is the cochairman of the Privacy Caucus, strongly 
supports this amendment.
  Again, I think it was unanimously accepted at the Rules Committee. 
I'm aware of no opposition, so I hope that we can adopt the amendment.
  With that, I reserve the balance of my time.

                              {time}  1100

  Mr. RUPPERSBERGER. I rise to claim the time in opposition even though 
I am not opposed to the amendment.
  The Acting CHAIR. Without objection, the gentleman from Maryland is 
recognized for 5 minutes.
  There was no objection.
  Mr. RUPPERSBERGER. First, I would like to thank Congressman Barton 
for his work on the bill.
  You've made the bill stronger, and we want to make sure that there is 
no perception that people's privacies are being violated.
  I support Congressman Barton's amendment, which ensures that nothing 
in our bill, CISPA, provides the authority for any entity to sell a 
consumer's personal information for marketing purposes.
  I yield back the balance of my time.
  Mr. BARTON. I yield such time as he may consume to the distinguished 
chairman of the Intelligence Committee and also a distinguished member 
of the Energy and Commerce Committee, a former FBI agent, the gentleman 
from Michigan (Mr. Rogers).
  Mr. ROGERS of Michigan. Thank you, Mr. Barton, for your work on this.
  Last year, you expressed strong reservations about certain privacy 
protections, and you were willing to sit down and work with us to try 
to find and make sure that we sent that very clear

[[Page H2135]]

message about protecting privacy in this bill. I thought the language 
was excellent, and it added to that purpose. It really does prevent any 
information in the bill from being misused by a company for anything 
other than the bill's strictly defined cybersecurity purpose. But his 
amendment adds an important clarification to make Congress' intent 
absolutely clear, to try again to reassure the American public that 
this is about protecting privacy and civil liberties while protecting 
the country.
  I want to thank Mr. Barton for working with me and my ranking member 
on this important issue, and I urge my colleagues to strongly support 
this amendment.
  Mr. BARTON. In reclaiming my time, Mr. Chairman, before I yield back, 
I want to thank my staff member Emmanual Guillory. He has worked 
tirelessly on this issue and on this amendment. I also want to thank 
Congressman Ed Markey of Massachusetts and his staff for working with 
me and Chairman Rogers and Ranking Member Ruppersberger.
  With that, I yield back the balance of my time.
  The Acting CHAIR. The question is on the amendment offered by the 
gentleman from Texas (Mr. Barton).
  The amendment was agreed to.


              Amendment No. 12 Offered by Ms. Jackson Lee

  The Acting CHAIR. It is now in order to consider amendment No. 12 
printed in House Report 113-41.
  Ms. JACKSON LEE. Mr. Chair, I have an amendment at the desk.
  The Acting CHAIR. The Clerk will designate the amendment.
  The text of the amendment is as follows:

       At the end of the bill, add the following new section:

     SEC. 4. SAVINGS CLAUSE WITH REGARD TO CYBERSECURITY PROVIDER 
                   OBLIGATION TO REPORT CYBER THREAT INCIDENT 
                   INFORMATION TO FEDERAL GOVERNMENT.

       Nothing in this Act or the amendments made by this Act 
     shall be construed to provide authority to a department or 
     agency of the Federal Government to require a cybersecurity 
     provider that has contracted with the Federal Government to 
     provide information services to provide information about 
     cybersecurity incidents that do not pose a threat to the 
     Federal Government's information.

  The Acting CHAIR. Pursuant to House Resolution 164, the gentlewoman 
from Texas (Ms. Jackson Lee) and a Member opposed each will control 5 
minutes.
  The Chair recognizes the gentlewoman from Texas.
  Ms. JACKSON LEE. Let me thank the chairman and the ranking member for 
the work that they have done in getting us here today and in crafting 
the legislation, and I thank the Rules Committee for making what I 
think is a very important amendment in order. I thank this process for 
allowing clarifying amendments because we are here representing the 
American people.
  Mr. Chair, my amendment is straightforward. It improves the bill by 
indicating that:

       Nothing in this Act or the amendments made by this Act 
     shall be construed to provide authority to a department or 
     agency of the Federal Government to require a cybersecurity 
     provider that has contracted with the Federal Government to 
     provide information services to provide information about 
     cybersecurity incidents that do not pose a threat to the 
     Federal Government.

  We want to be concerned about that.
  It makes it clear that the only instance in which a cloud service 
provider can share information about a cyber incident with a government 
agency is when the objective of an attempted intrusion of the service 
provider's network was to gain unauthorized access to the government's 
information.
  I am pleased to state that this commonsense amendment is supported by 
a number of groups, including Constitutional Alliance, The Constitution 
Project, Liberty Coalition, and the ACLU.
  In other words, if a cyber incident does not threaten the 
government's information, then the incident is none of the government's 
need to intrude, and this is especially true when disclosure to the 
government would compromise an individual's privacy and proprietary 
information of businesses.
  Mr. Chairman, today, something commonly called the ``cloud'' plays an 
unseen but critical part in the lives of millions of Americans and 
thousands of businesses. Persons and businesses that use iPhones, 
Gmail, Yahoo!, and MSN email services are connected to the cloud. This, 
of course, does not in any way hinder our homeland security or national 
security. Cloud services include popular online services like Facebook 
and YouTube. The cloud is saving consumers and businesses from the loss 
of valuable data through storage services, and when you speak to our 
industries, they are protected.
  This is the cloud--all private sector. They are not intruded upon, 
but add the government--if the government comes in and decides just 
without any clarification that we'll give your information to others 
without it being necessary, without it being government information, 
without it being related to government operations, my amendment 
protects you in the private sector from that kind of intrusion.
  So I believe that this amendment will protect commerce. These are 
well-known names. This is who this amendment will protect--all of those 
who are generating commerce in the midst of cloud computing.
  Mr. Chairman, cloud computing is such an important innovation that it 
is changing how people, businesses, and government agencies manage 
information. The Jackson Lee amendment recognizes the importance of 
cloud computing to our economy, and it is consistent with the 
objectives of the bill while ensuring that the privacy and civil 
liberties rights of citizens are protected.
  Again, they are doing business with each other. Once we put in the 
government, the question has to be whether or not the government 
transmits information that is not necessary. My amendment protects 
consumers and businesses that are in the midst of providing and helping 
in their lives to make sure that users have their privacy. The cloud 
allows users seamless access to information from any location in the 
United States where the Internet is accessible and available. My 
amendment protects them and is ready to help clarify this bill, and I 
ask my colleagues to support this amendment.
  Mr. Chair, I yield to the ranking member of the committee, the 
distinguished gentleman from Maryland.
  Mr. RUPPERSBERGER. I just want to thank the gentlelady from Texas for 
her hard work on this bill, and I support this amendment.
  Ms. JACKSON LEE. I reserve the balance of my time.
  Mr. ROGERS of Michigan. Mr. Chairman, while I do not oppose this 
amendment, I ask unanimous consent to control the time in opposition.
  The Acting CHAIR (Mr. Yoder). Without objection, the gentleman is 
recognized for 5 minutes.
  There was no objection.
  Mr. ROGERS of Michigan. I want to thank the gentlelady for working 
with us. It is her concern and a genuine concern, and we've had 
discussions on this bill about the protection of privacy. It's an 
important element of the way we move forward to try to protect those 
companies that you talk about in the networks that protect the jobs of 
every American and the privacy of every American.
  Every piece of this bill is voluntary. No one is pressured or 
compelled to give anything to the government under this bill. In fact, 
the bill contains two important protections to drive this point home:
  First, the bill prohibits the government from requiring a private 
sector entity to share information with the government. It is 
completely, 100 percent voluntary;
  Second, the bill prohibits the government from conditioning the 
sharing of classified cyber threat intelligence with a private sector 
entity on the provision of cyber threat information back to the 
government in return. In other words, no quid pro quo, and this is a 
good protection that I know the gentlelady supports.
  I believe that these important provisions make it very clear that 
every molecule of this bill is 100 percent voluntary, and this 
amendment, I think, reaffirms the strong language that is in the bill 
in order to give that next level of confidence on all the privacy 
amendments we've adopted today and to make it very clear that it is 
paramount that we protect individuals' privacy in the conduct of 
sharing cyber threat information.
  I, therefore, support the amendment, and would urge the body to do 
the

[[Page H2136]]

same. Again, I thank the gentlelady for her work on this issue and for 
working with the committee to come to a better place.
  With that, I yield back the balance of my time.
  The Acting CHAIR. The gentlewoman from Texas has 45 seconds 
remaining.
  Ms. JACKSON LEE. Again, I say that the cloud is saving consumers and 
businesses from the loss of valuable data. The Jackson Lee amendment 
adds to the firewall of protecting Americans' privacy and, in the flow 
and the discourse of business, of protecting the privacy of our 
businesses that do not have data that is necessary for the government's 
information. That should be said over and over again.
  I thank both the ranking member and the chairman for their kind 
remarks, and I ask my colleagues to support the Jackson Lee amendment 
that provides, again, the firewall of privacy.
  With that, Mr. Chairman, I ask support of my amendment, and I yield 
back the balance of my time.
  Mr. Chairman, I want to thank Chairman Rogers and Ranking Member 
Ruppersberger for the work in crafting this legislation and the Rules 
Committee for making my amendment in order.
  Mr. Chairman, my amendment is straightforward. It improves the bill 
by providing that:

       Nothing in this Act or the amendments made by this Act 
     shall be construed to provide authority to a department or 
     agency of the Federal Government to require a cybersecurity 
     provider that has contracted with the Federal Government to 
     provide information services to provide information about 
     cybersecurity incidents that do not pose a threat to the 
     Federal Government's information.

  Mr. Chairman, the Jackson Lee amendment makes clear that the only 
instance in which a cloud service provider can share information about 
a cyber incident with a government agency is when the objective of an 
attempted intrusion of the service provider's network was to gain 
unauthorized access to the government's information.
  Mr. Chairman, I am pleased to state that this commonsense amendment 
is supported by interested groups across the spectrum, from the ACLU on 
the left to the Constitutional Alliance on the right.
  In other words, if a cyber incident does not threaten the 
government's information, then the incident is none of the government's 
business.
  And this is especially true where disclosure to the government would 
compromise individuals' privacy and proprietary information of 
businesses.
  Mr. Chairman, today something commonly called ``the Cloud'' plays an 
unseen but critical part in the lives of millions of Americans and 
thousands of businesses. Persons and businesses who use iPhones or use 
Gmail, Yahoo and MSN e-mail services are connected to the Cloud.
  Cloud services include popular online services like Facebook, 
YouTube, ``LinkedIn'' (a professional networking service) and 
``Flickr'' (a place where millions of personal and family photos are 
stored).
  The Cloud is saving consumers and businesses from the loss of 
valuable data through storage services like the popular Apple iCloud. 
The Cloud protects digital information from loss should their computer 
or smart phone be damaged, lost or stolen. The Cloud also allows users 
seamless access to information from any location in the United States 
where internet access is available.
  Mr. Chairman, ``cloud computing'' is such an important innovation 
that it is changing how people, businesses, and government agencies 
manage information.
  The Jackson Lee amendment recognizes the importance of ``cloud 
computing'' to our economy and is consistent with the objectives of the 
bill while assuring that privacy and civil liberty rights of citizens 
are protected.
  This is an important amendment, and I urge my colleagues to support 
it.


             Organizations Endorsing Jackson Lee Amendment

       ACLU
       Constitutional Alliance
       Stop Real ID Coalition
       The Constitution Project
       The Liberty Coalition

                              {time}  1110

  The Acting CHAIR. The question is on the amendment offered by the 
gentlewoman from Texas (Ms. Jackson Lee).
  The amendment was agreed to.


                    Amendment Offered by Mr. McCaul

  The Acting CHAIR. It is now in order to consider the amendment 
printed in section 3 of House Resolution 164 as modified by the order 
of the House of today.
  Mr. McCAUL. Mr. Chairman, I have an amendment at the desk.
  The Acting CHAIR. The Clerk will designate the amendment.
  The text of the amendment is as follows:

       After section 1, insert the following new section (and 
     renumber subsequent sections accordingly):

     ``SEC. 2. FEDERAL GOVERNMENT COORDINATION WITH RESPECT TO 
                   CYBERSECURITY.

       ``(a) Coordinated Activities.--The Federal Government shall 
     conduct cybersecurity activities to provide shared 
     situational awareness that enables integrated operational 
     actions to protect, prevent, mitigate, respond to, and 
     recover from cyber incidents.
       ``(b) Coordinated Information Sharing.--
       ``(1) Designation of coordinating entity for cyber threat 
     information.--The President shall designate an entity within 
     the Department of Homeland Security as the civilian Federal 
     entity to receive cyber threat information that is shared by 
     a cybersecurity provider or self-protected entity in 
     accordance with section 1104(b) of the National Security Act 
     of 1947, as added by section 3(a) of this Act, except as 
     provided in paragraph (2) and subject to the procedures 
     established under paragraph (4).
       ``(2) Designation of a coordinating entity for 
     cybersecurity crimes.--The President shall designate an 
     entity within the Department of Justice as the civilian 
     Federal entity to receive cyber threat information related to 
     cybersecurity crimes that is shared by a cybersecurity 
     provider or self-protected entity in accordance with section 
     1104(b) of the National Security Act of 1947, as added by 
     section 3(a) of this Act, subject to the procedures under 
     paragraph (4).
       ``(3) Sharing by coordinating entities.--The entities 
     designated under paragraphs (1) and (2) shall share cyber 
     threat information shared with such entities in accordance 
     with section 1104(b) of the National Security Act of 1947, as 
     added by section 3(a) of this Act, consistent with the 
     procedures established under paragraphs (4) and (5).
       ``(4) Procedures.--Each department or agency of the Federal 
     Government receiving cyber threat information shared in 
     accordance with section 1104(b) of the National Security Act 
     of 1947, as added by section 3(a) of this Act, shall 
     establish procedures to--
       ``(A) ensure that cyber threat information shared with 
     departments or agencies of the Federal Government in 
     accordance with such section 1104(b) is also shared with 
     appropriate departments and agencies of the Federal 
     Government with a national security mission in real time;
       ``(B) ensure the distribution to other departments and 
     agencies of the Federal Government of cyber threat 
     information in real time; and
       ``(C) facilitate information sharing, interaction, and 
     collaboration among and between the Federal Government; 
     State, local, tribal, and territorial governments; and 
     cybersecurity providers and self-protected entities.
       ``(5) Privacy and civil liberties.--
       ``(A) Policies and procedures.--The Secretary of Homeland 
     Security, the Attorney General, the Director of National 
     Intelligence, and the Secretary of Defense shall jointly 
     establish and periodically review policies and procedures 
     governing the receipt, retention, use, and disclosure of 
     non-publicly available cyber threat information shared 
     with the Federal Government in accordance with section 
     1104(b) of the National Security Act of 1947, as added by 
     section 3(a) of this Act. Such policies and procedures 
     shall, consistent with the need to protect systems and 
     networks from cyber threats and mitigate cyber threats in 
     a timely manner--
       ``(i) minimize the impact on privacy and civil liberties;
       ``(ii) reasonably limit the receipt, retention, use, and 
     disclosure of cyber threat information associated with 
     specific persons that is not necessary to protect systems or 
     networks from cyber threats or mitigate cyber threats in a 
     timely manner;
       ``(iii) include requirements to safeguard non-publicly 
     available cyber threat information that may be used to 
     identify specific persons from unauthorized access or 
     acquisition;
       ``(iv) protect the confidentiality of cyber threat 
     information associated with specific persons to the greatest 
     extent practicable; and
       ``(v) not delay or impede the flow of cyber threat 
     information necessary to defend against or mitigate a cyber 
     threat.
       ``(B) Submission to congress.--The Secretary of Homeland 
     Security, the Attorney General, the Director of National 
     Intelligence, and the Secretary of Defense shall, consistent 
     with the need to protect sources and methods, jointly submit 
     to Congress the policies and procedures required under 
     subparagraph (A) and any updates to such policies and 
     procedures.
       ``(C) Implementation.--The head of each department or 
     agency of the Federal Government receiving cyber threat 
     information shared with the Federal Government under such 
     section 1104(b) shall--
       ``(i) implement the policies and procedures established 
     under subparagraph (A); and
       ``(ii) promptly notify the Secretary of Homeland Security, 
     the Attorney General, the Director of National Intelligence, 
     the Secretary of Defense, and the appropriate congressional 
     committees of any significant violations of such policies and 
     procedures.

[[Page H2137]]

       ``(D) Oversight.--The Secretary of Homeland Security, the 
     Attorney General, the Director of National Intelligence, and 
     the Secretary of Defense shall jointly establish a program to 
     monitor and oversee compliance with the policies and 
     procedures established under subparagraph (A).
       ``(6) Information sharing relationships.--Nothing in this 
     section shall be construed to--
       ``(A) alter existing agreements or prohibit new agreements 
     with respect to the sharing of cyber threat information 
     between the Department of Defense and an entity that is part 
     of the defense industrial base;
       ``(B) alter existing information-sharing relationships 
     between a cybersecurity provider, protected entity, or self-
     protected entity and the Federal Government;
       ``(C) prohibit the sharing of cyber threat information 
     directly with a department or agency of the Federal 
     Government for criminal investigative purposes related to 
     crimes described in section 1104(c)(1) of the National 
     Security Act of 1947, as added by section 3(a) of this 
     Act; or
       ``(D) alter existing agreements or prohibit new agreements 
     with respect to the sharing of cyber threat information 
     between the Department of Treasury and an entity that is part 
     of the financial services sector.
       ``(7) Technical assistance.--
       ``(A) Discussions and assistance.--Nothing in this section 
     shall be construed to prohibit any department or agency of 
     the Federal Government from engaging in formal or informal 
     technical discussion regarding cyber threat information with 
     a cybersecurity provider or self-protected entity or from 
     providing technical assistance to address vulnerabilities or 
     mitigate threats at the request of such a provider or such an 
     entity.
       ``(B) Coordination.--Any department or agency of the 
     Federal Government engaging in an activity referred to in 
     subparagraph (A) shall coordinate such activity with the 
     entity of the Department of Homeland Security designated 
     under paragraph (1) and share all significant information 
     resulting from such activity with such entity and all other 
     appropriate departments and agencies of the Federal 
     Government.
       ``(C) Sharing by designated entity.--Consistent with the 
     policies and procedures established under paragraph (5), the 
     entity of the Department of Homeland Security designated 
     under paragraph (1) shall share with all appropriate 
     departments and agencies of the Federal Government all 
     significant information resulting from--
       ``(i) formal or informal technical discussions between such 
     entity of the Department of Homeland Security and a 
     cybersecurity provider or self-protected entity about cyber 
     threat information; or
       ``(ii) any technical assistance such entity of the 
     Department of Homeland Security provides to such 
     cybersecurity provider or such self-protected entity to 
     address vulnerabilities or mitigate threats.
       ``(c) Reports on Information Sharing.--
       ``(1) Inspector general of the department of homeland 
     security report.--The Inspector General of the Department of 
     Homeland Security, in consultation with the Inspector General 
     of the Department of Justice, the Inspector General of the 
     Intelligence Community, the Inspector General of the 
     Department of Defense, and the Privacy and Civil Liberties 
     Oversight Board, shall annually submit to the appropriate 
     congressional committees a report containing a review of the 
     use of information shared with the Federal Government under 
     subsection (b) of section 1104 of the National Security Act 
     of 1947, as added by section 3(a) of this Act, including--
       ``(A) a review of the use by the Federal Government of such 
     information for a purpose other than a cybersecurity purpose;
       ``(B) a review of the type of information shared with the 
     Federal Government under such subsection;
       ``(C) a review of the actions taken by the Federal 
     Government based on such information;
       ``(D) appropriate metrics to determine the impact of the 
     sharing of such information with the Federal Government on 
     privacy and civil liberties, if any;
       ``(E) a list of the departments or agencies receiving such 
     information;
       ``(F) a review of the sharing of such information within 
     the Federal Government to identify inappropriate stovepiping 
     of shared information; and
       ``(G) any recommendations of the Inspector General of the 
     Department of Homeland Security for improvements or 
     modifications to the authorities under such section.
       ``(2) Privacy and civil liberties officers report.--The 
     Officer for Civil Rights and Civil Liberties of the 
     Department of Homeland Security, in consultation with the 
     Privacy and Civil Liberties Oversight Board, the Inspector 
     General of the Intelligence Community, and the senior privacy 
     and civil liberties officer of each department or agency of 
     the Federal Government that receives cyber threat information 
     shared with the Federal Government under such subsection (b), 
     shall annually and jointly submit to Congress a report 
     assessing the privacy and civil liberties impact of the 
     activities conducted by the Federal Government under such 
     section 1104. Such report shall include any recommendations 
     the Civil Liberties Protection Officer and Chief Privacy and 
     Civil Liberties Officer consider appropriate to minimize or 
     mitigate the privacy and civil liberties impact of the 
     sharing of cyber threat information under such section 1104.
       ``(3) Form.--Each report required under paragraph (1) or 
     (2) shall be submitted in unclassified form, but may include 
     a classified annex.
       ``(d) Definitions.--In this section:
       ``(1) Appropriate congressional committees.--The term 
     `appropriate congressional committees' means--
       ``(A) the Committee on Homeland Security, the Committee on 
     the Judiciary, the Permanent Select Committee on 
     Intelligence, and the Committee on Armed Services of the 
     House of Representatives; and
       ``(B) the Committee on Homeland Security and Governmental 
     Affairs, the Committee on the Judiciary, the Select Committee 
     on Intelligence, and the Committee on Armed Services of the 
     Senate.
       ``(2) Cyber threat information, cyber threat intelligence, 
     cybersecurity crimes, cybersecurity provider, cybersecurity 
     purpose, and self-protected entity.--The terms `cyber threat 
     information', `cyber threat intelligence', `cybersecurity 
     crimes', `cybersecurity provider', `cybersecurity purpose', 
     and `self-protected entity' have the meaning given those 
     terms in section 1104 of the National Security Act of 1947, 
     as added by section 3(a) of this Act.
       ``(3) Intelligence community.--The term intelligence 
     community' has the meaning given the term in section 3(4) of 
     the National Security Act of 1947 (50 U.S.C. 401a(4)).
       ``(4) Shared situational awareness.--The term `shared 
     situational awareness' means an environment where cyber 
     threat information is shared in real time between all 
     designated Federal cyber operations centers to provide 
     actionable information about all known cyber threats.''.
       Page 4, line 18, strike ``Federal Government'' and insert 
     ``entities of the Department of Homeland Security and the 
     Department of Justice designated under paragraphs (1) and (2) 
     of section 2(b) of the Cyber Intelligence Sharing and 
     Protection Act''.
       Page 5, line 5, strike ``Federal Government'' and insert 
     ``entities of the Department of Homeland Security and the 
     Department of Justice designated under paragraphs (1) and (2) 
     of section 2(b) of the Cyber Intelligence Sharing and 
     Protection Act''.
       Page 5, strike line 6 and all that follows through page 6, 
     line 7.
       Page 7, beginning on line 17, strike ``by the department or 
     agency of the Federal Government receiving such cyber threat 
     information''.
       Page 13, strike line 13 and all that follows through page 
     15, line 23.
       Page 17, strike line 15 and all that follows through page 
     19, line 19.

  The Acting CHAIR. Pursuant to House Resolution 164, the gentleman 
from Texas (Mr. McCaul) and a Member opposed each will control 5 
minutes.
  The Chair recognizes the gentleman from Texas.
  Mr. McCAUL. Mr. Chairman, I yield myself such time as I may consume, 
and I want to first thank Mr. Rogers, Mr. Ruppersberger, Mr. Thompson, 
and all the staff for their real-time collaboration over the last 
several days, very late night hours, to get this amendment to 
perfection, and let me just say thanks again for that.
  Mr. Chairman, I strongly encourage support of this amendment. Cyber 
threats that the United States faces are real and immediate, and the 
key to addressing these cracks in our cyber defenses lies with bridging 
the gap between government and industry. My amendment helps do just 
that.
  This amendment would direct the Federal Government to conduct 
cybersecurity activities in a real-time, coordinated, and integrated 
way so that there is shared situational awareness across agencies to 
protect the Nation from cyber attack. This amendment would designate an 
entity within the Department of Homeland Security as the civilian 
Federal entity interface to receive cyber threat information from the 
private sector. This is an important improvement and provides an 
additional layer of review for information sharing procedures by a 
robust civilian privacy office in order to ensure Americans' civil 
liberties are protected.
  Additionally, another important improvement to the underlying bill by 
way of this amendment is designating an entity within the Department of 
Justice as the civilian Federal entity to receive cyber threat 
information from the private sector related to cyber crime.
  This bipartisan amendment improves the underlying bill and addresses 
concerns raised by privacy groups. These changes ensure that DHS and 
DOJ will serve as points of entry for those seeking to share cyber 
threat information with the Federal Government.
  With that, Mr. Chairman, I reserve the balance of my time.
  Mr. THOMPSON of Mississippi. Mr. Chairman, while I am not opposed to 
the amendment, I ask unanimous consent to claim the time in opposition.
  The Acting CHAIR. Without objection, the gentleman is recognized for 
5 minutes.

[[Page H2138]]

  There was no objection.
  Mr. THOMPSON of Mississippi. Mr. Chair, I rise in strong support of 
this amendment.
  Enhancing our security in cyberspace is of the highest importance, 
but it cannot be done at the expense of our privacy and civil 
liberties. The key to ensuring the necessary protections are in place 
is codifying in statute a strong civilian lead for information sharing 
with the private sector. Our amendment does just that.
  Yesterday, I reached an agreement with Chairman Rogers, Ranking 
Member Ruppersberger, and Chairman McCaul to offer this bipartisan 
amendment to strengthen the bill. The amendment establishes a center 
within the Department of Homeland Security as the Federal hub for cyber 
threat information shared under this bill, and the Department of 
Justice as the hub for all cyber crime information.
  With this amendment, citizens may take comfort knowing that their 
information will be more likely shared with the appropriate civilian 
agencies with the accompanying accountability and transparency; and 
businesses can be more sure that their dealings abroad will not be 
colored by the perception, fair or otherwise, that they are in cahoots 
with the National Security Agency.
  To be clear, this amendment does not fix all of the privacy or 
liability issues with the underlying bill, but it does establish the 
strong precedent of civilian control of cyber information sharing; and 
I hope we can fix the broader issues with the bill, should it pass, 
further down the line.
  This amendment is absolutely essential to the bill, and it sends the 
right message to the world about the way the United States will act in 
cyberspace.
  I reserve the balance of my time.

               Enhance the CIVILIAN Authorities in CISPA


               Enhance the CIVILIAN Authorities in CISPA

       Dear Colleague: Chairman Rogers and Ranking Member 
     Ruppersberger of the House Permanent Select Committee on 
     Intelligence, together with Chairman McCaul and Ranking 
     Member Thompson of the House Homeland Security Committee, 
     will offer an amendment that will designate a civilian lead 
     for the cyber security information sharing program under the 
     Cyber Intelligence Sharing and Protection Act (CISPA).
       This amendment requires the President to designate a 
     civilian entity within the Department of Homeland Security 
     (DHS) to be the entry point to receive cyber threat 
     information and to designate an entity within the Department 
     of Justice (DOJ) as the civilian entity to receive cyber 
     threat information related to cybersecurity crimes. These 
     changes make clear that DHS and the DOJ will serve as points 
     of entry for those seeking to share cybersecurity threat 
     information with the federal government.
       The amendment also requires the Secretary of DHS, the 
     Attorney General, the Director of National Intelligence, and 
     the Secretary of Defense to establish procedures to eliminate 
     any personal information from cyber threat information shared 
     with the federal government. Cyber threat information shared 
     with the government from any source will be scrubbed of any 
     personally identifiable information and deleted--this is also 
     known as ``minimization.''
       Every agency receiving cyber threat information must notify 
     these four agencies, and Congress of significant violations 
     of the procedures required by the bill. These agencies must 
     also establish a program to oversee compliance with the 
     minimization procedures.
       We urge you to vote ``yes'' on this amendment.
           Sincerely,
     Michael T. McCaul,
       Chairman, Homeland Security Committee.
     Bennie Thompson,
       Ranking Member, Homeland Security Committee.
     Mike J. Rogers,
       Chairman, Permanent Select Committee on Intelligence.
     Dutch Ruppersberger,
       Ranking Member, Permanent Select Committee on Intelligence.

  Mr. McCAUL. Mr. Chairman, I yield such time as he may consume to the 
distinguished gentleman from Michigan (Mr. Rogers), the chairman of the 
Permanent Select Committee on Intelligence.
  Mr. ROGERS of Michigan. Mr. Chair, I want to thank Mr. Thompson and 
Mr. McCaul for working so hard on this particular amendment to try and 
get it right. An agreement was agreed to and then undone, and then 
agreed to by some involvement who are filled with self-importance 
beyond this Chamber. We were able to work out those differences and get 
to a place where we all agreed.
  This is an important amendment. This is that civilian face that so 
many talked about for so long on this bill. And I want to thank both 
the chair and the ranking member of Homeland Security for working 
through all of the difficulties to get us to this place where we could 
present that civilian face and add yet one more reassurance about 
privacy, civilian liberty protection, and that this is not a 
surveillance bill.
  And I want to thank again Mr. Thompson for your graciousness, your 
patience for working with us, and Mr. McCaul for your leadership on 
this issue as well. I urge strong support for the McCaul-Thompson-
Ruppersberger-Rogers amendment.
  Mr. THOMPSON of Mississippi. Mr. Chairman, I yield 1 minute to the 
gentlewoman from California (Ms. Pelosi), the distinguished Democratic 
leader.
  Ms. PELOSI. Mr. Chairman, today the Internet and new technologies are 
shaping a world that we could scarcely have imagined even 10 years ago. 
It's giving Americans an easy way to build friendships, build business, 
and participate in democracy, all with the click of a button.
  But because so much of our daily lives are invested in cyberspace, it 
only takes one more click to put our personal identities, our economic 
stability, and our national security at risk. The threat of a cyber 
attack on our country is real, and our response must always balance our 
security with our liberties. That has always been the case in the 
history of America, the balance between liberty and security.
  There can be absolutely no doubt or delay in shoring up our Nation's 
cybersecurity. We must take clear, responsible, effective action to 
enhance the security of the American people.
  I want to commend Chairman Rogers and Ranking Member Ruppersberger, 
working together in a bipartisan way, for their leadership on this 
issue and their efforts to craft and try to improve this legislation. I 
want to thank Chairman McCaul and Ranking Member Thompson on the 
Homeland Security Committee for their energetic leadership on this 
subject as well. I thank both committees for recognizing the 
jurisdiction of the other committee.
  I had hoped that today we would be addressing some major concerns of 
Members of Congress and the White House by improving the legislation's 
protections of personal information. With all of the respect in the 
world for the work of our chairs and ranking members on this, and it 
has been considerable. You have standing on this issue that is 
recognized and respected. I am disappointed, however, that we did not 
address some of the concerns, as I mentioned, of the White House about 
personal information.
  Unfortunately, this bill offers no policies, did not allow any 
amendments--and I don't put that to you, no amendments--and no real 
solutions that adequately uphold an American's right to privacy.
  For one thing, in promoting the sharing of cyber threat information, 
the bill does not require the private sector to minimize irrelevant 
personally identifiable information from what it shares with the 
government, or other private matters. They can just ship the whole kit 
and caboodle. We are saying minimize what is relevant to our national 
security; the rest is none of the government's business.
  The bill continues to offer overly broad liability protections and 
immunities to the businesses that could violate our liberties rather 
than offering more targeted liabilities to ensure that the private 
sector only shares appropriate information.

                              {time}  1120

  We thought there might be a way to get this done by amendment--I'm 
sure that it would enjoy bipartisan support--but the Rules Committee 
did not allow that amendment to come forward.
  Most importantly, the bill fails to critically address the greatest 
weakness in our cybersecurity: our Nation's infrastructure. Too many of 
our country's systems, both physical and virtual, are still exposed to 
an increasing number of intrusions and attacks.

[[Page H2139]]

  Now, as a longtime former member of the Intelligence Committee, I 
know that infrastructure is not your jurisdiction, so in your original 
bill you couldn't go to that place. But now the Rules Committee could 
have allowed, with the cooperation of the Homeland Security Committee, 
us to go into infrastructure.
  If we're truly going to secure a reliable and resilient cyberspace 
that reflects our country's values, we must target our clearest 
vulnerabilities, while preserving a space that promotes the innovation, 
expression, and security of the American people.
  The world we live in and the threats our country faces can change 
with just one click. While we should never let Americans doubt our 
vigilance, our preparation, our effectiveness, we must never let us 
compromise their civil liberties.
  If we fail to meet the standard of security, we always do more harm 
than good.
  I, myself, am personally going to vote ``no'' on this legislation 
but, in doing so, salute the chairs and ranking members of the 
committees for taking us way down the road on this issue. It's just 
that crucial balance between security and liberty that I do not think 
has been struck in that bill. So, for my own part, it will not have my 
support.
  Mr. McCAUL. We have no more speakers. I reserve the balance of my 
time.
  Mr. THOMPSON of Mississippi. Mr. Chair, I yield 1 minute to the 
gentleman from Maryland (Mr. Ruppersberger), the ranking member on the 
Committee on Intelligence.
  Mr. RUPPERSBERGER. First thing, I want to thank the ranking member, 
Mr. Thompson, and I want to thank Mr. McCaul and Mr. Rogers for coming 
together. That's what we're elected to do, to come together in a 
bipartisan way and to deal with difficult issues. And they were 
difficult issues. But we're here today to all support this amendment.
  The White House and the privacy groups raised this as one of the main 
issues with the bill. These groups were concerned that there was an 
impression, wrongly, I believe, that the military would control the 
program. This was never the case, but we heard these concerns, and we 
are addressing them in this amendment.
  It means that companies sharing information about cyber threats will 
go to the Department of Homeland Security, a civilian agency. If the 
information is related to cybersecurity crime, the companies will go to 
the Department of Justice, another civilian agency.
  The amendment requires that the Department of Homeland Security share 
this information with other government agencies in real-time so they 
can use it to protect against future cyber threats and attacks.
  This amendment ensures we protect the security of our Nation, but 
also protect the privacy and liberties of our country and our citizens. 
I strongly support this amendment and urge other Members to do the 
same.
  I commend, again, Ranking Member Thompson, Chairman McCaul, Chairman 
Rogers for coming together at the last moment. I respectfully request a 
``yes'' vote on the amendment.
  You can't have security if you don't have privacy and liberty.
  Mr. THOMPSON of Mississippi. Mr. Chair, who has the right to close?
  The Acting CHAIR. The gentleman from Mississippi has the right to 
close.
  Mr. THOMPSON of Mississippi. I reserve the balance of my time.
  Mr. McCAUL. Mr. Chairman, I yield myself the balance of my time.
  Let me just say this: when it comes to this issue, particularly, 
which we know is one of the greatest threats that the United States 
faces right now, and that's the threat of cyber attacks, this is not a 
Republican-Democrat issue. It's really an American issue.
  And with all due respect, this does provide, I think, the balance 
between security and civil liberties; and it provides the civilian 
interface to the private sector to protect our critical infrastructures 
that are already under attack by countries like Iran, China, and 
Russia.
  So I think that, if anything, the recent events in Boston demonstrate 
that we have to come together as Republicans and Democrats to get this 
done in the name of national security. In the case in Boston, they were 
real bombs, explosive devices. In this case, they're digital bombs, and 
these digital bombs are on their way.
  That's why this legislation is so important. That's why it's so 
urgent that we pass this today. For if we don't, and those digital 
bombs land and attack the United States of America, and Congress fails 
to act, then Congress has that on its hands.
  I yield back the balance of my time.
  Mr. THOMPSON of Mississippi. Mr. Chair, at this point, I'd like to 
say that I agree with Democratic Leader Ms. Pelosi's issue with respect 
to cyber, particularly critical infrastructure. And I look forward to 
working with Chairman McCaul on submitting legislation.
  With that, Mr. Chair, I encourage Members to support this bipartisan 
amendment that the chair of the Committee on Homeland Security and I 
drafted.
  I yield back the balance of my time.
  Ms. JACKSON LEE. Mr. Chair, I am in support of the amendment offered 
by Intelligence Committee Chairman Rogers, Congressman McCaul and 
Homeland Security Ranking Member Thompson to H.R. 624, the Cyber 
Intelligence Sharing and Protection Act of 2013. This is very similar 
to the amendment I offered before the Rules Committee, but was not made 
in order. I am pleased that the focus of my amendment is addressed by 
this amendment that was made in order.
  This amendment just as I outlined in my amendment offered to the 
Rules Committee would establish a lead role for the Department of 
Homeland Security--a civilian agency in matters related to cyber 
security threats. DHS would be the agency to receive all cyber threat 
information. This amendment designates the Department of Justice (DOJ) 
as the civilian entity to receive cyber threat information related to 
cybersecurity crimes.
  These changes make clear that DHS and the DOJ will serve as points of 
entry for those seeking to share cybersecurity threat information with 
the federal government.
  The amendment also requires the Secretary of DHS, the Attorney 
General, the Director of National Intelligence, and the Secretary of 
Defense to establish procedures to eliminate any personal information 
from cyber threat information shared with the federal government. Cyber 
threat information shared with the government from any source will be 
scrubbed of any personally identifiable information and deleted--this 
is also known as ``minimization.''
  Every agency receiving cyber threat information must notify these 
four agencies, and Congress of significant violations of the procedures 
required by the bill. These agencies must also establish a program to 
oversee compliance with the minimization procedures.
  The importance of a civil agency in a central role regarding the 
establishment and functions of domestic cyber protection programs is 
critical to building in the transparency, accountability and oversight 
the American public expects. I am in strong support of this amendment 
and thank my colleagues for their efforts to address the concerns of 
many of our constituents as we work to assure the Internet is as safe 
as it can be and that we maintain the level of oversight that is 
needed.
  This is an important amendment, and I urge my colleagues to support 
it.
  The Acting CHAIR. The question is on the amendment offered by the 
gentleman from Texas (Mr. McCaul).
  The question was taken; and the Acting Chair announced that the ayes 
appeared to have it.
  Mr. McCAUL. Mr. Chairman, I demand a recorded vote.
  The Acting CHAIR. Pursuant to clause 6 of rule XVIII, further 
proceedings on the amendment offered by the gentleman from Texas will 
be postponed.
  Mr. ROGERS of Michigan. Mr. Chairman, I move that the Committee do 
now rise.
  The motion was agreed to.
  Accordingly, the Committee rose; and the Speaker pro tempore (Mr. 
Denham) having assumed the chair, Mr. Yoder, Acting Chair of the 
Committee of the Whole House on the state of the Union, reported that 
that Committee, having had under consideration the bill (H.R. 624) to 
provide for the sharing of certain cyber threat intelligence and cyber 
threat information between the intelligence community and cybersecurity 
entities, and for other purposes, had come to no resolution thereon.

                          ____________________


[Congressional Record Volume 159, Number 53 (Thursday, April 18, 2013)]
[House]
[Pages H2140-H2145]
From the Congressional Record Online through the Government Printing Office [www.gpo.gov]




             CYBER INTELLIGENCE SHARING AND PROTECTION ACT

  The SPEAKER pro tempore. Pursuant to House Resolution 164 and rule 
XVIII, the Chair declares the House in the Committee of the Whole House 
on the state of the Union for the further consideration of the bill, 
H.R. 624.
  Will the gentleman from Kansas (Mr. Yoder) kindly take the chair.

                              {time}  1146


                     In the Committee of the Whole

  Accordingly, the House resolved itself into the Committee of the 
Whole House on the state of the Union for the further consideration of 
the bill (H.R. 624) to provide for the sharing of certain cyber threat 
intelligence and cyber threat information between the intelligence 
community and cybersecurity entities, and for other purposes, with Mr. 
Yoder (Acting Chair) in the chair.
  The Clerk read the title of the bill.
  The Acting CHAIR. When the Committee of the Whole rose earlier today, 
a request for a recorded vote on the amendment offered by the gentleman 
from Texas (Mr. McCaul) had been postponed.
  Pursuant to clause 6 of rule XVIII, proceedings will now resume on 
those amendments printed in House Report 113-41 on which further 
proceedings were postponed, in the following order:
  Amendment No. 7 by Ms. Sinema of Arizona.
  Amendment No. 9 by Mr. LaMalfa of California.
  Amendment by Mr. McCaul of Texas.
  The Chair will reduce to 2 minutes the minimum time for any 
electronic vote after the first vote in this series.


                 Amendment No. 7 Offered by Ms. Sinema

  The Acting CHAIR. The unfinished business is the demand for a 
recorded vote on the amendment offered by the gentlewoman from Arizona 
(Ms. Sinema) on which further proceedings were postponed and on which 
the ayes prevailed by voice vote.
  The Clerk will redesignate the amendment.
  The Clerk redesignated the amendment.


                             Recorded Vote

  The Acting CHAIR. A recorded vote has been demanded.
  A recorded vote was ordered.
  The vote was taken by electronic device, and there were--ayes 411, 
noes 0, not voting 21, as follows:

                             [Roll No. 113]

                               AYES--411

     Aderholt
     Alexander
     Amash
     Amodei
     Andrews
     Bachus
     Barber
     Barletta
     Barr
     Barrow (GA)
     Barton
     Bass
     Beatty
     Becerra
     Benishek
     Bentivolio
     Bera (CA)
     Bilirakis
     Bishop (GA)
     Bishop (NY)
     Bishop (UT)
     Black
     Blumenauer
     Bonamici
     Bonner
     Boustany
     Brady (PA)
     Brady (TX)
     Braley (IA)
     Bridenstine
     Brooks (AL)
     Brooks (IN)
     Broun (GA)
     Brown (FL)
     Brownley (CA)
     Buchanan
     Bucshon
     Bustos
     Butterfield
     Calvert
     Camp
     Campbell
     Cantor
     Capito
     Capps
     Cardenas
     Carney
     Carson (IN)
     Carter
     Cartwright
     Cassidy
     Castor (FL)
     Castro (TX)
     Chabot
     Chaffetz
     Chu
     Cicilline
     Clarke
     Clay
     Cleaver
     Clyburn
     Coble
     Coffman
     Cohen
     Cole
     Collins (GA)
     Collins (NY)
     Conaway
     Connolly
     Conyers
     Cook
     Cooper
     Costa
     Cotton
     Courtney
     Cramer
     Crawford
     Crenshaw
     Crowley
     Cuellar
     Culberson
     Cummings
     Daines
     Davis (CA)
     Davis, Danny
     Davis, Rodney
     DeFazio
     DeGette
     Delaney
     DeLauro
     DelBene
     Denham
     Dent
     DeSantis
     DesJarlais
     Deutch
     Diaz-Balart
     Dingell
     Doggett
     Doyle
     Duckworth
     Duffy
     Duncan (SC)
     Duncan (TN)
     Edwards
     Ellison
     Engel
     Enyart
     Eshoo
     Esty
     Farenthold
     Farr
     Fattah
     Fincher
     Fitzpatrick
     Fleischmann
     Fleming
     Flores
     Forbes
     Fortenberry
     Foster
     Foxx
     Frankel (FL)
     Franks (AZ)
     Frelinghuysen
     Fudge
     Gabbard
     Gallego
     Garamendi
     Garcia
     Gardner
     Garrett
     Gerlach
     Gibbs
     Gibson
     Gingrey (GA)
     Gohmert
     Goodlatte
     Gosar
     Gowdy
     Granger
     Graves (GA)
     Graves (MO)
     Grayson
     Green, Al
     Green, Gene
     Griffin (AR)
     Griffith (VA)
     Grijalva
     Grimm
     Guthrie
     Gutierrez
     Hahn
     Hall
     Hanabusa
     Hanna
     Harper
     Harris
     Hartzler
     Hastings (FL)
     Hastings (WA)
     Heck (NV)
     Heck (WA)
     Hensarling
     Herrera Beutler
     Higgins
     Himes
     Hinojosa
     Holt
     Honda
     Horsford
     Hoyer
     Hudson
     Huelskamp
     Huffman
     Huizenga (MI)
     Hultgren
     Hunter
     Hurt
     Israel
     Issa
     Jackson Lee
     Jeffries
     Jenkins
     Johnson (GA)
     Johnson (OH)
     Johnson, E. B.
     Johnson, Sam
     Jones
     Jordan
     Joyce
     Kaptur
     Kelly (IL)
     Kelly (PA)
     Kildee
     Kilmer
     Kind
     King (IA)
     King (NY)
     Kingston
     Kinzinger (IL)
     Kirkpatrick
     Kline
     Kuster
     Labrador
     LaMalfa
     Lamborn
     Lance
     Langevin
     Lankford
     Larsen (WA)
     Larson (CT)
     Latham
     Latta
     Lee (CA)
     Levin
     Lewis
     Lipinski
     LoBiondo
     Loebsack
     Lofgren
     Long
     Lowenthal
     Lowey
     Lucas
     Luetkemeyer
     Lujan Grisham (NM)
     Lujan, Ben Ray (NM)
     Lummis
     Maffei
     Maloney, Carolyn
     Maloney, Sean
     Marchant
     Marino
     Massie
     Matheson
     Matsui
     McCarthy (CA)
     McCarthy (NY)
     McCaul
     McClintock
     McCollum
     McDermott
     McHenry
     McIntyre
     McKeon
     McKinley
     McMorris Rodgers
     McNerney
     Meadows
     Meehan
     Meeks
     Meng
     Messer
     Mica
     Michaud
     Miller (FL)
     Miller (MI)
     Miller, George
     Moore
     Moran
     Mullin
     Mulvaney
     Murphy (FL)
     Murphy (PA)
     Nadler
     Napolitano
     Negrete McLeod
     Neugebauer
     Noem
     Nolan
     Nunes
     Nunnelee
     O'Rourke
     Olson
     Owens
     Palazzo
     Pallone
     Pascrell
     Pastor (AZ)
     Paulsen
     Payne
     Pearce
     Pelosi
     Perlmutter
     Perry
     Peters (CA)
     Peters (MI)
     Peterson
     Petri
     Pingree (ME)
     Pittenger
     Pocan
     Poe (TX)
     Polis
     Pompeo
     Posey
     Price (GA)
     Price (NC)
     Quigley
     Radel
     Rahall
     Rangel
     Reed
     Reichert
     Renacci
     Ribble
     Rice (SC)
     Richmond
     Rigell
     Roby
     Roe (TN)
     Rogers (AL)
     Rogers (KY)
     Rogers (MI)
     Rohrabacher
     Rokita
     Rooney
     Ros-Lehtinen
     Roskam
     Ross
     Rothfus
     Roybal-Allard
     Royce
     Ruiz
     Runyan
     Ruppersberger
     Rush
     Ryan (OH)
     Ryan (WI)
     Salmon
     Sanchez, Linda T.
     Sanchez, Loretta
     Sarbanes
     Scalise
     Schakowsky
     Schiff
     Schneider
     Schock
     Schrader
     Schwartz
     Schweikert
     Scott (VA)
     Scott, Austin
     Scott, David
     Sensenbrenner
     Serrano
     Sessions
     Sewell (AL)
     Sherman
     Shuster
     Simpson
     Sinema
     Sires
     Slaughter
     Smith (NE)
     Smith (TX)
     Smith (WA)
     Southerland
     Speier
     Stewart
     Stivers
     Stockman
     Stutzman
     Swalwell (CA)
     Takano
     Terry
     Thompson (CA)
     Thompson (MS)
     Thompson (PA)
     Thornberry
     Tiberi
     Tipton
     Titus
     Tonko
     Turner
     Upton
     Valadao
     Van Hollen
     Vargas
     Veasey
     Vela
     Visclosky
     Wagner
     Walberg
     Walden
     Walorski
     Walz
     Wasserman Schultz
     Waters
     Watt
     Waxman
     Weber (TX)
     Webster (FL)
     Welch
     Wenstrup
     Westmoreland
     Whitfield
     Williams
     Wilson (FL)
     Wilson (SC)
     Wittman
     Wolf
     Womack
     Woodall
     Yarmuth
     Yoder
     Yoho
     Young (AK)
     Young (FL)
     Young (IN)

                             NOT VOTING--21

     Bachmann
     Blackburn
     Burgess
     Capuano
     Ellmers
     Holding
     Keating
     Kennedy
     Lynch
     Markey
     McGovern
     Miller, Gary
     Neal
     Nugent
     Pitts
     Shea-Porter
     Shimkus
     Smith (NJ)
     Tierney
     Tsongas
     Velazquez

                              {time}  1213

  Mr. CICILLINE changed his vote from ``no'' to ``aye.''
  So the amendment was agreed to.
  The result of the vote was announced as above recorded.
  Stated for:
  Ms. ELLMERS. Mr. Chair, on rollcall No. 113, I was unavoidably 
detained. Had I been present, I would have voted ``aye.''
  (By unanimous consent, Mr. Flores was allowed to speak out of order.)


A Moment of Silence for the Victims in Boston, Massachusetts, and West, 
                                 Texas

  Mr. FLORES. Mr. Chair, I rise today in the wake of two grave 
tragedies in our Nation. The terrorist attack in Boston and then the 
tragedy in West, Texas, last night remind us of the risks that modern 
life presents. I ask that all Americans pray for these two communities 
and to hug your families a little tighter tonight.
  As we gather on the House floor, I want to take a moment to remember 
all of those affected by the explosion in West, Texas, who have been 
injured or killed, and their families and their loved ones.
  I would also like to recognize the bravery of the first responders 
and the volunteers from our community and, actually, from all over 
Texas who have come to the aid of those in need.
  I want to thank my House colleagues for their many offers of support, 
and I also ask for a moment of silence.

[[Page H2141]]

                 Amendment No. 9 Offered by Mr. LaMalfa

  The Acting CHAIR. Without objection, 2-minute voting will continue.
  There was no objection.
  The Acting CHAIR. The unfinished business is the demand for a 
recorded vote on the amendment offered by the gentleman from California 
(Mr. LaMalfa) on which further proceedings were postponed and on which 
the ayes prevailed by voice vote.
  The Clerk will redesignate the amendment.
  The Clerk redesignated the amendment.


                             Recorded Vote

  The Acting CHAIR. A recorded vote has been demanded.
  A recorded vote was ordered.
  The Acting CHAIR. This will be a 2-minute vote.
  The vote was taken by electronic device, and there were--ayes 413, 
noes 0, not voting 19, as follows:

                             [Roll No. 114]

                               AYES--413

     Aderholt
     Alexander
     Amash
     Amodei
     Andrews
     Bachus
     Barber
     Barletta
     Barr
     Barrow (GA)
     Barton
     Bass
     Beatty
     Becerra
     Benishek
     Bentivolio
     Bera (CA)
     Bilirakis
     Bishop (GA)
     Bishop (NY)
     Bishop (UT)
     Black
     Blumenauer
     Bonamici
     Bonner
     Boustany
     Brady (PA)
     Brady (TX)
     Braley (IA)
     Bridenstine
     Brooks (AL)
     Brooks (IN)
     Broun (GA)
     Brown (FL)
     Brownley (CA)
     Buchanan
     Bucshon
     Burgess
     Bustos
     Butterfield
     Calvert
     Camp
     Campbell
     Cantor
     Capito
     Capps
     Carney
     Carson (IN)
     Carter
     Cartwright
     Cassidy
     Castor (FL)
     Castro (TX)
     Chabot
     Chaffetz
     Chu
     Cicilline
     Clarke
     Clay
     Cleaver
     Clyburn
     Coble
     Coffman
     Cohen
     Cole
     Collins (GA)
     Collins (NY)
     Conaway
     Connolly
     Conyers
     Cook
     Cooper
     Costa
     Cotton
     Courtney
     Cramer
     Crawford
     Crenshaw
     Crowley
     Cuellar
     Culberson
     Cummings
     Daines
     Davis (CA)
     Davis, Danny
     Davis, Rodney
     DeFazio
     DeGette
     Delaney
     DeLauro
     DelBene
     Denham
     Dent
     DeSantis
     DesJarlais
     Deutch
     Diaz-Balart
     Dingell
     Doggett
     Doyle
     Duckworth
     Duffy
     Duncan (SC)
     Duncan (TN)
     Edwards
     Ellison
     Ellmers
     Engel
     Enyart
     Eshoo
     Esty
     Farenthold
     Farr
     Fattah
     Fincher
     Fitzpatrick
     Fleischmann
     Fleming
     Flores
     Forbes
     Fortenberry
     Foster
     Foxx
     Frankel (FL)
     Franks (AZ)
     Frelinghuysen
     Fudge
     Gabbard
     Gallego
     Garamendi
     Garcia
     Gardner
     Garrett
     Gerlach
     Gibbs
     Gibson
     Gingrey (GA)
     Gohmert
     Goodlatte
     Gosar
     Gowdy
     Granger
     Graves (GA)
     Graves (MO)
     Grayson
     Green, Al
     Green, Gene
     Griffin (AR)
     Griffith (VA)
     Grijalva
     Grimm
     Guthrie
     Gutierrez
     Hahn
     Hall
     Hanabusa
     Hanna
     Harper
     Harris
     Hartzler
     Hastings (FL)
     Hastings (WA)
     Heck (NV)
     Heck (WA)
     Hensarling
     Herrera Beutler
     Higgins
     Himes
     Hinojosa
     Holt
     Honda
     Horsford
     Hoyer
     Hudson
     Huelskamp
     Huffman
     Huizenga (MI)
     Hultgren
     Hunter
     Hurt
     Israel
     Issa
     Jackson Lee
     Jeffries
     Jenkins
     Johnson (GA)
     Johnson (OH)
     Johnson, E. B.
     Johnson, Sam
     Jones
     Jordan
     Joyce
     Kaptur
     Kelly (IL)
     Kelly (PA)
     Kildee
     Kilmer
     Kind
     King (IA)
     King (NY)
     Kingston
     Kinzinger (IL)
     Kirkpatrick
     Kline
     Kuster
     Labrador
     LaMalfa
     Lamborn
     Lance
     Langevin
     Lankford
     Larsen (WA)
     Larson (CT)
     Latham
     Latta
     Lee (CA)
     Levin
     Lewis
     Lipinski
     LoBiondo
     Loebsack
     Lofgren
     Long
     Lowenthal
     Lowey
     Lucas
     Luetkemeyer
     Lujan Grisham (NM)
     Lujan, Ben Ray (NM)
     Lummis
     Maffei
     Maloney, Carolyn
     Maloney, Sean
     Marchant
     Marino
     Massie
     Matheson
     Matsui
     McCarthy (CA)
     McCarthy (NY)
     McCaul
     McClintock
     McCollum
     McDermott
     McHenry
     McIntyre
     McKeon
     McKinley
     McMorris Rodgers
     McNerney
     Meadows
     Meehan
     Meeks
     Meng
     Messer
     Mica
     Michaud
     Miller (FL)
     Miller (MI)
     Miller, George
     Moore
     Moran
     Mullin
     Mulvaney
     Murphy (FL)
     Murphy (PA)
     Nadler
     Napolitano
     Negrete McLeod
     Neugebauer
     Noem
     Nolan
     Nunes
     Nunnelee
     O'Rourke
     Olson
     Owens
     Palazzo
     Pallone
     Pascrell
     Pastor (AZ)
     Paulsen
     Payne
     Pearce
     Pelosi
     Perlmutter
     Perry
     Peters (CA)
     Peters (MI)
     Peterson
     Petri
     Pingree (ME)
     Pittenger
     Pitts
     Pocan
     Poe (TX)
     Polis
     Pompeo
     Posey
     Price (GA)
     Price (NC)
     Quigley
     Radel
     Rahall
     Rangel
     Reed
     Reichert
     Renacci
     Ribble
     Rice (SC)
     Richmond
     Rigell
     Roby
     Roe (TN)
     Rogers (AL)
     Rogers (KY)
     Rogers (MI)
     Rohrabacher
     Rokita
     Rooney
     Ros-Lehtinen
     Roskam
     Ross
     Rothfus
     Roybal-Allard
     Royce
     Ruiz
     Runyan
     Ruppersberger
     Rush
     Ryan (OH)
     Ryan (WI)
     Salmon
     Sanchez, Linda T.
     Sanchez, Loretta
     Sarbanes
     Scalise
     Schakowsky
     Schiff
     Schneider
     Schock
     Schrader
     Schwartz
     Schweikert
     Scott (VA)
     Scott, Austin
     Scott, David
     Sensenbrenner
     Serrano
     Sessions
     Sewell (AL)
     Sherman
     Shuster
     Simpson
     Sinema
     Sires
     Slaughter
     Smith (NE)
     Smith (NJ)
     Smith (TX)
     Smith (WA)
     Southerland
     Speier
     Stewart
     Stivers
     Stockman
     Stutzman
     Swalwell (CA)
     Takano
     Terry
     Thompson (CA)
     Thompson (MS)
     Thompson (PA)
     Thornberry
     Tiberi
     Tipton
     Titus
     Tonko
     Turner
     Upton
     Valadao
     Van Hollen
     Vargas
     Veasey
     Vela
     Visclosky
     Wagner
     Walberg
     Walden
     Walorski
     Walz
     Wasserman Schultz
     Waters
     Waxman
     Weber (TX)
     Webster (FL)
     Welch
     Wenstrup
     Westmoreland
     Whitfield
     Williams
     Wilson (FL)
     Wilson (SC)
     Wittman
     Wolf
     Womack
     Woodall
     Yarmuth
     Yoder
     Yoho
     Young (AK)
     Young (FL)
     Young (IN)

                             NOT VOTING--19

     Bachmann
     Blackburn
     Capuano
     Cardenas
     Holding
     Keating
     Kennedy
     Lynch
     Markey
     McGovern
     Miller, Gary
     Neal
     Nugent
     Shea-Porter
     Shimkus
     Tierney
     Tsongas
     Velazquez
     Watt

                              {time}  1221

  So the amendment was agreed to.
  The result of the vote was announced as above recorded.


                    Amendment Offered by Mr. McCaul

  The Acting CHAIR. The unfinished business is the demand for a 
recorded vote on the amendment offered by the gentleman from Texas (Mr. 
McCaul) on which further proceedings were postponed and on which the 
ayes prevailed by voice vote.
  The Clerk will redesignate the amendment.
  The Clerk redesignated the amendment.


                             Recorded Vote

  The Acting CHAIR. A recorded vote has been demanded.
  A recorded vote was ordered.
  The Acting CHAIR. This will be a 2-minute vote.
  The vote was taken by electronic device, and there were--ayes 409, 
noes 5, not voting 18, as follows:

                             [Roll No. 115]

                               AYES--409

     Aderholt
     Alexander
     Amash
     Amodei
     Andrews
     Bachus
     Barber
     Barletta
     Barr
     Barrow (GA)
     Barton
     Bass
     Beatty
     Becerra
     Bera (CA)
     Bilirakis
     Bishop (GA)
     Bishop (NY)
     Bishop (UT)
     Black
     Blumenauer
     Bonamici
     Bonner
     Boustany
     Brady (PA)
     Brady (TX)
     Braley (IA)
     Bridenstine
     Brooks (AL)
     Brooks (IN)
     Broun (GA)
     Brown (FL)
     Brownley (CA)
     Buchanan
     Bucshon
     Burgess
     Bustos
     Butterfield
     Calvert
     Camp
     Campbell
     Cantor
     Capito
     Capps
     Cardenas
     Carney
     Carson (IN)
     Carter
     Cartwright
     Cassidy
     Castor (FL)
     Castro (TX)
     Chabot
     Chaffetz
     Chu
     Cicilline
     Clarke
     Clay
     Cleaver
     Clyburn
     Coble
     Coffman
     Cohen
     Cole
     Collins (GA)
     Collins (NY)
     Conaway
     Connolly
     Conyers
     Cook
     Cooper
     Costa
     Cotton
     Courtney
     Cramer
     Crawford
     Crenshaw
     Crowley
     Cuellar
     Culberson
     Cummings
     Daines
     Davis (CA)
     Davis, Danny
     Davis, Rodney
     DeFazio
     DeGette
     Delaney
     DeLauro
     DelBene
     Denham
     Dent
     DeSantis
     DesJarlais
     Deutch
     Diaz-Balart
     Dingell
     Doggett
     Doyle
     Duckworth
     Duffy
     Duncan (SC)
     Duncan (TN)
     Edwards
     Ellison
     Ellmers
     Engel
     Enyart
     Eshoo
     Esty
     Farenthold
     Farr
     Fattah
     Fincher
     Fitzpatrick
     Fleischmann
     Fleming
     Flores
     Fortenberry
     Foster
     Foxx
     Frankel (FL)
     Franks (AZ)
     Frelinghuysen
     Fudge
     Gabbard
     Gallego
     Garamendi
     Garcia
     Gardner
     Garrett
     Gerlach
     Gibbs
     Gibson
     Gingrey (GA)
     Gohmert
     Goodlatte
     Gosar
     Gowdy
     Granger
     Graves (GA)
     Graves (MO)
     Grayson
     Green, Al
     Green, Gene
     Griffin (AR)
     Griffith (VA)
     Grijalva
     Grimm
     Guthrie
     Gutierrez
     Hahn
     Hall
     Hanabusa
     Hanna
     Harper
     Harris
     Hartzler
     Hastings (FL)
     Hastings (WA)
     Heck (NV)
     Heck (WA)
     Hensarling
     Herrera Beutler
     Higgins
     Himes
     Hinojosa
     Holt
     Honda
     Horsford
     Hoyer
     Hudson
     Huelskamp
     Huffman
     Huizenga (MI)
     Hultgren
     Hunter
     Hurt
     Israel
     Issa
     Jackson Lee
     Jeffries
     Jenkins
     Johnson (GA)
     Johnson (OH)
     Johnson, E. B.
     Johnson, Sam
     Jones
     Jordan
     Joyce
     Kaptur
     Kelly (IL)
     Kelly (PA)
     Kildee
     Kilmer
     Kind
     King (IA)
     King (NY)
     Kingston
     Kinzinger (IL)
     Kirkpatrick
     Kline
     Kuster
     Labrador
     LaMalfa
     Lamborn
     Lance
     Langevin
     Lankford
     Larsen (WA)
     Larson (CT)
     Latham
     Latta
     Lee (CA)
     Levin
     Lewis
     Lipinski
     LoBiondo
     Loebsack
     Lofgren
     Long
     Lowenthal
     Lowey
     Lucas
     Luetkemeyer
     Lujan Grisham (NM)

[[Page H2142]]


     Lujan, Ben Ray (NM)
     Lummis
     Maffei
     Maloney, Carolyn
     Maloney, Sean
     Marchant
     Marino
     Massie
     Matheson
     Matsui
     McCarthy (CA)
     McCarthy (NY)
     McCaul
     McClintock
     McCollum
     McDermott
     McHenry
     McIntyre
     McKeon
     McKinley
     McMorris Rodgers
     McNerney
     Meadows
     Meehan
     Meeks
     Meng
     Messer
     Mica
     Michaud
     Miller (FL)
     Miller (MI)
     Miller, George
     Moore
     Moran
     Mullin
     Mulvaney
     Murphy (FL)
     Murphy (PA)
     Nadler
     Napolitano
     Negrete McLeod
     Neugebauer
     Noem
     Nolan
     Nunes
     Nunnelee
     O'Rourke
     Olson
     Owens
     Palazzo
     Pallone
     Pascrell
     Pastor (AZ)
     Paulsen
     Payne
     Pearce
     Pelosi
     Perlmutter
     Perry
     Peters (CA)
     Peters (MI)
     Peterson
     Petri
     Pingree (ME)
     Pittenger
     Pitts
     Pocan
     Poe (TX)
     Polis
     Pompeo
     Price (GA)
     Price (NC)
     Quigley
     Radel
     Rahall
     Rangel
     Reed
     Reichert
     Renacci
     Ribble
     Rice (SC)
     Richmond
     Rigell
     Roby
     Roe (TN)
     Rogers (AL)
     Rogers (KY)
     Rogers (MI)
     Rohrabacher
     Rokita
     Rooney
     Ros-Lehtinen
     Roskam
     Ross
     Rothfus
     Roybal-Allard
     Royce
     Ruiz
     Runyan
     Ruppersberger
     Rush
     Ryan (OH)
     Ryan (WI)
     Salmon
     Sanchez, Linda T.
     Sanchez, Loretta
     Sarbanes
     Scalise
     Schakowsky
     Schiff
     Schneider
     Schock
     Schrader
     Schwartz
     Schweikert
     Scott (VA)
     Scott, Austin
     Scott, David
     Serrano
     Sessions
     Sewell (AL)
     Sherman
     Shuster
     Simpson
     Sinema
     Sires
     Slaughter
     Smith (NE)
     Smith (NJ)
     Smith (TX)
     Smith (WA)
     Southerland
     Speier
     Stewart
     Stivers
     Stockman
     Stutzman
     Swalwell (CA)
     Takano
     Terry
     Thompson (CA)
     Thompson (MS)
     Thompson (PA)
     Thornberry
     Tiberi
     Tipton
     Titus
     Tonko
     Turner
     Upton
     Valadao
     Van Hollen
     Vargas
     Veasey
     Vela
     Visclosky
     Wagner
     Walberg
     Walden
     Walorski
     Walz
     Wasserman Schultz
     Waters
     Watt
     Waxman
     Weber (TX)
     Webster (FL)
     Welch
     Wenstrup
     Westmoreland
     Whitfield
     Williams
     Wilson (FL)
     Wilson (SC)
     Wittman
     Womack
     Woodall
     Yarmuth
     Yoder
     Yoho
     Young (AK)
     Young (FL)
     Young (IN)

                                NOES--5

     Benishek
     Bentivolio
     Posey
     Sensenbrenner
     Wolf

                             NOT VOTING--18

     Bachmann
     Blackburn
     Capuano
     Forbes
     Holding
     Keating
     Kennedy
     Lynch
     Markey
     McGovern
     Miller, Gary
     Neal
     Nugent
     Shea-Porter
     Shimkus
     Tierney
     Tsongas
     Velazquez

                              {time}  1227

  So the amendment was agreed to.
  The result of the vote was announced as above recorded.
  The Acting CHAIR. The question is on the amendment in the nature of a 
substitute, as amended.
  The amendment was agreed to.
  The Acting CHAIR. Under the rule, the Committee rises.
  Accordingly, the Committee rose; and the Speaker pro tempore (Mr. 
Webster) having assumed the chair, Mr. Yoder, Acting Chair of the 
Committee of the Whole House on the state of the Union, reported that 
that Committee, having had under consideration the bill (H.R. 624) to 
provide for the sharing of certain cyber threat intelligence and cyber 
threat information between the intelligence community and cybersecurity 
entities, and for other purposes, and, pursuant to House Resolution 
164, he reported the bill back to the House with an amendment adopted 
in the Committee of the Whole.
  The SPEAKER pro tempore. Under the rule, the previous question is 
ordered.
  Is a separate vote demanded on any amendment to the amendment 
reported from the Committee of the Whole?
  If not, the question is on the amendment in the nature of a 
substitute, as amended.
  The amendment was agreed to.
  The SPEAKER pro tempore. The question is on the engrossment and third 
reading of the bill.
  The bill was ordered to be engrossed and read a third time, and was 
read the third time.

                              {time}  1230


                           Motion to Recommit

  Mr. PERLMUTTER. Mr. Speaker, I have a motion to recommit at the desk.
  The SPEAKER pro tempore (Mr. Yoder). Is the gentleman opposed to the 
bill?
  Mr. PERLMUTTER. In its current form, I am.
  The SPEAKER pro tempore. The Clerk will report the motion to 
recommit.
  The Clerk read as follows:

    Mr. Perlmutter moves to recommit the bill, H.R. 624, to the 
Permanent Select Committee on Intelligence with instructions to report 
the same back to the House forthwith with the following amendments:

       At the end of the bill, add the following new section:

     SEC. __. PROTECTING THE PRIVACY OF INTERNET PASSWORDS AND THE 
                   CREATIVITY OF THE INTERNET.

       Nothing in this Act or the amendments made by this Act 
     shall be construed to--
       (1) permit an employer, a prospective employer, or the 
     Federal Government to require the disclosure of a 
     confidential password for a social networking website or a 
     personal account of an employee or job applicant without a 
     court order; or
       (2) permit the Federal Government to establish a mechanism 
     to control United States citizens' access to and use of the 
     Internet through the creation of a national Internet firewall 
     similar to the ``Great Internet Firewall of China'', as 
     determined by the Director of the National Intelligence.
       In section 2(c)(1)(F) of the bill (as inserted by the 
     amendment offered by Mr. McCaul), strike ``; and'' and insert 
     a semicolon.
       In section 2(c)(1)(G) of the bill (as inserted by the 
     amendment offered by Mr. McCaul), strike the period and 
     insert a semicolon.
       At the end of section 2(c)(1) of the bill (as inserted by 
     the amendment offered by Mr. McCaul), add the following new 
     subparagraphs:
       (H) the number of Americans who have--
       (i) been required by employers, prospective employers, or 
     the Federal Government to release confidential passwords for 
     social networking websites; and
       (ii) had personal information released to the Federal 
     Government under this section or obtained in connection with 
     a cybersecurity breach; and
       (I) the impact of the information that has been released or 
     obtained as referred to in subparagraph (H) on privacy, 
     electronic commerce, Internet usage, and online content.

  The SPEAKER pro tempore. The gentleman from Colorado is recognized 
for 5 minutes.


                         Parliamentary Inquiry

  Mr. PERLMUTTER. Mr. Speaker, I have a parliamentary inquiry.
  The SPEAKER pro tempore. The gentleman will state the inquiry.
  Mr. PERLMUTTER. Is it not the case that if my amendment, if this 
motion to recommit is adopted, the House would immediately vote on 
final passage of this bill with the motion to recommit, this amendment, 
included?
  The SPEAKER pro tempore. If a motion to recommit with forthwith 
instructions is adopted, the amendment is reported by the chair of the 
committee and is immediately before the House.
  Mr. PERLMUTTER. Mr. Speaker, I'm pleased to offer this final 
amendment to this bill. It does not kill the bill or send it back to 
the committee. If adopted, as the Speaker just mentioned, it would move 
immediately to final passage.
  Now, I want to just take a moment, because I know everybody was 
listening very closely to the Clerk's reading of the amendment a few 
minutes ago, but there are two paragraphs that I think are very 
important--they're very simple and they're very direct--about privacy, 
individuals' right to privacy, their reasonable expectation of privacy.
  And I would just say, my friend, Mr. Rogers, stated, in discussing 
and debating the bill as a whole, it is paramount to protect an 
individual's right to privacy, and I couldn't agree with him more.
  So this amendment says nothing in this act or the amendments made by 
this act shall be construed to:
  One, permit an employer, a prospective employer, or the Federal 
Government to require the disclosure of a confidential password for a 
social networking Web site or a personal account of an employee or job 
applicant without a court order; or
  Two, permit the Federal Government to establish a mechanism to 
control a United States citizen's access to and use of the Internet 
through the creation of a national Internet firewall, similar to the 
great Internet firewall of China, as determined by the Director of 
National Intelligence.
  So boil that down, those are two pretty direct and simple paragraphs. 
Boil it down, as a condition of employment, you can't be made to give 
up a password to your Twitter account, your Facebook account, your 
LinkedIn account, your other social media types of accounts.
  Now, have we done something like this in the past? Absolutely. And 
I'd remind the Members that in the eighties,

[[Page H2143]]

there was a requirement, or there was an effort on the part of 
employers to get people to take polygraph tests, to take lie detector 
tests.
  We, here in the Congress, said that's just not going to be a proper 
condition of employment. You can do background checks; you can ask for 
references; you can do a number of things, but we're not going to allow 
lie detector tests as a condition of employment. We said an employer 
shall not require, request, suggest, or cause an employee or 
prospective employee to take or submit to any lie detector test as a 
condition of employment.
  Now, this thing has exploded as social media has exploded so that 
people are being asked for their private passwords to these various 
social media networks. And I would refer the House to an article in 
Yahoo! News from last year, which says, ``Employers ask jobseekers for 
Facebook passwords.''
  A gentleman was seeking employment as a consultant in New York. The 
H.R. person wanted to see his profile, asked him for his password, for 
instance. He said no. He was no longer allowed to apply for that 
particular job.
  A law professor at George Washington University here said, ``It's 
akin to requiring someone's house keys,'' said the law professor and 
former Federal prosecutor, who calls it ``an egregious violation of 
privacy.''
  This is a very simple amendment that really does two things: it helps 
the individual protect his right to privacy, and it doesn't allow the 
employer to impersonate that particular employee when other people are 
interacting with that person across social media platforms. So for two 
reasons: one, that an individual's right to privacy shouldn't be 
breached just because he's seeking employment; and, two, the employer 
shouldn't be in a position to impersonate that individual who's seeking 
a job. It's very clear. We've done it with respect to polygraph, lie 
detector tests. We should do it now.
  This is an amendment that, whether you're a Democrat or a Republican, 
should be part of our law. And so with that, Mr. Speaker, I ask for a 
``yes'' vote on this final amendment to the bill.
  I yield back the balance of my time.
  Mr. ROGERS of Michigan. Mr. Speaker, I rise in opposition.
  The SPEAKER pro tempore. The gentleman is recognized for 5 minutes.
  Mr. ROGERS of Michigan. You know, it's the time-honored tradition of 
this House that we allow the minority of whomever is in the majority to 
have a motion to recommit, and it's a legislative instrument designed 
to draw that very bright line down the center of this Chamber. It tends 
to be music to your ears on the oral presentation and poison to the 
paper when you get to the details.
  I appreciate the gentleman's efforts. Well done, sir; I tell you 
that.
  Clearly, this belongs in employer-employee law. I'm sure the Labor 
Committee, Mr. Kline, would be delighted to deal with this very serious 
issue. It doesn't comport to our language, has nothing to do with our 
bill. But I'll take this opportunity again to say thank you for that 
very bright line in the center of the aisle, to commend all of the 
folks on both sides of this aisle who have come together on a bill that 
is so important to our national security. I'm going to give you a 
couple of quick examples.
  American Semiconductor, a company that lost its intellectual property 
to China, theft of China. The President one time called American 
Semiconductor a model of cooperation with China.

                              {time}  1240

  Their partner in China stole their intellectual property, canceled 
their contracts, and almost put them out of business. They were worth 
$1.8 billion. Now they're worth $170 million. Their stock price is down 
90 percent, from a $44 high to just $2 today. They had to lay off 70 
percent of their staff.
  That's real. Those are real people losing real jobs to intellectual 
property theft as we speak.
  The credit cards in your pockets will get hit 300,000 times by people 
trying to steal that information today, alone. Each and every one of 
them.
  There's an unnamed large manufacturing company here in the United 
States. Through cyber espionage, they lost a particular product. They 
stole the blueprints, took it back to China, and repurposed it to 
compete in the global market against this particular company. Their 
estimate: 20,000 manufacturing jobs lost.
  This is as serious an issue as we are not prepared to handle as 
Americans, and it is happening every minute of every single day.
  When you look at the weight of those issues of the people before us 
in this Chamber and what they had to deal with--people like Adams and 
Henry and Madison--it was the size of their politics that tipped the 
scale for making really hard, difficult decisions and moving on. I'm 
going to challenge everybody in this Chamber today to not have those 
small, petty politics about what gets done and doesn't get done, about 
what I wanted in there and didn't get in there, about how my feelings 
got hurt or didn't get hurt.
  There are Americans suffering under the weight of loss of 
opportunity. And those are middle class jobs. That's one rung on the 
ladder that's taken out for any hope for moving up and prosperity in 
this country.
  We have a constitutional obligation to defend this Nation. We have 
done it in a way that doesn't allow the government to meddle with the 
Internet. It protects privacy, it protects civil liberties, and it has 
the government not even touching the Internet. This is the answer to 
empower cyber information sharing, to protect this Nation, to allow 
those companies to protect themselves, and move on to economic 
prosperity. If you want to take a shot across China's bow, this is the 
answer.
  Reject this motion to recommit and let's pass this bill.
  I yield back the balance of my time.
  The SPEAKER pro tempore. Without objection, the previous question is 
ordered on the motion to recommit.
  There was no objection.
  The SPEAKER pro tempore. The question is on the motion to recommit.
  The question was taken; and the Speaker pro tempore announced that 
the noes appeared to have it.


                             Recorded Vote

  Mr. PERLMUTTER. Mr. Speaker, I demand a recorded vote.
  A recorded vote was ordered.
  The SPEAKER pro tempore. Pursuant to clause 8 and clause 9 of rule 
XX, this 5-minute vote on the motion to recommit will be followed by 5-
minute votes on passage of H.R. 624, if ordered, and agreeing to the 
Speaker's approval of the Journal, if ordered.
  The vote was taken by electronic device, and there were--ayes 189, 
noes 224, not voting 19, as follows:

                             [Roll No. 116]

                               AYES--189

     Andrews
     Barber
     Barrow (GA)
     Bass
     Beatty
     Becerra
     Bera (CA)
     Bishop (NY)
     Blumenauer
     Bonamici
     Brady (PA)
     Braley (IA)
     Brown (FL)
     Brownley (CA)
     Bustos
     Butterfield
     Capps
     Cardenas
     Carney
     Carson (IN)
     Cartwright
     Castor (FL)
     Castro (TX)
     Cicilline
     Clarke
     Clay
     Cleaver
     Clyburn
     Cohen
     Connolly
     Conyers
     Cooper
     Costa
     Courtney
     Crowley
     Cuellar
     Cummings
     Davis (CA)
     Davis, Danny
     DeFazio
     DeGette
     Delaney
     DeLauro
     DelBene
     Deutch
     Dingell
     Doggett
     Doyle
     Duckworth
     Edwards
     Ellison
     Engel
     Enyart
     Eshoo
     Esty
     Farr
     Fattah
     Foster
     Frankel (FL)
     Fudge
     Gabbard
     Gallego
     Garamendi
     Garcia
     Grayson
     Green, Al
     Green, Gene
     Grijalva
     Gutierrez
     Hahn
     Hanabusa
     Hastings (FL)
     Heck (WA)
     Higgins
     Himes
     Hinojosa
     Holt
     Honda
     Horsford
     Hoyer
     Huffman
     Israel
     Jackson Lee
     Jeffries
     Johnson (GA)
     Johnson, E. B.
     Jones
     Kaptur
     Kelly (IL)
     Kildee
     Kilmer
     Kind
     Kirkpatrick
     Kuster
     Langevin
     Larsen (WA)
     Larson (CT)
     Lee (CA)
     Levin
     Lewis
     Lipinski
     Loebsack
     Lofgren
     Lowenthal
     Lowey
     Lujan Grisham (NM)
     Lujan, Ben Ray (NM)
     Maffei
     Maloney, Carolyn
     Maloney, Sean
     Matheson
     Matsui
     McCarthy (NY)
     McCollum
     McDermott
     McIntyre
     McNerney
     Meeks
     Meng
     Michaud
     Miller, George
     Moore
     Moran
     Murphy (FL)
     Nadler
     Napolitano
     Negrete McLeod
     Nolan
     O'Rourke
     Owens
     Pallone
     Pascrell
     Pastor (AZ)
     Payne
     Pelosi
     Perlmutter
     Peters (CA)
     Peters (MI)
     Peterson
     Pingree (ME)
     Pocan
     Polis
     Price (NC)
     Quigley
     Rahall
     Rangel
     Richmond
     Roybal-Allard
     Ruiz
     Ruppersberger
     Rush
     Ryan (OH)
     Sanchez, Linda T.
     Sanchez, Loretta
     Sarbanes
     Schakowsky
     Schiff
     Schneider
     Schrader
     Schwartz
     Scott (VA)
     Scott, David
     Serrano
     Sewell (AL)
     Sherman
     Sinema
     Sires
     Slaughter
     Smith (WA)
     Speier

[[Page H2144]]


     Swalwell (CA)
     Takano
     Thompson (CA)
     Thompson (MS)
     Titus
     Tonko
     Van Hollen
     Vargas
     Veasey
     Vela
     Visclosky
     Walz
     Wasserman Schultz
     Waters
     Watt
     Waxman
     Welch
     Wilson (FL)
     Yarmuth

                               NOES--224

     Aderholt
     Alexander
     Amash
     Amodei
     Bachus
     Barletta
     Barr
     Barton
     Benishek
     Bentivolio
     Bilirakis
     Bishop (UT)
     Black
     Bonner
     Boustany
     Brady (TX)
     Bridenstine
     Brooks (AL)
     Brooks (IN)
     Broun (GA)
     Buchanan
     Bucshon
     Burgess
     Calvert
     Camp
     Campbell
     Cantor
     Capito
     Carter
     Cassidy
     Chabot
     Chaffetz
     Coble
     Coffman
     Cole
     Collins (GA)
     Collins (NY)
     Conaway
     Cook
     Cotton
     Cramer
     Crawford
     Crenshaw
     Culberson
     Daines
     Davis, Rodney
     Denham
     Dent
     DeSantis
     DesJarlais
     Diaz-Balart
     Duffy
     Duncan (SC)
     Duncan (TN)
     Ellmers
     Farenthold
     Fincher
     Fitzpatrick
     Fleischmann
     Fleming
     Flores
     Forbes
     Fortenberry
     Foxx
     Franks (AZ)
     Frelinghuysen
     Gardner
     Garrett
     Gerlach
     Gibbs
     Gibson
     Gingrey (GA)
     Gohmert
     Goodlatte
     Gosar
     Gowdy
     Granger
     Graves (GA)
     Graves (MO)
     Griffin (AR)
     Griffith (VA)
     Grimm
     Guthrie
     Hall
     Hanna
     Harper
     Harris
     Hartzler
     Hastings (WA)
     Heck (NV)
     Hensarling
     Herrera Beutler
     Hudson
     Huelskamp
     Huizenga (MI)
     Hultgren
     Hunter
     Hurt
     Issa
     Jenkins
     Johnson (OH)
     Johnson, Sam
     Jordan
     Joyce
     Kelly (PA)
     King (IA)
     King (NY)
     Kingston
     Kinzinger (IL)
     Kline
     Labrador
     LaMalfa
     Lamborn
     Lance
     Lankford
     Latham
     Latta
     LoBiondo
     Long
     Lucas
     Luetkemeyer
     Lummis
     Marchant
     Marino
     Massie
     McCarthy (CA)
     McCaul
     McClintock
     McHenry
     McKeon
     McKinley
     McMorris Rodgers
     Meadows
     Meehan
     Messer
     Mica
     Miller (FL)
     Miller (MI)
     Mullin
     Mulvaney
     Murphy (PA)
     Neugebauer
     Noem
     Nunes
     Nunnelee
     Olson
     Palazzo
     Paulsen
     Pearce
     Perry
     Petri
     Pittenger
     Pitts
     Poe (TX)
     Pompeo
     Posey
     Price (GA)
     Radel
     Reed
     Reichert
     Renacci
     Ribble
     Rice (SC)
     Rigell
     Roby
     Roe (TN)
     Rogers (AL)
     Rogers (KY)
     Rogers (MI)
     Rohrabacher
     Rokita
     Rooney
     Ros-Lehtinen
     Roskam
     Ross
     Rothfus
     Royce
     Runyan
     Ryan (WI)
     Salmon
     Scalise
     Schock
     Schweikert
     Scott, Austin
     Sensenbrenner
     Sessions
     Shuster
     Simpson
     Smith (NE)
     Smith (NJ)
     Smith (TX)
     Southerland
     Stewart
     Stivers
     Stockman
     Stutzman
     Terry
     Thompson (PA)
     Thornberry
     Tiberi
     Tipton
     Turner
     Upton
     Valadao
     Wagner
     Walberg
     Walden
     Walorski
     Weber (TX)
     Webster (FL)
     Wenstrup
     Westmoreland
     Whitfield
     Williams
     Wilson (SC)
     Wittman
     Wolf
     Womack
     Woodall
     Yoder
     Yoho
     Young (AK)
     Young (FL)
     Young (IN)

                             NOT VOTING--19

     Bachmann
     Bishop (GA)
     Blackburn
     Capuano
     Chu
     Holding
     Keating
     Kennedy
     Lynch
     Markey
     McGovern
     Miller, Gary
     Neal
     Nugent
     Shea-Porter
     Shimkus
     Tierney
     Tsongas
     Velazquez

                              {time}  1250

  So the motion to recommit was rejected.
  The result of the vote was announced as above recorded.
  The SPEAKER pro tempore. The question is on the passage of the bill.
  The question was taken; and the Speaker pro tempore announced that 
the ayes appeared to have it.
  Mr. RUPPERSBERGER. Mr. Speaker, on that I demand the yeas and nays.
  The yeas and nays were ordered.
  The SPEAKER pro tempore. This will be a 5-minute vote.
  The vote was taken by electronic device, and there were--yeas 288, 
nays 127, not voting 17, as follows:

                             [Roll No. 117]

                               YEAS--288

     Aderholt
     Alexander
     Amodei
     Bachus
     Barber
     Barletta
     Barr
     Barrow (GA)
     Barton
     Beatty
     Benishek
     Bera (CA)
     Bilirakis
     Bishop (GA)
     Bishop (NY)
     Black
     Bonner
     Boustany
     Brady (TX)
     Brooks (AL)
     Brooks (IN)
     Brown (FL)
     Brownley (CA)
     Buchanan
     Bucshon
     Burgess
     Bustos
     Butterfield
     Calvert
     Camp
     Campbell
     Cantor
     Capito
     Cardenas
     Carney
     Carter
     Cassidy
     Castor (FL)
     Chabot
     Chaffetz
     Clarke
     Clay
     Cleaver
     Clyburn
     Coble
     Coffman
     Cole
     Collins (GA)
     Collins (NY)
     Conaway
     Connolly
     Cook
     Cooper
     Costa
     Cotton
     Cramer
     Crawford
     Crenshaw
     Cuellar
     Culberson
     Daines
     Denham
     Dent
     DesJarlais
     Deutch
     Diaz-Balart
     Dingell
     Duckworth
     Duffy
     Duncan (TN)
     Ellmers
     Enyart
     Farenthold
     Fincher
     Fitzpatrick
     Fleischmann
     Flores
     Forbes
     Fortenberry
     Foster
     Foxx
     Frankel (FL)
     Franks (AZ)
     Frelinghuysen
     Fudge
     Gallego
     Garamendi
     Garcia
     Gardner
     Gerlach
     Gibbs
     Gingrey (GA)
     Goodlatte
     Gowdy
     Granger
     Graves (GA)
     Graves (MO)
     Green, Al
     Green, Gene
     Griffin (AR)
     Griffith (VA)
     Grimm
     Guthrie
     Gutierrez
     Hanabusa
     Hanna
     Harper
     Harris
     Hartzler
     Hastings (FL)
     Hastings (WA)
     Heck (NV)
     Heck (WA)
     Hensarling
     Higgins
     Himes
     Horsford
     Hoyer
     Hudson
     Huizenga (MI)
     Hultgren
     Hunter
     Hurt
     Israel
     Issa
     Jeffries
     Jenkins
     Johnson (OH)
     Johnson, E. B.
     Johnson, Sam
     Jordan
     Joyce
     Kaptur
     Kelly (IL)
     Kelly (PA)
     Kilmer
     Kind
     King (IA)
     King (NY)
     Kinzinger (IL)
     Kirkpatrick
     Kline
     Kuster
     LaMalfa
     Lamborn
     Lance
     Langevin
     Lankford
     Larsen (WA)
     Latham
     Latta
     Lipinski
     LoBiondo
     Long
     Lucas
     Luetkemeyer
     Lujan Grisham (NM)
     Lujan, Ben Ray (NM)
     Lummis
     Maffei
     Maloney, Sean
     Marino
     Matheson
     McCarthy (CA)
     McCarthy (NY)
     McCaul
     McHenry
     McIntyre
     McKeon
     McKinley
     McMorris Rodgers
     Meehan
     Meeks
     Meng
     Messer
     Mica
     Miller (FL)
     Miller (MI)
     Moran
     Mullin
     Mulvaney
     Murphy (FL)
     Murphy (PA)
     Neugebauer
     Noem
     Nunes
     Nunnelee
     Olson
     Owens
     Palazzo
     Pastor (AZ)
     Paulsen
     Payne
     Pearce
     Perlmutter
     Perry
     Peters (CA)
     Peterson
     Petri
     Pittenger
     Pitts
     Poe (TX)
     Pompeo
     Price (GA)
     Quigley
     Radel
     Rahall
     Rangel
     Reed
     Reichert
     Renacci
     Ribble
     Rice (SC)
     Richmond
     Roby
     Roe (TN)
     Rogers (AL)
     Rogers (KY)
     Rogers (MI)
     Rokita
     Rooney
     Ros-Lehtinen
     Roskam
     Ross
     Rothfus
     Royce
     Ruiz
     Runyan
     Ruppersberger
     Ryan (WI)
     Salmon
     Sanchez, Loretta
     Scalise
     Schneider
     Schock
     Schrader
     Schwartz
     Schweikert
     Scott, Austin
     Scott, David
     Sessions
     Sewell (AL)
     Shuster
     Simpson
     Sinema
     Sires
     Smith (NE)
     Smith (NJ)
     Smith (TX)
     Smith (WA)
     Southerland
     Stewart
     Stivers
     Stutzman
     Swalwell (CA)
     Terry
     Thompson (CA)
     Thompson (MS)
     Thompson (PA)
     Thornberry
     Tiberi
     Tipton
     Titus
     Turner
     Upton
     Valadao
     Vargas
     Veasey
     Vela
     Wagner
     Walberg
     Walden
     Walorski
     Weber (TX)
     Webster (FL)
     Wenstrup
     Westmoreland
     Whitfield
     Williams
     Wilson (SC)
     Wittman
     Wolf
     Womack
     Woodall
     Yoder
     Young (AK)
     Young (FL)
     Young (IN)

                               NAYS--127

     Amash
     Andrews
     Bass
     Becerra
     Bentivolio
     Bishop (UT)
     Blumenauer
     Bonamici
     Brady (PA)
     Braley (IA)
     Bridenstine
     Broun (GA)
     Capps
     Carson (IN)
     Cartwright
     Castro (TX)
     Chu
     Cicilline
     Cohen
     Conyers
     Courtney
     Crowley
     Cummings
     Davis (CA)
     Davis, Danny
     Davis, Rodney
     DeFazio
     DeGette
     Delaney
     DeLauro
     DelBene
     DeSantis
     Doggett
     Doyle
     Duncan (SC)
     Edwards
     Ellison
     Engel
     Eshoo
     Esty
     Farr
     Fattah
     Fleming
     Gabbard
     Garrett
     Gibson
     Gohmert
     Gosar
     Grayson
     Grijalva
     Hahn
     Hall
     Herrera Beutler
     Hinojosa
     Holt
     Honda
     Huelskamp
     Huffman
     Jackson Lee
     Johnson (GA)
     Jones
     Kildee
     Kingston
     Labrador
     Larson (CT)
     Lee (CA)
     Levin
     Lewis
     Loebsack
     Lofgren
     Lowenthal
     Lowey
     Maloney, Carolyn
     Marchant
     Massie
     Matsui
     McClintock
     McCollum
     McDermott
     McNerney
     Meadows
     Michaud
     Miller, George
     Moore
     Nadler
     Napolitano
     Negrete McLeod
     Nolan
     O'Rourke
     Pallone
     Pascrell
     Pelosi
     Peters (MI)
     Pingree (ME)
     Pocan
     Polis
     Posey
     Price (NC)
     Rigell
     Rohrabacher
     Roybal-Allard
     Rush
     Ryan (OH)
     Sanchez, Linda T.
     Sarbanes
     Schakowsky
     Schiff
     Scott (VA)
     Sensenbrenner
     Serrano
     Sherman
     Slaughter
     Speier
     Stockman
     Takano
     Tonko
     Van Hollen
     Visclosky
     Walz
     Wasserman Schultz
     Waters
     Watt
     Waxman
     Welch
     Wilson (FL)
     Yarmuth
     Yoho

                             NOT VOTING--17

     Bachmann
     Blackburn
     Capuano
     Holding
     Keating
     Kennedy
     Lynch
     Markey
     McGovern
     Miller, Gary
     Neal
     Nugent
     Shea-Porter
     Shimkus
     Tierney
     Tsongas
     Velazquez

                              {time}  1259

  So the bill was passed.
  The result of the vote was announced as above recorded.
  A motion to reconsider was laid on the table.


                          personal explanation

  Mrs. BACHMANN. Mr. Speaker, on April 18, 2013 I was not able to vote 
on rollcall votes 113, 114, 115, 116 and 117. At the time, I was 
performing my duties as a designee of the U.S. House of Representatives 
attending the funeral of Baroness Margaret Thatcher in London. Had I 
been present for the vote, I would have voted ``aye'' on rollcall votes 
113, 114, 115 and 117. I would have voted ``no'' on rollcall vote 116.

[[Page H2145]]

                          personal explanation

  Mr. CAPUANO. Mr. Speaker, I missed several votes today to attend an 
Interfaith Service in Boston. I wish to state for the record how I 
would have voted had I been present:
  Rollcall No. 113--``Yes''
  Rollcall No. 114--``Yes''
  Rollcall No. 115--``Yes''
  Rollcall No. 116--``Yes''
  Rollcall No. 117--``No''


        Authorizing the Clerk to Make Corrections in Engrossment

  Mr. ROGERS of Michigan. Mr. Speaker, I ask unanimous consent that in 
the engrossment of the bill, H.R. 624, the Clerk be authorized to make 
such technical and conforming changes as necessary to reflect the 
actions of the House.
  The SPEAKER pro tempore. Is there objection to the request of the 
gentleman from Michigan?
  There was no objection.

                          ____________________


[Congressional Record Volume 159, Number 53 (Thursday, April 18, 2013)]
[Extensions of Remarks]
[Pages E489-E490]
From the Congressional Record Online through the Government Printing Office [www.gpo.gov]




             CYBER INTELLIGENCE SHARING FOR PROTECTION ACT

                                 ______
                                 

                               speech of

                             HON. RUSH HOLT

                             of new jersey

                    in the house of representatives

                       Wednesday, April 17, 2013

       The House in Committee of the Whole House on the state of 
     the Union had under consideration the bill (H.R. 624) to 
     provide for the sharing of certain cyber threat intelligence 
     and cyber threat information between the intelligence 
     community and cybersecurity entities, and for other purposes:

  Mr. HOLT. Madam Chair, I rise in opposition to this bill. I believe 
my former colleagues on the House Permanent Select Committee on 
Intelligence who have brought this bill to the floor today have only 
the very best of intentions. They seek to prevent cyber attacks against 
our nation. So do I. Unfortunately, their proposed solution is a 
radical over-reach that would not stop such attacks but would open up 
the private lives and information of Americans for the government and 
business to see, at will.
  This bill contains the key phrase ``Notwithstanding any other 
provision of law . . .''. What does that mean? It means that 
notwithstanding even the limited privacy protections in the PATRIOT Act 
and the FISA Amendments Act, this bill would give businesses the 
ability to share the public's private data among themselves and the 
government by invoking

[[Page E490]]

the phrase ``cyber threat''. It means that notwithstanding the privacy 
protections in HIPAA, businesses can share personal medical information 
with each other and the government if there is a ``cyber threat''. And 
the definition of cyber threat is so nebulous, so sweeping that it can 
be invoked for almost anything that simply look unusual or is not 
immediately explainable.
  Chillingly, the bill in its current form would allow companies to 
share sensitive and personal information directly with the NSA and 
other military agencies, even if it is purely domestic, American 
information that is no way associated with foreign threats or national 
security events. CISPA would allow companies to share personally 
identifiable information without making even reasonable efforts to 
protect it. Finally, CISPA grants broad immunity for any ``decisions 
made'' based on cyber information, regardless of whether the company 
was acting recklessly or causes unintended collateral damage. This week 
the President indicated that he would veto this bill were it presented 
to him in its current form, as well he should. The better outcome would 
be for this bill to never reach his desk.
  Many competent security experts have shared their views with Congress 
that we can better protect our nation from cyber attacks without 
compromising the privacy and interests of our citizens. I regret that 
their counsel has been ignored, which is why I urge my colleagues to 
join me in rejecting this badly flawed bill.

                          ____________________


[Congressional Record Volume 159, Number 53 (Thursday, April 18, 2013)]
[Extensions of Remarks]
[Pages E492-E493]
From the Congressional Record Online through the Government Printing Office [www.gpo.gov]




             CYBER INTELLIGENCE SHARING AND PROTECTION ACT

                                 ______
                                 

                               speech of

                            HON. MIKE ROGERS

                              of michigan

                    in the house of representatives

                       Wednesday, April 17, 2013

       The House in Committee of the Whole House on the state of 
     the Union had under consideration the bill (H.R. 624) to 
     provide for the sharing of certain cyber threat intelligence 
     and cyber threat information between the intelligence 
     community and cybersecurity entities, and for other purposes:

  Mr. ROGERS of Michigan. Madam Chair, I submit the following letters.

         Congress of the United States, House of Representatives, 
           Committee on the Judiciary,
                                   Washington, DC, April 10, 2013.
     Hon. Mike Rogers,
     Chairman, House Permanent Select Committee on Intelligence, 
         Washington, DC.
       Dear Chairman Rogers: I am writing concerning H.R. 624, the 
     ``Cyber Intelligence Sharing and Protection Act,'' which is 
     scheduled for consideration in your Committee today. This 
     bill contains provisions that fall within the Rule X 
     jurisdiction of the Committee on the Judiciary.
       As a result of your having made mutually agreed-upon 
     changes to the provisions in question, and in order to 
     expedite the House's consideration of H.R. 624, the Committee 
     on the Judiciary will not assert its jurisdictional claim 
     over this bill by seeking a sequential referral. The 
     Committee takes this action with our mutual understanding 
     that by foregoing consideration of H.R. 624 at this time, we 
     do not waive any jurisdiction over subject matter contained 
     in this or similar legislation, and that our Committee will 
     be appropriately consulted and involved as the bill or 
     similar legislation moves forward so that we may address any 
     remaining issues in our jurisdiction. Our Committee also 
     reserves the right to seek appointment of an appropriate 
     number of conferees to any House-Senate conference involving 
     this or similar legislation, and requests your support for 
     any such request.
       I would appreciate your response to this letter confirming 
     this understanding with respect to H.R. 624, and would ask 
     that a copy of our exchange of letters on this matter be 
     included during floor consideration.
           Sincerely,
                                                    Bob Goodlatte,
     Chairman.
                                  ____

         House of Representatives, Permanent Select Committee on 
           Intelligence,
                                   Washington, DC, April 11, 2013.
     Hon. Bob Goodlatte,
     Chairman, Committee on the Judiciary, House of 
         Representatives, Washington, DC.
       Dear Chairman Goodlatte: Thank you for your letter 
     regarding H.R. 624, the Cyber Intelligence Sharing and 
     Protection Act. As you noted, elements of the bill fall 
     within the jurisdiction of the Committee on the Judiciary. As 
     you also noted, mutually agreed upon changes to the 
     provisions in question were adopted by the Permanent Select 
     Committee on Intelligence during its consideration of the 
     bill, and we will be glad to continue to work with you on 
     these provisions. We will also support the request of the 
     Committee on the Judiciary for conferees in any conference 
     that may occur on the bill.
       I appreciate your willingness to forego consideration of 
     the bill in the interest of expediting this legislation for 
     floor consideration. I acknowledge that by agreeing to waive 
     consideration of the bill, the Committee on the Judiciary 
     does not waive any jurisdiction it may have over provisions 
     of the bill or any matters under your jurisdiction. I will 
     include a copy of your letter and this response in our 
     Committee's report on H.R. 624 and the Congressional Record 
     during consideration of the legislation on the House floor.
       Thank you for your assistance in this matter.
           Sincerely,
                                                      Mike Rogers,
                                                         Chairman.

[[Page E493]]

     
                                  ____
         House of Representatives, Committee on Homeland Security
                                   Washington, DC, April 11, 2013.
     Hon. Mike Rogers,
     Chairman, House Permanent Select Committee on Intelligence, 
         Washington, DC.
       Dear Chairman Rogers: On April 10, 2013, the House 
     Permanent Select Committee on Intelligence ordered H.R. 624, 
     the ``Cyber Intelligence Sharing and Protection Act'', 
     reported favorably to the House with certain provisions in 
     the legislation that fall within the Rule X jurisdiction of 
     the Committee on Homeland Security. Specifically, this 
     legislation identifies the Department of Homeland Security's 
     National Cybersecurity and Communications Integrations Center 
     (NCCIC) as a principal entity for sharing cybersecurity 
     information with the Federal government and amongst 
     stakeholders.
       The NCCIC partners with all Federal departments and 
     agencies, State, local, Tribal, and territorial governments, 
     as well as private sector and international entities. The 
     Center works with critical infrastructure owners and 
     operators to reduce risk, coordinates national response 
     efforts to significant cyber incidents, and shares 
     cybersecurity threat and vulnerability assessment information 
     throughout the Federal government. These actions, along with 
     the cybersecurity information provided through the NCCIC, 
     trigger the jurisdiction of the Committee on Homeland 
     Security over functions of the Department of Homeland 
     Security relating to integration, analysis, and dissemination 
     of homeland security information.
       In the interest of permitting your committee to proceed 
     expeditiously with consideration of this important 
     legislation, the Committee on Homeland Security will not 
     request a sequential referral over provisions within our 
     jurisdiction. However, I do so with the mutual understanding 
     that the Committee's jurisdictional claims over subject 
     matters contained in this and similar legislation are in no 
     way diminished or altered. I request that you urge the 
     Speaker to name members of this Committee to any conference 
     committee for consideration of provisions that fall within 
     the jurisdiction of the Committee on Homeland Security in the 
     House-Senate conference on this bill or similar legislation.
       Finally, I ask that you place this letter and your response 
     into the committee report on H.R. 624 and into the 
     Congressional Record during consideration of the measure on 
     the House floor. Thank you for your consideration of this 
     matter.
           Sincerely,
                                                Michael T. McCaul,
     Chairman.
                                  ____

         House of Representatives, Permanent Select Committee on 
           Intelligence,
                                   Washington, DC, April 12, 2013.
     Hon. Michael T. McCaul,
     Chairman, Committee on Homeland Security, Washington, DC.
       Dear Chairman McCaul: This responds to your letter dated 
     April 11, 2013 concerning H.R. 624 the Cyber Intelligence 
     Sharing and Protection Act (CISPA). Specifically, you noted 
     the provision contained in the legislation relating to the 
     Department of Homeland Security's National Cybersecurity and 
     Communications Integration Center (NCCIC).
       I appreciate your decision to forego requesting referral of 
     H.R. 624 to the House Homeland Security Committee in the 
     interest of expediting floor consideration of this 
     legislation. I also acknowledge that this decision will not 
     diminish or alter the Homeland Security Committee's 
     jurisdictional claims over subject matters contained in this 
     and similar legislation. I will also support your request 
     that the Speaker name members of the Homeland Security 
     Committee to any conference committee for consideration of 
     provisions that fall within the jurisdiction of the Committee 
     on Homeland Security in the House-Senate conference on this 
     bill. Finally, I will include a copy of your letter and this 
     response letter in the Committee's report on H.R. 624 and in 
     the Congressional Record during consideration of H.R. 624 on 
     the House Floor.
           Sincerely,
                                                      Mike Rogers,
     Chairman.
                                  ____

         House of Representatives,
         Committee on Armed Services,
                                   Washington, DC, April 18, 2013.
     Chairman Mike Rogers,
     House Permanent Select Committee on Intelligence, House of 
         Representatives, Washington, DC.
       Dear Chairman Rogers: I am writing to raise concerns 
     relating to amendment #42 to the Cyber Intelligence and 
     Sharing Protection Act (CISPA), H.R. 624, as modified and 
     introduced by you, Chairman McCaul, and Ranking Members 
     Ruppersberger and Thompson.
       First, I am concerned about the possible impact of this 
     amendment on current cyber threat information sharing 
     programs with the Department of Defense (DOD). Based on the 
     short amount of time we have had to review and comment on the 
     amendment, we have not had an opportunity to fully assess the 
     potential effects on DOD activities. In particular, we must 
     ensure that there is no ``chilling effect'' on sharing 
     between the Defense Industrial Base and DOD that is so 
     critical to our national security.
       Second, I am also seeking to clarify the intent behind a 
     specific change proposed by the modified amendment. The 
     amendment would alter the current text, which states that a 
     cybersecurity provider may share cyber threat information 
     ``with the express consent of a protected entity'' with any 
     entity, ``including, if specifically designated, the Federal 
     Government.'' The amendment would change the reference from 
     ``Federal Government'' to the Departments of Homeland 
     Security and Justice. I seek to confirm that the intent of 
     the amendment is not to preclude sharing of cyber threat 
     information with the Department of Defense when a 
     cybersecurity provider has received the consent of a 
     protected entity.
       More generally, we must ensure that there is no time delay 
     or other obstructions to passing cyber threat information 
     critical for our national defense to DOD.
       I am seeking a commitment from you to work with the Armed 
     Services Committee to determine if any further changes to the 
     legislation might be needed, and if possible incorporate 
     those changes when this bill is conferenced with the Senate.
           Sincerely,
                                        Howard P. ``Buck'' McKeon,
     Chairman.
                                  ____

         House of Representatives, Permanent Select Committee on 
           Intelligence,
                                   Washington, DC, April 18, 2013.
     Hon. Buck McKeon,
     Chairman, Committee on Armed Services, Washington, DC.
       Dear Mr. Chairman: This responds to your letter about an 
     amendment I co-sponsored with Chairman McCaul, and Ranking 
     Members Ruppersberger and Thompson during floor consideration 
     of H.R. 624, The Cyber Intelligence Sharing and Protection 
     Act (CISPA).
       I understand you have concerns about a possible ``chilling 
     effect'' of this amendment on current cyber threat 
     information sharing programs with the Department of Defense, 
     and about changing the reference to ``Federal Government'' to 
     the Departments of Homeland Security and Justice. I confirm 
     that the amendment is not intended to, and does not, preclude 
     sharing of cyber threat information with the Department of 
     Defense when a cybersecurity provider has received the 
     consent of a protected entity.
       Additionally, I understand your concerns about the 
     application of (b)(3)(A) and section 941(c)(3) of the 
     National Defense Authorization Act for Fiscal Year 2013. I 
     commit to working with you in an effort to identify a 
     mutually agreeable approach to this matter.
           Sincerely,
                                                      Mike Rogers,
     Chairman.

                          ____________________



[Congressional Record Volume 159, Number 53 (Thursday, April 18, 2013)]
[Extensions of Remarks]
[Pages E495-E496]
From the Congressional Record Online through the Government Printing Office [www.gpo.gov]




             CYBER INTELLIGENCE SHARING AND PROTECTION ACT

                                 ______
                                 

                               speech of

                        HON. SHEILA JACKSON LEE

                                of texas

                    in the house of representatives

                       Wednesday, April 17, 2013

       The House in Committee of the Whole House on the state of 
     the Union had under consideration the bill (H.R. 624) to 
     provide for the sharing of certain cyber threat intelligence 
     and cyber threat information between the intelligence 
     community and cybersecurity entities, and for other purposes:

  Ms. JACKSON LEE. Madam Chair, I rise to speak on H.R. 624, The Cyber 
Intelligence Sharing and Protection Act.
  I thank and appreciate the hard work done by Chairman Rogers and 
Ranking Member Ruppersberger for their leadership of the House 
Committee on Intelligence that crafted the legislation we are 
considering. They have demonstrated their strength of bipartisanship in 
their work to make great improvements in the bill that was considered 
during the last Congress.
  The bill is intended to improve our nation's ability to investigate 
and prosecute cybersecurity crimes; secure the protection of 
individuals from danger of death or serious bodily harm and investigate 
and prosecute crimes against the most vulnerable in society--our 
children. The bill's objective regarding minors is to provide physical 
safety for them from sexual abuse, kidnapping and trafficking.
  The debate on H.R. 624, the Cyber Intelligence Sharing and Protection 
Act afforded members of the House of Representatives and the American 
public a view into some of the more complex issues related to the 
protection of digital information.
  The bill's drafters and those who have contributed to the process 
through the amendments offered worked to improve the work already done 
by the Intelligence Committee. The goal of the bill is not to lay bare 
the personal digital records of every individual living in the United 
States. The text of the legislation explicitly states that the 
government could not obtain library records, library patron lists, book 
sales records, book customer lists, tax return records, education 
records or medical records.
  The Internet challenges us as policymakers because it introduces into 
our deliberative process a class of technology that can change far 
faster than other forms of technology. This fact is acknowledged by the 
bill's sponsors by highlighting the nature of threats that exists on 
the Internet--rapid and automated. Cyber attacks can be as short as a 
few minutes or last for only 2 hours. Thieves work together and have 
learned to use our own personal computers to help them hurt us. The 
tools that have proven to be the most threatening are called botnets. A 
botnet uses a computer virus or worm program to infiltrate computers 
and take control of them. One botnet can be made of millions of private 
personal computers. A botnet of this size would have the computing 
power to overwhelm a major institution's network with a brute force 
attack that searches for the password to one account on a computer 
network. Once the botnet controller has gotten access to a private or 
government network they can use that access to seek greater control.
  The question for us today is should the Congress view the threats 
posed by the Digital Information Age with the same urgency as when our 
nation has faced events such as September 11 or catastrophic 
hurricanes.
  Many of my colleagues have joined me in expressing great concern 
about privacy and civil liberties as the Federal presence on the 
Internet has grown. Federal government agencies are now using Facebook, 
Twitter and YouTube to communicate with and engage millions of 
Americans.
  There appears to be no scarcity in the capacity of the Internet to 
accommodate new business websites, technological innovations or the 
millions of new Internet users who purchase digital devices, create 
blogs or e-mail accounts.
  The Internet is more than ones and zeros--it is how the world is 
working, living, and communicating. Its borderless nature and 
ubiquitous presence means that billions of computing devices can 
interact and connect using the global telecommunication infrastructure.
  Computing technology was once tethered by technical limitations to 
physical spaces--now computing devices are mobile. For example, a few 
years ago, portable phones that were as powerful as computers were 
difficult for most consumers to imagine--now they are common place. 
Unfortunately, with every advance in computing innovation we see that 
there are those within society who would search for vulnerabilities in 
these innovations to disrupt their operation.
  The Internet is a critical path forward for our nation's recovering 
economy. However, to meet the challenges and take advantage of the 
opportunities the Internet makes possible, we must understand the 
threats and risks as well as take full advantage of innovation.
  One of the central challenges for us as legislators is to preserve 
the Constitution of the United States for future generations. Each 
generation of Americans has had the task of defining the role of 
government in their lives. Today, the Internet is making the role of 
government in American life in some ways more transparent and 
accessible through government agency websites.
  We as members of Congress are using the Internet to bring more 
transparency to the work we do on behalf of our constituents. The 
content found on House web pages provides access to information 
regarding the work we do on behalf of the public.
  The Internet could also make the government's presence in our lives 
much more opaque. For example, the same social networking services that 
families and friends create to share details about their lives is not 
held solely under their control.
  What once would have been words shared among family members are now 
digital data stored with social networking service providers. Computer 
stored data can live on far longer than may be prudent for the peace 
and tranquility of family life or economic opportunities as our child 
transition from youth into responsible adults.
  If the government gained access to the digital equivalent of your 
papers and effects--it would leave no signs of having done so. Digital 
information unlike paper does not fade way nor do the words in digital 
files degrade when they are copied over and over again.
  What is more problematic for the purpose of our debate on this bill 
is what would happen if the government had open access to decades of 
communications: the books read; videos watched; thoughts expressed; or 
the joys and sorrows of millions of our nation's citizens. How would 
this impact the America experience?
  We know that the founders of this nation were determined to protect 
the privacy of people from the power of the government. The Fourth 
Amendment states:

       The right of the people to be secure in their persons, 
     houses, papers, and effects, against unreasonable searches 
     and seizures, shall not be violated, and no Warrants shall 
     issue but upon probable cause, supported by Oath or 
     affirmation, and particularly describing the place to be 
     searched, and the persons or things to be seized.

  The constantly shifting Internet environment creates challenges for 
policy makers. Today, the ``papers and effects'' of persons have 
changed in the new Information Age into digital data. This information 
is not limited to the home, but is mobile as well as remote from the 
owners of the information.
  How do we make sure that the Constitution is preserved and that we as 
its stewards pass it to the next generation in better condition than 
when we took an oath to protect it--not just the parts of the document 
that we like, but all of it.
  Although the challenges are great, the rewards of an environment that 
supports innovation while protecting privacy, civil liberties, and 
freedom should be the focus our nation's policies and laws that govern 
our decisions regarding the Internet.
  As members of Congress we must keep a watchful eye on preserving, 
defending and protection the Constitution. It is our duty--our passion 
and our calling to serve this nation--unwavering in our commitment to 
act first in the interests of the entire country as we see to the needs 
of the people we serve.

[[Page E496]]



                          ____________________


[Congressional Record Volume 159, Number 53 (Thursday, April 18, 2013)]
[Extensions of Remarks]
[Page E499]
From the Congressional Record Online through the Government Printing Office [www.gpo.gov]




             CYBER INTELLIGENCE SHARING AND PROTECTION ACT

                                 ______
                                 

                               speech of

                          HON. EARL BLUMENAUER

                               of oregon

                    in the house of representatives

                       Wednesday, April 17, 2013

       The House in Committee of the Whole House on the state of 
     the Union had under consideration the bill (H.R. 624) to 
     provide for the sharing of certain cyber threat intelligence 
     and cyber threat information between the intelligence 
     community and cybersecurity entities, and for other purposes:

  Mr. BLUMENAUER. Madam Chair, cybersecurity experts in government and 
the private sector agree that the biggest impediments to strengthening 
cybersecurity are obstacles that prevent the sharing of cyber threat 
information. The intent of the bill before the House, H.R. 624, the 
Cyber Intelligence Sharing and Protection Act (CISPA) is laudable in 
that it eliminates some of those obstacles. Security and privacy, 
however, should not be mutually exclusive and CISPA does not go far 
enough to protect privacy. This is the bottom line for me, my 
constituents, and I hope the Obama Administration, and why I oppose 
this legislation.

                          ____________________