8 February 2002
Source: http://usinfo.state.gov/cgi-bin/washfile/display.pl?p=/products/washfile/latest&f=02020702.plt&t=/products/washfile/newsitem.shtml


US Department of State
International Information Programs

Washington File
_________________________________

07 February 2002

U.S. House of Representatives Approves Cyber Security Legislation

(Measure designed to fund research to protect infrastructure) (460)
By Merle D. Kellerhals, Jr.
Washington File Staff Writer

Washington -- The U.S. House of Representatives overwhelmingly
approved legislation February 7 that would provide $877.85 million
over five years to fund research among colleges, universities and
research organizations to develop ways to protect the nation's
computer networks from attack by terrorists and hackers.

"A cyber attack could knock out electricity, drinking water and sewage
systems, financial institutions, assembly lines and communications,"
House Science Committee Chairman Sherwood Boehlert, a New York
Republican, said February 7.

The House voted 400-12 for the "Cyber Security Research and
Development Act," which now goes to the U.S. Senate for consideration.

Boehlert said "the attacks of September 11th have turned our attention
to the nation's weaknesses, and again we find that our capacity to
conduct research and to educate will have to be enhanced if we are to
counter our foes over the long run. No less than the Cold War, the war
against terrorism will have to be waged in the laboratory as well as
on the battlefield."

The legislation creates research grants at the National Science
Foundation and the National Institute of Standards and Technology to
enhance computer security.

President Bush made securing the nation's critical infrastructure an
administration priority following the September 11th terrorist attacks
on the United States. He signed an executive order October 16, 2001 to
create the Critical Infrastructure Board to recommend policies and
coordinate programs for protecting information systems.

Critical infrastructures include telecommunications, electrical power
systems, gas and oil storage and transportation, banking and finance,
transportation, water supply systems, emergency services (including
medical, police, fire, and rescue), and continuity of government.
Threats to these critical infrastructures fall into two categories:
physical threats to tangible property and threats of electronic,
radio-frequency, or computer-based attacks on the information or
communications components that control critical infrastructures
("cyber threats").

CIA Director George Tenet said in April 1998 that the United States is
"currently building an information infrastructure -- the most complex
systems the world has ever known -- on an insecure foundation. We have
ignored the need to build trust into our systems. Simply hoping that
someday we can add the needed security before it is too late is not a
strategy."

Tenet said that U.S. national security and economic well being depend
upon a secure infrastructure system. A CIA report made public last
year indicates that the United States, China and Russia are training
soldiers to attack and defend targets through use of the global
Internet.

(The Washington File is a product of the Office of International
Information Programs, U.S. Department of State. Web site:
http://usinfo.state.gov)


[Congressional Record: February 7, 2002 (House)]
[Page H206-H215]
From the Congressional Record Online via GPO Access [wais.access.gpo.gov]
[DOCID:cr07fe02-62]




              CYBER SECURITY RESEARCH AND DEVELOPMENT ACT


  The SPEAKER pro tempore (Mr. Shimkus). Pursuant to House Resolution
343 and rule XVIII, the Chair declares the House in the Committee of
the Whole House on the State of the Union for the consideration of the
bill, H.R. 3394.


                              {time}  1048


                     In the Committee of the Whole


  Accordingly, the House resolved itself into the Committee of the
Whole House on the State of the Union for the consideration of the bill
(H.R. 3394) to authorize funding for computer and network security
research and development and research fellowship programs, and for
other purposes, with Mr. Sununu in the chair.
  The Clerk read the title of the bill.
  The CHAIRMAN. Pursuant to the rule, the bill is considered as having
been read the first time.
  Under the rule, the gentleman from New York (Mr. Boehlert) and the
gentleman from Texas (Mr. Hall) each will control 30 minutes.
  The Chair recognizes the gentleman from New York (Mr. Boehlert).


                             General Leave


  Mr. BOEHLERT. Mr. Chairman, I ask unanimous consent that all Members
may have 5 legislative days within which to revise and extend their
remarks and to include extraneous material on H.R. 3394.
  The CHAIRMAN. Is there objection to the request of the gentleman from
New York?
  There was no objection.
  Mr. BOEHLERT. Mr. Chairman, I yield myself such time as I may
consume.
  Mr. Chairman, I am honored to bring H.R. 3349, The Cyber Security
Research and Development Act, before the House. Like other
congressional responses to terrorism, this is a bipartisan bill. I want
especially to thank our ranking minority member, the gentleman from
Texas (Mr. Hall), who joined me in introducing this bill; the gentleman
from Washington (Mr. Baird), whose own legislation is incorporated in
H.R. 3394; the gentleman from Michigan (Mr. Smith) and the gentleman
from Michigan (Dr. Ehlers) who chair the subcommittee with jurisdiction
over this bill, and their ranking members, the gentlewoman from Texas
(Ms. Johnson) and the gentleman from Michigan (Mr. Barcia).
  Also, I would be remiss if I did not thank Dr. Bill Wulf, the
president of the National Academy of Engineering and one of the
Nation's leading computer scientists, whose ideas were the inspiration
for so much of this legislation.
  I am convinced that over time H.R. 3394 will come to be seen as a
fundamental turning point in the Nation's approach to cybersecurity.
This bill is the equivalent of legislation the Congress passed in the
wake of the Sputnik launch in the late 1950s.
  We will recall that the unexpected Soviet launch of the Sputnik
forced us to focus on the Nation's deficiencies in science and led us
to pass breathtaking, and, it turned out, overwhelmingly effective
legislation to improve


[[Page H207]]


the Nation's ability to conduct research and educate students.
  Similarly, the attacks of September 11 have turned our attention to
the Nation's weaknesses, and, again, we find our capacity to conduct
research and to educate will have to be enhanced if we are to counter
our foes over the long run. No less than the Cold War, the war against
terrorism will have to be waged in the laboratory as well as on the
battlefield.
  And I would add that I am pleased that the Committee on Science,
which was created in response to the Sputnik launch, will help lead the
effort to ensure our Nation's laboratories are up to the challenge.
  One of the most critical problems our Nation's researchers need to
focus on is how to protect our Nation's computers systems and networks
from attack. For a while, most Americans have been focused exclusively
on the hijackings and the bombings and bioterrorism. The experts tell
us that the Nation is also profoundly at risk from cyber terrorism.
That is a new word that has entered our vocabulary, unfortunately, but
it is one we have to be constantly aware of, and we have to prepare.
  In an era when virtually all the tools of our daily lives are
connected to and rely upon computer networks, a cyberattack could knock
out electricity, drinking water and sewage systems, financial
institutions, assembly lines and communications, and that is just
naming a few. We must improve our ability to respond to these threats,
and our response must go beyond immediate defensive measures. That is
not good enough.
  We need to conduct the research and development necessary to make
computers and networks much harder to break into and much less subject
to damage when they are violated. That will require a focused, well-
funded research and development effort in cybersecurity, something we
are sorely lacking now.
  In fact, expert witnesses at our Committee on Science hearings have
described the current state of cyber security research as woefully
underfunded, understaffed, timid, unimaginative and leaderless. That is
not good enough. H.R. 3394 will change all of that.
  Our bill capitalizes on the expertise of two well-run Federal
agencies with historic links to both academia and industry necessary to
jump-start our cybersecurity efforts.


  Under the bill the National Science Foundation will fund the creation
of new cybersecurity research centers, undergraduate and master's
degree programs and graduate fellowships. The National Institute of
Standards and Technology will create new program grant for partnerships
between academia and industry, new postdoctoral fellowships and a new
program to encourage senior researchers in other fields to work on
computer security.
  The result over the next several years will be to promote new
research that produces innovative, creative approaches to computer
security, to draw more researchers into the field, and to develop a
cadre of students who will become the next generation of cybersecurity
researchers.
  This approach is measured and targeted, and it will be successful. As
with the programs that were created in response to Sputnik, the
programs in H.R. 3394 will ensure that we make the long-term investment
in research and students needed to develop the tools that will protect
us from cyberattacks.
  I want to emphasize, Mr. Chairman, that this bill will provide
funding for a wide range of research, a range far larger even than the
illustrative list that is even in the legislation. For example,
research would include work on firewall and antivirus technology,
vulnerability assessment, operations and control systems management,
and management of the interoperable digital certificates.
  I also want to note that in addition to providing funding and
programming, this bill provides Federal leadership. The National
Science Foundation will have the responsibility of making sure that the
Nation's overall research and education enterprise is producing the
knowledge in students we need to combat cyberterrorism.
  I have been asked by some, ``Cannot the private sector just take care
of this?'' Unfortunately, the answer is a resounding no. Even after
September 11, the private sector has little incentive to invest heavily
in cybersecurity because the market is more concerned with speed and
convenience. That is not my personal conclusion, that is what the
industry leaders in cybersecurity have said in testimony before our
committee.
  In addition, we need to invest in our universities which will work
with private industry to do the basic research needed to come up with
radically new approaches to protecting our computer systems and to
attract the students who will keep the field healthy in the future.
  That is why H.R. 3394 is endorsed by leading industry groups
including the National Association of Manufacturers, and the
Information Technology Association of America, as well as a wide range
of groups representing educational institutions.
  The bill, I am pleased to report, is also supported by the
administration, which provided much guidance as H.R. 3394 moved through
our committee.
  So I urge my colleagues to follow the lead of the Committee on
Science, which approved this bill without dissent. Years from now we
will see H.R. 3394 as the measure that galvanized the Federal
Government, industry and academia into eliminating the cybersecurity
weaknesses that today threaten our economy and our basic public
services. I urge support for this important bill.
  Mr. Chairman, I reserve the balance of my time.
  Mr. HALL of Texas. Mr. Chairman, I yield myself such time as I may
consume.
  (Mr. HALL of Texas asked and was given permission to revise and
extend his remarks.)
  Mr. HALL of Texas. Mr. Chairman, I rise in support of the Cyber
Security Research and Development Act. It is a bill that committee has
worked in a bipartisan manner, and I think it fills a very important
gap in current information technology research programs, namely the
need for improved security for our computers and digital communication
networks.
  I, of course, congratulate and thank the Committee on Science
chairman, the gentleman from New York (Mr. Boehlert). He has done a
very good job of laying out the thrust of the bill, and I also thank
him for his leadership and thank him for working so closely with me and
with others on our side of the dock to bring this bill to this stage.
  I also want to acknowledge the work of my colleague, the gentleman
from Washington (Mr. Baird), a clinical psychologist before he came to
the Congress, a man that has unusual ability and is knowledgeable about
research and development. Actually, it was a provision pertaining to
the National Institute of Standards and Technology, his provisions that
originated in his bill, that we have used in this bill.
  Many systems that are vital to the Nation such as electric power
grids, transportation and financial services, all of these rely on the
transfer of information through computer networks.


                              {time}  1100


  The trend in recent years of interconnecting computer networks has
had some unintended consequences, one of them being making access of
these very critical systems easier for criminals and actually
potentially easier for terrorists, and that is something that we are
very aware of today.
  As a result, there have been an increased number of assaults on
network systems. Computer viruses, attacks by computer hackers, and
electronic identification theft have become more common. The events of
last fall, as the chairman stated, have made us all realize just how
vulnerable we are to attack, and we now understand that we have to
enhance the protection of the Nation's physical and electronic
infrastructure.
  Mr. Chairman, H.R. 3394 establishes substantial new research programs
also at the National Science Foundation and the National Institute of
Standards and Technology. The goal of both of these multiyear programs
is not only to advance computer security research but also to expand
the community of computer security researchers.
  These programs will support graduate students. They will support
post-doctoral researchers and senior researchers while encouraging
stronger ties between universities and industry.
  The key to ensure information security for the long term is to
establish a


[[Page H208]]


vigorous and creative basic research effort focused on the security of
networked information systems. H.R. 3394 will make a major contribution
toward accomplishing this goal.
  Mr. Chairman, I commend this measure to my colleagues and ask for
their support and ask for its passage by this House.
  Mr. Chairman, I reserve the balance of my time.
  Mr. BOEHLERT. Mr. Chairman, I am pleased to yield 3 minutes to the
distinguished gentleman from Michigan (Mr. Smith), who is the chairman
of the Subcommittee on Research of the Committee on Science and has
been a leader in this overall effort.
  Mr. SMITH of Michigan. Mr. Chairman, we learned from the September 11
attack and from the information gathered in Afghanistan to expect the
unexpected.
  Part of the new commitment to homeland security is improving the
security of our Nation's computer and networking infrastructure. In the
past decade this networking has been firmly embedded in our economy,
and we have become more dependent on these technologies. Whether it is
delivering agricultural products or supporting banking and financial
markets, moving electricity along interconnected grids, providing
government services or maintaining our national defense, we have become
dependent on computer networks for our economic and national security.
  The networks I think also are a potent symbol of our open society and
free markets which thrive on the uninhibited flow of information.
However, the technological advancement in computers and software and
the networking and information technology which is a bill, H.R. 3400,
which is coming before this body in the next several weeks, the
potential threat of cyberattack is real and growing. Terrorists will
always probe for our weakest points, so we must remain vigilant and
confront these new realities.
  As we become even more dependent on computer networks and as
terrorists become more technologically sophisticated, we should
anticipate the possibility of attacks launched on cyberspace.
  Computer viruses, computer hackers, electronic identification theft
are just a few of the new challenges we face. What is needed is this
bill, which moves us into a comprehensive plan to address the growing
linkages between national security and cybersecurity. We need to engage
the best minds in America to make us immune from these kinds of
attacks.
  H.R. 3394 does just that. It authorizes research programs at the
National Science Foundation and the National Institute of Standards and
Technology to decrease the vulnerability of our computer systems and
address emergency problems related to computer networking and
infrastructure.
  Mr. Chairman, I think it is very important that we have coordination
among all government agencies in this effort, especially the military
complex, if we are to be efficient, effective and if we are to succeed.
  We need this kind of legislation to move ahead; and I just want to
commend the gentleman from Texas (Mr. Hall), and certainly our
chairman, for the inspiration to timely move this bill forward; and I
urge all my colleagues to support it.
  Mr. HALL of Texas. Mr. Chairman, I yield the balance of my time to
the gentleman from Washington (Mr. Baird), for purposes of control.
  The CHAIRMAN. Without objection, the gentleman from Washington (Mr.
Baird) will control the time.
  There was no objection.
  Mr. BAIRD. Mr. Chairman, I yield myself such time as I may consume.
  I would like to begin by commending and thanking the gentleman from
New York (Mr. Boehlert) and the gentleman from Texas (Mr. Hall) for
their leadership on this matter. I am tremendously honored that they
have chosen to include my computer security bill, which establishes a
research and development program on computer and network security
grants to the National Institute of Standards and Technology in today's
bill.
  The chairman's legislation will address long-term needs in securing
the Nation's information infrastructure as well as securing or
strengthening the security of the nonclassified computer systems of
Federal agencies.
  Because of September 11, focus and attention has been focused in an
unprecedented way on increasing our security against terrorism. Today,
security has to mean more than locking doors and installing metal
detectors. In addition to physical security, virtual systems that are
vital to the Nation's economy must be protected. Telecommunications and
computer technologies are vulnerable to attack from far away by enemies
who can remain anonymous, hidden in the vast maze of the Internet.
Examples of systems that rely on computer networks include the electric
power grid, rail networks, and financial transaction networks.
  I should commend the gentleman from New York (Mr. Boehlert),
particularly, and former chair of the committee, the gentlewoman from
Maryland (Mrs. Morella), for their foresight in this because prior to
September 11 they had both had the foresight to conduct numerous
hearings on the issue of computer security. It is that kind of forward
thinking that we need and now in the post-September 11 time have the
opportunity to implement some of these measures that came forward in
those hearings.
  The vulnerability of the Internet computer viruses, denial of service
attacks and defaced Web sites is well-known to the general public. Such
widely reported and indeed widely experienced events have increased in
frequency over time. These attacks disrupt business and government
activities, sometimes resulting in significant recovery costs. We have
yet to face a catastrophic cyberattack thus far; but Richard Clarke,
the President's new terrorism czar, has said that the government must
make cybersecurity a priority or we face the possibility of what he
termed a ``digital Pearl Harbor.''
  Potentially vulnerable computer systems are largely owned and
operated by the private sector, but the government has an important
role in supporting the research and development activities that will
provide the tools for protecting information systems. An essential
component for ensuring improved information security is a vigorous and
creative basic research effort focused on the security of networked
information systems.
  Witnesses at our Committee on Science hearings last year noted the
anemic level of funding for research on computer and network security.
Such lack of funding has resulted in the lack of a critical mass of
researchers in the field and has severely limited the focus of
research. The witnesses at the hearings advocated increased and
sustained research funding from the Federal Government to support both
expanded training and research on a long-term basis.
  The chairman's bill will provide the resources necessary to ensure
the security of business networks and the safety of America's computer
infrastructure. I would like to thank the staff of the Committee on
Science for their good work on this, as well as my own staff member,
Brooke Jamison. I would urge all Members to support this important
measure.
  Mr. Chairman, I reserve the balance of my time.
  Mr. BOEHLERT. Mr. Chairman, I am pleased to yield 3 minutes to the
distinguished gentleman from Michigan (Mr. Ehlers), a scientist in his
own right and a legislator of the first order. He is the chair of our
key Subcommittee on Environment, Technology and Standards; and I am
pleased to yield the time to him.
  (Mr. EHLERS asked and was given permission to revise and extend his
remarks.)
  Mr. EHLERS. Mr. Chairman, I appreciate this opportunity to rise in
support of H.R. 3394, a piece of legislation that is badly needed.
  Most of the citizens of this land do not understand the broad
dimensions of the problems of cybersecurity. I was privileged a few
years ago to write a report for the cybersecurity of NATO parliamentary
assembly but which was under the chairmanship of the gentleman from New
York (Mr. Boehlert) at that time, and it was a real eye-opener to look
into all of the dimensions of cybersecurity, both hardware and
software.
  On the hardware end, we are extremely vulnerable as a Nation in many
ways, particularly to a high-level nuclear explosion, which would
probably have no direct casualties but


[[Page H209]]


could wipe out most of the computers and microprocessors in this
Nation.
  This bill addresses primarily the other dimension of security and
that is the software problem. We have been very fortunate as a Nation
that most of the breaches of security that have taken place so far have
been caused by hackers, pranksters and petty thieves; but we are
extremely vulnerable in many other ways due to the proliferation of
computers in our country, and I am not referring just to the
proliferation of microprocessors which have essentially invaded our
homes, our businesses in numerous quantities. They are vulnerable in
different ways; but any time one attaches a computer to a network, they
are vulnerable to activities that take place on that network.
  We have gained tremendously as a Nation through the use of computers
and networks, but we have not taken account of the tremendous
opportunities for breaches of security. It is essential that we train
our people to deal with these; but above all, we must begin by doing
more research in how we can deal with breaches of security. We know so
little about it that we are at a disadvantage and we are at the mercy
of the hackers, the pranksters, the thieves and, indeed, of other
countries.
  It is essential that this bill pass; that we begin the process of
developing a superstructure and an infrastructure to deal with
cybersecurity. We need more research. We need more scholars. We need
more researchers, and we need more people who are capable of dealing
directly with problems that occur.
  We have heard mention of the electric grid and other such things as
this; but it can appear in much more minor ways, simply denial of
service which costs our economy billions of dollars each year.
Recently, I had a call from someone who had received an e-mail sent by
way of a government department's computer. A hacker had gotten into
that computer and used this government's agency computer to send out
millions of e-mails to prevent service from major entities in this
country.
  So I urge that we join together and we pass this bill and also be
sure to alert the American public of the nature of cyberterrorism,
cyberinsecurity and that we deal with this problem.
  Mr. BAIRD. Mr. Chairman, I reserve my time.
  The CHAIRMAN. Without objection, the gentlewoman from Maryland (Mrs.
Morella) will control the majority's time.
  There was no objection.
  Mrs. MORELLA. Mr. Chairman, I am pleased to yield 2\1/2\ minutes to
the gentleman from Illinois (Mr. Weller).
  Mr. WELLER. Mr. Chairman, I come to the floor and first want to
commend the gentleman from New York (Mr. Boehlert) and the gentleman
from Texas (Mr. Hall) for their bipartisan efforts to address an issue
that is so very important to our Nation's economy and Nation's
infrastructure.
  We are at war today. We are at war against terrorism, and one of the
lessons of September 11 is no more complacency. Clearly our Nation's IT
infrastructure is one area where we historically have been very, very
complacent; and as we work to win this war on terrorism, we also must
work to strengthen our homeland security, and clearly this legislation,
the Cyber Security Research and Development Act, is part of our efforts
to strengthen our Nation's homeland security.
  Our IT infrastructure is important. We use it in our everyday lives,
whether it is our banking, insurance, our schools, our businesses, how
we operate our utilities, and serve our Nation's infrastructure; and
all of it is in jeopardy of a cyberattack.
  All of us have learned, I believe, over the last several years the
creativity of those who hack into our computer systems, those who
create computer viruses for malicious destruction, in many cases
causing billions of dollars of damage and costs to our Nation as well
as our global economy. Unfortunately, very little research and
development has been conducted in this important area of homeland
security, finding better ways to protect our Nation's information
technology systems.
  The private sector historically has little incentive to invest
because the market emphasizes speed and convenience. Yet the Federal
Government historically has not filled the gap. This legislation is
important legislation and deserves bipartisan support and enlists our
Nation's universities as well as research institutions to find
solutions to protect and secure our Nation's IT infrastructure.
  There is also more we need to do. I think we are all disappointed
after the House passed an economic stimulus package that the
accelerated depreciation component that this House passed was not
included in action in the other body. My hope is that the accelerated
depreciation which would help our businesses and private sector also
acquire the hardware and software to protect their IT systems will
eventually be included in a stimulus package that we send to the
President and get this economy moving again.


                              {time}  1115


  Mr. BOEHLERT. Mr. Chairman, I yield 4 minutes to the distinguished
gentlewoman from Maryland (Mrs. Morella), who is one of the leaders of
the Committee on Science in so many areas, but particularly interested
in this important area.
  Mrs. MORELLA. Mr. Chairman, it is with great pleasure that I rise as
a cosponsor of H.R. 3394, and I thank the gentleman from New York (Mr.
Boehlert) not only for his laudatory words but for his leadership as
chairman of the Science Committee in crafting this piece of legislation
and bringing it to the floor.
  The ranking member, the gentleman from Texas (Mr. Hall), deserves to
be commended also for working together. As is often the case with
legislation from the Committee on Science, this bill is the outcome of
a tremendous bipartisan effort, and I urge my colleagues to support its
passage.
  Computer networks and infrastructure have become one of America's
greatest assets. Our ingenuity in developing new and exciting
technologies to increase our productivity and quality of life have made
us the envy of the modern world. These devices have changed the way we
interact socially, conduct business, and have ingrained themselves in
every aspect of our lives. We have embraced them and will continue to
find exciting new ways to utilize these modern marvels.
  Unfortunately, while these computer networks have given us great
freedom and access, they have also created a new vulnerability. Our
reliance on these networks creates a potential threat and the economic
and social consequences to an attack in cyberspace cannot be ignored.
In the past few months, we have been confronted with a number of
threats to our physical well-being and have taken numerous steps to
plug the many holes in our society's lax security practices. However,
along with securing our borders and providing for defense of the
homeland, we must also take steps to protect our virtual world.
  As numerous hearings conducted in the House Committee on Science have
shown, it is clear that we have two major problems in cyberspace. The
first is that we have few, if any, standards as to what constitutes a
secured network, nor do we have generally accepted procedures to
evaluate our current systems and upgrade them with the most current
security protocols. The second is quite simply too little cybersecurity
research is being conducted by too few researchers and too few students
to lead to the breakthrough of advancements that we will need to secure
our networks in the 21st century.
  To address our deficiencies in evaluation and implementation, last
session the House of Representatives passed H.R. 1259, a bill I
sponsored with the input of the gentleman from Washington (Mr. Baird)
and others, to upgrade the Computer Security Act of 1987 and give the
National Institute of Standards and Technology the authority to develop
and promote computer security standards within the Federal Government.
Located in my home district of Montgomery County, Maryland, NIST is our
Nation's premier developer of standards and guidelines and is ideally
suited to lead our efforts in the implementation of security practices
throughout our cyberworld.
  Today, we take up the second issue. H.R. 3394 would provide critical
funds to investigators to conduct ground-breaking research, anticipate
future needs, and respond to new vulnerabilities. It supplies money to
develop multidisciplinary centers between academia, business interests,


[[Page H210]]


and government laboratories to further collaborative efforts. And it
creates fellowships and scholarships to assure that we are training a
sufficient number of new scientists to replace our current workforce
and meet our future needs.
  H.R. 1259 and H.R. 3394 represent two sides of the same cybersecurity
coin. Implementation of current technology without inquiries into the
next generation of countermeasures and best practices is as useless as
research and development without evaluation and use. Last session, the
House overwhelmingly approved the first step toward protecting our
virtual presence with the passage of 1259, and today I urge my
colleagues to take the second. Research into cybersecurity is vital to
the health of our Nation. This bill provides the necessary tools.
  I look forward to its passage and to working with Chairman Boehlert
and Ranking Member Hall in getting both H.R. 1259 and 3394 through the
Senate and into law.
  Mr. BOEHLERT. Mr. Chairman, I yield 2 minutes to the gentleman from
Virginia (Mr. Goodlatte), the distinguished chair of the House
Republican High Technology Working Group, and the cochair of the
Congressional Internet Caucus, and a real leader in all aspects of
information technology.
  Mr. GOODLATTE. Mr. Chairman, I thank the chairman for his kind words,
but I especially thank him for his leadership on this issue. I also
thank the gentleman from Texas (Mr. Hall), the ranking Democrat; the
gentleman from Texas (Mr. Smith), the chairman of the Subcommittee on
Crime, on which I serve; and the other cosponsors of this legislation
for their leadership in getting this done.
  This is a serious problem in this country. We are vulnerable in many,
many ways to cybercrime and cyberterrorism, and this legislation will
help to cure that problem. We are not doing enough in the area of
research in this area. We are most certainly not doing enough in the
area of producing enough people to work in government and in the
private sector to make sure that the computer infrastructure of this
country is protected against hackers and criminals and terrorists. This
legislation is going to provide more resources for those colleges and
universities and other institutions that do this research and train the
people.
  In this area, I have a university in my district, James Madison
University, which has been identified by the National Security Agency
as an institution of excellence in doing research and, more
importantly, education in this area. But when they sit down to write
the curriculum on how to prevent cybercrime, to teach people how to
work for companies or the government in protecting the computer
infrastructure, that curriculum does not even change on an annual
basis, does not even change on a monthly basis. It changes on a weekly
and daily basis as new information about viruses and other types of
computer activity used by criminals and terrorists take place.
  So I am strongly supportive of this legislation. I look forward to
developing more curricula around the country to educate people and
provide the literally tens of thousands of new jobs we are going to
need in this country in this field, and this legislation lays the
groundwork. I commend the gentleman from New York and others for
bringing this legislation forward, and I strongly urge my colleagues to
support it.
  Mrs. MORELLA. Mr. Chairman, I thank the gentleman from Virginia for
his comments, and I yield 4 minutes to the gentleman from Texas (Mr.
Smith), Chair of the Subcommittee on Crime, who helped to author this
bill.
  Mr. SMITH of Texas. Mr. Chairman, I thank the gentlewoman from
Maryland and my colleague for yielding me this time.
  Mr. Chairman, I support this legislation that increases the
cybersecurity networks at our universities, businesses, and national
laboratories. The facts speak for themselves. Last month, the CERT
Coordination Center operated by Carnegie Mellon University reported
that breaches in security of computer systems more than doubled from
the year 2000 to 2001: 52,000 incidents were reported in 2001, up from
22,000 the year before. By comparison, in 1995, the number of incidents
reported was only 2,400.
  Last spring, the Subcommittee on Crime, of the Committee on the
Judiciary, that I chair, held a series of hearings on cybercrime. We
heard testimony from local, State, and Federal officials, as well as
individuals from the private sector. A common theme emerged: the demand
for highly-trained and skilled personnel to investigate computer crimes
is tremendous. This problem is compounded by the rapid advances in
technology which make continual training an absolute necessity.
  In this new age we must have training both for a new generation of
cyberwarriors, whose most important weapon is not a gun but a laptop,
and for private sector companies who must continually protect their
Internet presence. This bill seeks to expand what many States and
cities are already doing: investing in cybersecurity training
initiatives.
  Mr. Chairman, in my hometown, the University of Texas at San Antonio
has established the Center for Information Assurance and Security,
CIAS. The CIAS will be the hub of a city initiative to research,
develop, and address computer protection mechanisms to prevent and
detect intrusions of computer networks.
  This collaborative effort of CIAS brings together the best and
brightest from the public sector, such as the Air Force Information
Warfare Center, Air Intelligence Agency, and the FBI. The private
sector, with such cybersecurity companies as Ball Aerospace, Digital
Defense, SecureLogix, SecureInfo, and Symantec, also are contributing
to this effort.
  With funding provided in this bill, UTSA and dozens of other
universities will be able to train the next generation of
cyberwarriors, cyberdefenders, and what we call ``white hat netizens.''
This legislation supports the work at UTSA and other universities for
students who want to pursue computer security studies.
  While the benefits of the digital age are obvious, the Internet also
has fostered an environment where hackers retrieve private data for
amusement, individuals distribute software illegally, and viruses
circulate with the sole purpose of debilitating computers. Mr.
Chairman, a well-trained and highly skilled force of cyberprotectors is
urgently needed, and I hope my colleagues will support this bill.
  Mr. BOEHLERT. Mr. Chairman, I yield myself such time as I may
consume.
  Mr. Chairman, as we wrap up this debate, I know a lot of people are
wondering what is the big deal about cybersecurity; and my own wife,
Marianne, who is frequently at the computer when I am home, says that
we have to do a better job of explaining the importance of this, and
she is absolutely right.
  So much of what we do in this Nation is dependent upon the security
of our computer systems. Everything is dependent upon computer
technology today: our financial networks, our communication systems,
our electric power grid, our water supply. The list goes on and on. If
we have a clever 15-year-old hacker penetrate that system, that is
mischief. But when we have a terrorist with a potential to penetrate
that system and misuse it, that is serious business.
  What we are about is very serious business: to train skilled people
and to place the emphasis that needs to be placed on protecting our
cybersystem in every way, shape, or manner. That is why I am so pleased
that the administration has worked so well with us; that this Committee
on Science has done what it does traditionally on a bipartisan basis,
with people like the gentleman from Washington (Mr. Baird), the
gentleman from Texas (Mr. Hall), and the gentlewoman from Texas (Ms.
Eddie Bernice Johnson) working with our side.
  We are all in this together. We want to produce a product that is
best for this Congress and best for America; and we have done so, and I
am proud to be identified with it.
  Mr. Chairman, I have no further requests for time, and I yield back
the balance of my time.
  Mr. BAIRD. Mr. Chairman, I yield myself such time as I may consume.
  Mr. Chairman, I would just like to close as well by reiterating my
thanks to Chairman Boehlert, Chairwoman Morella, Ranking Member Hall,
as well as the committee staff.


[[Page H211]]


  Chairman Boehlert has stated it perfectly well: the American public
often takes for granted our information infrastructure; but a
coordinated attack on, for example, air traffic control, electrical
power systems, or other major vital links in our information
infrastructure, particularly if timed with a more conventional or even
a more unconventional attack, could wreak havoc on our society and
would clearly cost lives.
  The importance of this bill cannot be overstated, and I commend the
Chair and the ranking member for their leadership and appreciate the
opportunity to work with them.
  Mr. Chairman, I yield back the balance of my time.
  The CHAIRMAN. All time for general debate has expired.
  The bill shall be considered by sections as an original bill for the
purpose of amendment, and pursuant to the rule, each section is
considered read.
  During consideration of the bill for amendment, the Chair may accord
priority in recognition to a Member offering an amendment that he has
printed in the designated place in the Congressional Record. Those
amendments will be considered read.
  The Clerk will designate section 1.
  The text of section 1 is as follows:


                               H.R. 3394


       Be it enacted by the Senate and House of Representatives of
     the United States of America in Congress assembled,


     SECTION 1. SHORT TITLE.


       This Act may be cited as the ``Cyber Security Research and
     Development Act''.


     SEC. 2. FINDINGS.


       The Congress finds the following:
       (1) Revolutionary advancements in computing and
     communications technology have interconnected government,
     commercial, scientific, and educational infrastructures--
     including critical infrastructures for electric power,
     natural gas and petroleum production and distribution,
     telecommunications, transportation, water supply, banking and
     finance, and emergency and government services--in a vast,
     interdependent physical and electronic network.
       (2) Exponential increases in interconnectivity have
     facilitated enhanced communications, economic growth, and the
     delivery of services critical to the public welfare, but have
     also increased the consequences of temporary or prolonged
     failure.
       (3) A Department of Defense Joint Task Force concluded
     after a 1997 United States information warfare exercise that
     the results ``clearly demonstrated our lack of preparation
     for a coordinated cyber and physical attack on our critical
     military and civilian infrastructure''.
       (4) Computer security technology and systems implementation
     lack--
       (A) sufficient long term research funding;
       (B) adequate coordination across Federal and State
     government agencies and among government, academia, and
     industry;
       (C) sufficient numbers of outstanding researchers in the
     field; and
       (D) market incentives for the design of commercial and
     consumer security solutions.
       (5) Accordingly, Federal investment in computer and network
     security research and development must be significantly
     increased to--
       (A) improve vulnerability assessment and technological and
     systems solutions;
       (B) expand and improve the pool of information security
     professionals, including researchers, in the United States
     workforce; and
       (C) better coordinate information sharing and collaboration
     among industry, government, and academic research projects.


     SEC. 3. DEFINITIONS.


       For purposes of this Act--
       (1) the term ``Director'' means the Director of the
     National Science Foundation; and
       (2) the term ``institution of higher education'' has the
     meaning given that term in section 101 ofthe Higher Education
     Act of 1965 (20 U.S.C. 1001).


     SEC. 4. NATIONAL SCIENCE FOUNDATION RESEARCH.


       (a) Computer and Network Security Research Grants.--
       (1) In general.--The Director shall award grants for basic
     research on innovative approaches to the structure of
     computer and network hardware and software that are aimed at
     enhancing computer security. Research areas may include--
       (A) authentication and cryptography;
       (B) computer forensics and intrusion detection;
       (C) reliability of computer and network applications,
     middleware, operating systems, and communications
     infrastructure; and
       (D) privacy and confidentiality.
       (2) Merit review; competition.--Grants shall be awarded
     under this section on a merit-reviewed competitive basis.
       (3) Authorization of appropriations.--There are authorized
     to be appropriated to the National Science Foundation to
     carry out this subsection--
       (A) $35,000,000 for fiscal year 2003;
       (B) $40,000,000 for fiscal year 2004;
       (C) $46,000,000 for fiscal year 2005;
       (D) $52,000,000 for fiscal year 2006; and
       (E) $60,000,000 for fiscal year 2007.
       (b) Computer and Network Security Research Centers.--
       (1) In general.--The Director shall award multiyear grants,
     subject to the availability of appropriations, to
     institutions of higher education (or consortia thereof) to
     establish multidisciplinary Centers for Computer and Network
     Security Research. Institutions of higher education (or
     consortia thereof) receiving such grants may partner with one
     or more government laboratories or for-profit institutions.
       (2) Merit review; competition.--Grants shall be awarded
     under this subsection on a merit-reviewed competitive basis.
       (3) Purpose.--The purpose of the Centers shall be to
     generate innovative approaches to computer and network
     security by conducting cutting-edge, multidisciplinary
     research in computer and network security, including the
     research areas described in subsection (a)(1).
       (4) Applications.--An institution of higher education (or a
     consortium of such institutions) seeking funding under this
     subsection shall submit an application to the Director at
     such time, in such manner, and containing such information as
     the Director may require. The application shall include, at a
     minimum, a description of--
       (A) the research projects that will be undertaken by the
     Center and the contributions of each of the participating
     entities;
       (B) how the Center will promote active collaboration among
     scientists and engineers from different disciplines, such as
     computer scientists, engineers, mathematicians, and social
     science researchers; and
       (C) how the Center will contribute to increasing the number
     of computer and network security researchers and other
     professionals.
       (5) Criteria.--In evaluating the applications submitted
     under paragraph (4), the Director shall consider, at a
     minimum--
       (A) the ability of the applicant to generate innovative
     approaches to computer and network security and effectively
     carry out the research program;
       (B) the experience of the applicant in conducting research
     on computer and network security and the capacity of the
     applicant to foster new multidisciplinary collaborations;
       (C) the capacity of the applicant to attract and provide
     adequate support for undergraduate and graduate students and
     postdoctoral fellows to pursue computer and network security
     research; and
       (D) the extent to which the applicant will partner with
     government laboratories or for-profit entities, and the role
     the government laboratories or for-profit entities will play
     in the research undertaken by the Center.
       (6) Annual meeting.--The Director shall convene an annual
     meeting of the Centers in order to foster collaboration and
     communication between Center participants.
       (7) Authorization of appropriations.--There are authorized
     to be appropriated for the National Science Foundation to
     carry out this subsection--
       (A) $12,000,000 for fiscal year 2003;
       (B) $24,000,000 for fiscal year 2004;
       (C) $36,000,000 for fiscal year 2005;
       (D) $36,000,000 for fiscal year 2006; and
       (E) $36,000,000 for fiscal year 2007.


     SEC. 5. NATIONAL SCIENCE FOUNDATION COMPUTER AND NETWORK
                   SECURITY PROGRAMS.


       (a) Computer and Network Security Capacity Building
     Grants.--
       (1) In general.--The Director shall establish a program to
     award grants to institutions of higher education (or
     consortia thereof) to establish or improve undergraduate and
     master's degree programs in computer and network security, to
     increase the number of students who pursue undergraduate or
     master's degrees in fields related to computer and network
     security, and to provide students with experience in
     government or industry related to their computer and network
     security studies.
       (2) Merit review.--Grants shall be awarded under this
     subsection on a merit-reviewed competitive basis.
       (3) Use of funds.--Grants awarded under this subsection
     shall be used for activities that enhance the ability of an
     institution of higher education (or consortium thereof) to
     provide high-quality undergraduate and master's degree
     programs in computer and network security and to recruit and
     retain increased numbers of students to such programs.
     Activities may include--
       (A) revising curriculum to better prepare undergraduate and
     master's degree students for careers in computer and network
     security;
       (B) establishing degree and certificate programs in
     computer and network security;
       (C) creating opportunities for undergraduate students to
     participate in computer and network security research
     projects;
       (D) acquiring equipment necessary for student instruction
     in computer and network security, including the installation
     of testbed networks for student use;
       (E) providing opportunities for faculty to work with local
     or Federal Government agencies, private industry, or other
     academic institutions to develop new expertise or to
     formulate new research directions in computer and network
     security;
       (F) establishing collaborations with other academic
     institutions or departments that seek to establish, expand,
     or enhance programs in computer and network security;


[[Page H212]]


       (G) establishing student internships in computer and
     network security at government agencies or in private
     industry;
       (H) establishing or enhancing bridge programs in computer
     and network security between community colleges and
     universities; and
       (I) any other activities the Director determines will
     accomplish the goals of this subsection.
       (4) Selection process.--
       (A) Application.--An institution of higher education (or a
     consortium thereof) seeking funding under this subsection
     shall submit an application to the Director at such time, in
     such manner, and containing such information as the Director
     may require. The application shall include, at a minimum--
       (i) a description of the applicant's computer and network
     security research and instructional capacity, and in the case
     of an application from a consortium of institutions of higher
     education, a description of the role that each member will
     play in implementing the proposal;
       (ii) a comprehensive plan by which the institution or
     consortium will build instructional capacity in computer and
     information security;
       (iii) a description of relevant collaborations with
     government agencies or private industry that inform the
     instructional program in computer and network security;
       (iv) a survey of the applicant's historic student
     enrollment and placement data in fields related to computer
     and network security and a study of potential enrollment and
     placement for students enrolled in the proposed computer and
     network security program; and
       (v) a plan to evaluate the success of the proposed computer
     and network security program, including post-graduation
     assessment of graduate school and job placement and retention
     rates as well as the relevance of the instructional program
     to graduate study and to the workplace.
       (B) Awards.--(i) The Director shall ensure, to the extent
     practicable, that grants are awarded under this subsection in
     a wide range of geographic areas and categories of
     institutions of higher education.
       (ii) The Director shall award grants under this subsection
     for a period not to exceed 5 years.
       (5) Assessment required.--The Director shall evaluate the
     program established under this subsection no later than 6
     years after the establishment of the program. At a minimum,
     the Director shall evaluate the extent to which the grants
     achieved their objectives of increasing the quality and
     quantity of students pursuing undergraduate or master's
     degrees in computer and network security.
       (6) Authorization of appropriations.--There are authorized
     to be appropriated to the National Science Foundation to
     carry out this subsection--
       (A) $15,000,000 for fiscal year 2003;
       (B) $20,000,000 for fiscal year 2004;
       (C) $20,000,000 for fiscal year 2005;
       (D) $20,000,000 for fiscal year 2006; and
       (E) $20,000,000 for fiscal year 2007.
       (b) Scientific and Advanced Technology Act of 1992.--
       (1) Grants.--The Director shall provide grants under the
     Scientific and Advanced Technology Act of 1992 for the
     purposes of section 3(a) and (b) of that Act, except that the
     activities supported pursuant to this subsection shall be
     limited to improving education in fields related to computer
     and network security.
       (2) Authorization of appropriations.--There are authorized
     to be appropriated to the National Science Foundation to
     carry out this subsection--
       (A) $1,000,000 for fiscal year 2003;
       (B) $1,250,000 for fiscal year 2004;
       (C) $1,250,000 for fiscal year 2005;
       (D) $1,250,000 for fiscal year 2006; and
       (E) $1,250,000 for fiscal year 2007.
       (c) Graduate Traineeships in Computer and Network Security
     Research.--
       (1) In general.--The Director shall establish a program to
     award grants to institutions of higher education to establish
     traineeship programs for graduate students who pursue
     computer and network security research leading to a doctorate
     degree by providing funding and other assistance, and by
     providing graduate students with research experience in
     government or industry related to the students' computer and
     network security studies.
       (2) Merit review.--Grants shall be provided under this
     subsection on a merit-reviewed competitive basis.
       (3) Use of funds.--An institution of higher education shall
     use grant funds for the purposes of--
       (A) providing fellowships to students who are citizens,
     nationals, or lawfully admitted permanent resident aliens of
     the United States and are pursuing research in computer or
     network security leading to a doctorate degree;
       (B) paying tuition and fees for students receiving
     fellowships under subparagraph (A);
       (C) establishing scientific internship programs for
     students receiving fellowships under subparagraph (A) in
     computer and network security at for-profit institutions or
     government laboratories; and
       (D) other costs associated with the administration of the
     program.
       (4) Fellowship amount.--Fellowships provided under
     paragraph (3)(A) shall be in the amount of $25,000 per year,
     or the level of the National Science Foundation Graduate
     Research Fellowships, whichever is greater, for up to 3
     years.
       (5) Selection process.--An institution of higher education
     seeking funding under this subsection shall submit an
     application to the Director at such time, in such manner, and
     containing such information as the Director may require. The
     application shall include, at a minimum, a description of--
       (A) the instructional program and research opportunities in
     computer and network security available to graduate students
     at the applicant's institution; and
       (B) the internship program to be established, including the
     opportunities that will be made available to students for
     internships at for-profit institutions and government
     laboratories.
       (6) Review of applications.--In evaluating the applications
     submitted under paragraph (5), the Director shall consider--
       (A) the ability of the applicant to effectively carry out
     the proposed program;
       (B) the quality of the applicant's existing research and
     education programs;
       (C) the likelihood that the program will recruit increased
     numbers of students to pursue and earn doctorate degrees in
     computer and network security;
       (D) the nature and quality of the internship program
     established through collaborations with government
     laboratories and for-profit institutions;
       (E) the integration of internship opportunities into
     graduate students' research; and
       (F) the relevance of the proposed program to current and
     future computer and network security needs.
       (7) Authorization of appropriations.--There are authorized
     to be appropriated to the National Science Foundation to
     carry our this subsection--
       (A) $10,000,000 for fiscal year 2003;
       (B) $20,000,000 for fiscal year 2004;
       (C) $20,000,000 for fiscal year 2005;
       (D) $20,000,000 for fiscal year 2006; and
       (E) $20,000,000 for fiscal year 2007.
       (d) Graduate Research Fellowships Program Support.--
     Computer and network security shall be included among the
     fields of specialization supported by the National Science
     Foundation's Graduate Research Fellowships program under
     section 10 of the National Science Foundation Act of 1950 (42
     U.S.C. 1869).


     SEC. 6. CONSULTATION.


       In carrying out sections 4 and 5, the Director shall
     consult with other Federal agencies.


     SEC. 7. FOSTERING RESEARCH AND EDUCATION IN COMPUTER AND
                   NETWORK SECURITY.


       Section 3(a) of the National Science Foundation Act of 1950
     (42 U.S.C. 1862(a)) is amended--
       (1) by striking ``and'' at the end of paragraph (6);
       (2) by striking the period at the end of paragraph (7) and
     inserting ``; and''; and
       (3) by adding at the end the following new paragraph:
       ``(8) to take a leading role in fostering and supporting
     research and education activities to improve the security of
     networked information systems.''.


     SEC. 8. NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY
                   RESEARCH PROGRAM.


       The National Institute of Standards and Technology Act is
     amended--
       (1) by moving section 22 to the end of the Act and
     redesignating it as section 32;
       (2) by inserting after section 21 the following new
     section:


           ``research program on security of computer systems


       ``Sec. 22. (a) Establishment.--The Director shall establish
     a program of assistance to institutions of higher education
     that enter into partnerships with for-profit entities to
     support research to improve the security of computer systems.
     The partnerships may also include government laboratories.
     The program shall--
       ``(1) include multidisciplinary, long-term, high-risk
     research;
       ``(2) include research directed toward addressing needs
     identified through the activities of the Computer System
     Security and Privacy Advisory Board under section 20(f); and
       ``(3) promote the development of a robust research
     community working at the leading edge of knowledge in subject
     areas relevant to the security of computer systems by
     providing support for graduate students, post-doctoral
     researchers, and senior researchers.
       ``(b) Fellowships.--(1) The Director is authorized to
     establish a program to award post-doctoral research
     fellowships to individuals who are citizens, nationals, or
     lawfully admitted permanent resident aliens of the
     United States and are seeking research positions at
     institutions, including the Institute, engaged in research
     activities related to the security of computer systems,
     including the research areas described in section 4(a)(1)
     of the Cyber Security Research and Development Act.
       ``(2) The Director is authorized to establish a program to
     award senior research fellowships to individuals seeking
     research positions at institutions, including the Institute,
     engaged in research activities related to the security of
     computer systems, including the research areas described in
     section 4(a)(1) of the Cyber Security Research and
     Development Act. Senior research fellowships shall be made
     available for established researchers at institutions of
     higher education who seek to change research fields and
     pursue studies related to the security of computer systems.
       ``(3)(A) To be eligible for an award under this subsection,
     an individual shall submit


[[Page H213]]


     an application to the Director at such time, in such manner,
     and containing such information as the Director may require.
       ``(B) Under this subsection, the Director is authorized to
     provide stipends for post-doctoral research fellowships at
     the level of the Institute's Post Doctoral Research
     Fellowship Program and senior research fellowships at levels
     consistent with support for a faculty member in a sabbatical
     position.
       ``(c) Awards; Applications.--The Director is authorized to
     award grants or cooperative agreements to institutions of
     higher education to carry out the program established under
     subsection (a). To be eligible for an award under this
     section, an institution of higher education shall submit an
     application to the Director at such time, in such manner, and
     containing such information as the Director may require. The
     application shall include, at a minimum, a description of--
       ``(1) the number of graduate students anticipated to
     participate in the research project and the level of support
     to be provided to each;
       ``(2) the number of post-doctoral research positions
     included under the research project and the level of support
     to be provided to each;
       ``(3) the number of individuals, if any, intending to
     change research fields and pursue studies related to the
     security of computer systems to be included under the
     research project and the level of support to be provided to
     each; and
       ``(4) how the for-profit entities and any other partners
     will participate in developing and carrying out the research
     and education agenda of the partnership.
       ``(d) Program Operation.--(1) The program established under
     subsection (a) shall be managed by individuals who shall have
     both expertise in research related to the security of
     computer systems and knowledge of the vulnerabilities of
     existing computer systems. The Director shall designate such
     individuals as program managers.
       ``(2) Program managers designated under paragraph (1) may
     be new or existing employees of the Institute or individuals
     on assignment at the Institute under the Intergovernmental
     Personnel Act of 1970.
       ``(3) Program managers designated under paragraph (1) shall
     be responsible for--
       ``(A) establishing and publicizing the broad research goals
     for the program;
       ``(B) soliciting applications for specific research
     projects to address the goals developed under subparagraph
     (A);
       ``(C) selecting research projects for support under the
     program from among applications submitted to the Institute,
     following consideration of--
       ``(i) the novelty and scientific and technical merit of the
     proposed projects;
       ``(ii) the demonstrated capabilities of the individual or
     individuals submitting the applications to successfully carry
     out the proposed research;
       ``(iii) the impact the proposed projects will have on
     increasing the number of computer security researchers;
       ``(iv) the nature of the participation by for-profit
     entities and the extent to which the proposed projects
     address the concerns of industry; and
       ``(v) other criteria determined by the Director, based on
     information specified for inclusion in applications under
     subsection (c); and
       ``(D) monitoring the progress of research projects
     supported under the program.
       ``(e) Review of Program.--(1) The Director shall
     periodically review the portfolio of research awards
     monitored by each program manager designated in accordance
     with subsection (d). In conducting those reviews, the
     Director shall seek the advice of the Computer System
     Security and Privacy Advisory Board, established under
     section 21, on the appropriateness of the research goals and
     on the quality and utility of research projects managed by
     program managers in accordance with subsection (d).
       ``(2) The Director shall also contract with the National
     Research Council for a comprehensive review of the program
     established under subsection (a) during the 5th year of the
     program. Such review shall include an assessment of the
     scientific quality of the research conducted, the relevance
     of the research results obtained to the goals of the program
     established under subsection (d)(3)(A), and the progress of
     the program in promoting the development of a substantial
     academic research community working at the leading edge of
     knowledge in the field. The Director shall submit to Congress
     a report on the results of the review under this paragraph no
     later than six years after the initiation of the program.
       ``(f) Definitions.--For purposes of this section--
       ``(1) the term `computer system' has the meaning given that
     term in section 20(d)(1); and
       ``(2) the term `institution of higher education' has the
     meaning given that term in section 101 of the Higher
     Education Act of 1965 (20 U.S.C. 1001).''; and
       (3) in section 20(d)(1)(B)(i) (15 U.S.C. 278g-
     3(d)(1)(B)(i)), by inserting ``and computer networks'' after
     ``computers''.


     SEC. 9. COMPUTER SECURITY REVIEW, PUBLIC MEETINGS, AND
                   INFORMATION.


       Section 20 of the National Institute of Standards and
     Technology Act (15 U.S.C. 278g-3) is amended by adding at the
     end the following new subsection:
       ``(f) There are authorized to be appropriated to the
     Secretary $1,060,000 for fiscal year 2003 and $1,090,000 for
     fiscal year 2004 to enable the Computer System Security and
     Privacy Advisory Board, established by section 21, to
     identify emerging issues, including research needs, related
     to computer security, privacy, and cryptography and, as
     appropriate, to convene public meetings on those subjects,
     receive presentations, and publish reports, digests, and
     summaries for public distribution on those subjects.''.


     SEC. 10. INTRAMUTAL SECURITY RESEARCH.


       Section 20 of the National Institute of Standards and
     Technology Act (15 U.S.C. 278g-3) is further amended--
       (1) by redesignating subsection (d) as subsection (e); and
       (2) by inserting after subsection (c) the following new
     subsection:
       ``(d) As part of the research activities conducted in
     accordance with subsection (b)(4), the Institute shall--
       ``(1) conduct a research program to address emerging
     technologies associated with assembling a networked computer
     system from components while ensuring it maintains desired
     security properties;
       ``(2) carry out research and support standards development
     activities associated with improving the security of real-
     time computing and communications systems for use in process
     control; and
       ``(3) carry out multidisciplinary, long-term, high-risk
     research on ways to improve the security of computer
     systems.''.


     SEC. 11. AUTHORIZATION OF APPROPRIATIONS.


       There are authorized to be appropriated to the Secretary of
     Commerce for the National Institute of Standards and
     Technology--
       (1) for activities under section 22 of the National
     Institute of Standards and Technology Act, as added by
     section 8 of this Act--
       (A) $25,000,000 for fiscal year 2003;
       (B) $40,000,000 for fiscal year 2004;
       (C) $55,000,000 for fiscal year 2005;
       (D) $70,000,000 for fiscal year 2006;
       (E) $85,000,000 for fiscal year 2007; and
       (F) such sums as may be necessary for fiscal years 2008
     through 2012; and
       (2) for activities under section 20(d) of the National
     Institute of Standards and Technology Act, as added by
     section 10 of this Act--
       (A) $6,000,000 for fiscal year 2003;
       (B) $6,200,000 for fiscal year 2004;
       (C) $6,400,000 for fiscal year 2005;
       (D) $6,600,000 for fiscal year 2006; and
       (E) $6,800,000 for fiscal year 2007.


     SEC. 12. NATIONAL ACADEMY OF SCIENCES STUDY ON COMPUTER AND
                   NETWORK SECURITY IN CRITICAL INFRASTRUCTURES.


       (a) Study.--Not later than 3 months after the date of the
     enactment of this Act, the Director of the National Institute
     of Standards and Technology shall enter into an arrangement
     with the National Research Council of the National Academy of
     Sciences to conduct a study of the vulnerabilities of the
     Nation's network infrastructure and make recommendations for
     appropriate improvements. The National Research Council
     shall--
       (1) review existing studies and associated data on the
     architectural, hardware, and software vulnerabilities and
     interdependencies in United States critical infrastructure
     networks;
       (2) identify and assess gaps in technical capability for
     robust critical infrastructure network security, and make
     recommendations for research priorities and resource
     requirements; and
       (3) review any and all other essential elements of computer
     and network security, including security of industrial
     process controls, to be determined in the conduct of the
     study.
       (b) Report.--The Director of the National Institute of
     Standards and Technology shall transmit a report containing
     the results of the study and recommendations required by
     subsection (a) to the Congress not later than 21 months after
     the date of enactment of this Act.
       (c) Security.--The Director of the National Institute of
     Standards and Technology shall ensure that no information
     that is classified is included in any publicly released
     version of the report required by this section.
       (d) Authorization of Appropriations.--There are authorized
     to be appropriated to the Secretary of Commerce for the
     National Institute of Standards and Technology for the
     purposes of carrying out this section, $700,000.


  Mr. BOEHLERT (during the reading). Mr. Chairman, I ask unanimous
consent that the remainder of the bill be printed in the Record and
open to amendment at any point.
  The CHAIRMAN. Is there objection to the request of the gentleman from
New York?
  There was no objection.
  The CHAIRMAN. Are there any amendments to the bill?
  If not, under the rule, the Committee rises.
  Mr. FORBES. Mr. Chairman, I rise today in strong support of the Cyber
Security Research and Development Act, which will help the United
States reduce its vulnerability to cyberattacks by terrorists and
common criminals alike.
  Cyber attacks may not bring the large scale death and destruction of
attacks by biological or chemical agents or other weapons of mass
destruction, but they are just as real a threat


[[Page H214]]


to the American people. They hold the power to disrupt our way of life,
harm people's personal interests, and cause tremendous losses for
businesses.
  Computers have become increasingly ubiquitous. More than half of all
American use the Internet, with more than 2 million people going online
for the first time each month. Computer-based technology powers the way
we bank, the way we shop, and the way we exchange information. And,
this makes nearly every American vulnerable to cyber threats.
  The Cyber Security Research and Development Act will reduce that
vulnerability in two ways. First, it will improve our research efforts
so that we can stop cyber terrorists before they strike. Too few of our
most gifted minds are working on this area of research. The funding
available in this bill will power partnerships between the government
and academia to remedy this Second, H.R. 3394 will improve our
education programs so that average Americans can spot threats and react
quickly.
  As a member of the Science Committee, I heard the testimony of
research experts who indicated how great the threat is and how much
could be achieved to defeat it if we dedicated ourselves to this goal.
That is why I am pleased to be a cosponsor of this legislation, and I
urge my colleagues to support it today.
  Mr. RODRIGUEZ. Mr. Chairman, I rise today in support of H.R. 3394,
the Cyber Security Research and Development Act. This bill would
strengthen our nation's ability to protect the critical infrastructure
that supplies our water, keeps the electricity on in our homes, and
ensures that our law enforcement officials have communication
capabilities at all times.
  San Antonio has been a leader in developing the type of technology
and educational programs made possible under this bill. A growing
partnership of educational, private enterprise and military expertise
make San Antonio ``Cyber City'' USA.
  The University of Texas at San Antonio has developed the Center for
Infrastructure Assurance and Security to educate and train world-class
information technology professionals. With a faculty drawn from both
the private sector and the Air Force, this outstanding program will
produce skilled graduates ready to meet the growing shortage of
information technology professionals in the federal government and
private sector. It will also serve as a educational program for mid-
level professionals to improve their information technology job skills
needed for their current job, or help them retrain in the information
technology field.
  San Antonio is also the home of the Information Technology and
Assurance Academy, an innovative educational center devoted to talented
11th and 12th graders interested in information technology. The Academy
will give these young minds an introduction to future career
opportunities in the information and technology field. In addition to
developing their interest in information technology, this program seeks
to instill a sense of civic responsibility that will serve them and the
community in which they live.
  San Antonio has 45 private companies that have developed state-of-
the-art information assurance technology. These companies lead the
field in developing intrusion detection technology and providing
vulnerability assessments for both the private sector and the
government.
  The military also has a world-class computer monitoring facility in
San Antonio. The Air Force's computer emergency response team, located
at Lackland Air Force Base, leads the DoD in intrusion technology, and
helps protect Air Force computer systems, 24 hours a day, 7 days a
week, around the globe. This system helps ensure that the computer
systems used by our Armed Forces to protect our nation are free from
hackers, viruses and other forms of cyber terrorism.
  This bill would provide the nation with needed resources to fight the
war on cyber terrorism. Homeland security starts at the local level and
this bill would allow communities throughout the United States to
educate and train qualified information professionals in their
community and encourage research that would give the government and
private industry the tools to protect our nation's critical
infrastructure.
  Ms. HART. Mr. Chairman, I rise today in support of H.R. 3394, the
Cyber Security Research and Development Act.
  H.R. 3394, seeks to address the vulnerability of the computer systems
and networks that have become part of all our daily lives. It is all to
clear to us, that we must be proactive and defend these systems from
simple hackers to coordinated terrorist attacks.
  At hearings on cyber security last year in the Science Committee, we
heard updates on research and development in that field. The news was
sobering. The information we were provided was that too little research
being conducted in this area, too few researchers were prepared to meet
the needs of securing our systems, too few students going into fields
relating to cyber security, and there was inadequate coordination
between government, academia and industry. This must change and we have
great resources in western Pennsylvania to help deliver these changes.
  Carnegie Mellon University (CMU), just outside of my district, has
been a leader in the field of cyber security. In 2001, the National
Security Council named them as a ``Center of Excellence in Security
Education.'' Also, the CERT Coordination Center, a government-funded
computer emergency-response team at CMU, helps to track the risks and
frequencies of cyber crimes. According to the Center, there were 52,658
security breaches and attacks last year, up 50 percent from the
previous year. The Center also got reports of 2,437 computer
vulnerabilities, more than double the figures from the previous year.
While having success with students in the field of cyber security,
they, too, have expressed that deficiencies exist for cyber security.
This includes the lack of undergraduates and graduates who can provide
the necessary research.
  The ``Cyber Security Research and Development Act'' provides help for
these areas by making grants available under National Science
Foundation (NSF) for: research in innovative computer and network
security; establishment of Centers for Computer and Network Security
research in partnership with other universities; enabling universities
to offer fellowships; and research in industry and other opportunities
for doctoral degrees. H.R. 3394 also provides grants to the National
Institute of Standards and Technology (NIST) for: support for high-
risk, cutting edge research by academics working with industry; and for
the establishment of a fellowship to increase its number of researchers
in computer and network security.
  This important legislation will provide us with the necessary
investment in cyber security and needed support of existing resources,
so that we are not with out the necessary experts to protect our
critical computer infrastructure from terrorist attacks.


                              {time}  1130


  Accordingly, the Committee rose; and the Speaker pro tempore (Mr.
Pickering) having assumed the chair, Mr. Sununu, Chairman of the
Committee of the Whole House on the State of the Union, reported that
that Committee, having had under consideration the bill (H.R. 3394) to
authorize funding for computer and network security research and
development and research fellowship programs, and for other purposes,
pursuant to House Resolution 343, he reported the bill back to the
House.
  The SPEAKER pro tempore. Under the rule, the previous question is
ordered.
  The question is on the engrossment and third reading of the bill.
  The bill was ordered to be engrossed and read a third time, and was
read the third time.
  The SPEAKER pro tempore. The question is on the passage of the bill.
  The question was taken; and the Speaker pro tempore announced that
the ayes appeared to have it.
  Mr. BOEHLERT. Mr. Speaker, I object to the vote on the ground that a
quorum is not present and make the point of order that a quorum is not
present.
  The SPEAKER pro tempore. Evidently a quorum is not present.
  The Sergeant at Arms will notify absent Members.
  Pursuant to clause 8 of rule XX, this 15-minute vote on passage of
H.R. 3394 will be followed by a 5-minute vote, if ordered, on agreeing
to the Speaker's approval of the Journal.
  The vote was taken by electronic device, and there were--yeas 400,
nays 12, not voting 23, as follows:


                             [Roll No. 13]


                               YEAS--400


     Abercrombie
     Ackerman
     Aderholt
     Allen
     Andrews
     Armey
     Baca
     Bachus
     Baird
     Baker
     Baldacci
     Baldwin
     Ballenger
     Barcia
     Barr
     Barrett
     Bartlett
     Barton
     Bass
     Becerra
     Bentsen
     Bereuter
     Berkley
     Berman
     Berry
     Biggert
     Bilirakis
     Bishop
     Blumenauer
     Blunt
     Boehlert
     Boehner
     Bonilla
     Bonior
     Boozman
     Borski
     Boswell
     Boucher
     Boyd
     Brady (PA)
     Brady (TX)
     Brown (FL)
     Brown (OH)
     Brown (SC)
     Bryant
     Burr
     Buyer
     Callahan
     Calvert
     Camp
     Cannon
     Cantor
     Capito
     Capps
     Cardin
     Carson (IN)
     Carson (OK)
     Castle
     Chabot
     Chambliss
     Clay
     Clayton
     Clement
     Clyburn
     Coble
     Combest
     Condit
     Conyers
     Cooksey
     Costello
     Cox
     Coyne
     Cramer
     Crane
     Crenshaw
     Crowley
     Culberson
     Cummings
     Cunningham
     Davis (CA)
     Davis (FL)


[[Page H215]]


     Davis (IL)
     Davis, Jo Ann
     Davis, Tom
     Deal
     DeFazio
     DeGette
     Delahunt
     DeLauro
     DeLay
     DeMint
     Deutsch
     Diaz-Balart
     Dicks
     Dingell
     Doggett
     Dooley
     Doolittle
     Doyle
     Dreier
     Dunn
     Edwards
     Ehlers
     Ehrlich
     Emerson
     Engel
     English
     Eshoo
     Etheridge
     Evans
     Everett
     Farr
     Fattah
     Ferguson
     Filner
     Fletcher
     Foley
     Forbes
     Ford
     Fossella
     Frank
     Frost
     Gallegly
     Ganske
     Gekas
     Gephardt
     Gibbons
     Gilchrest
     Gillmor
     Gilman
     Gonzalez
     Goode
     Goodlatte
     Gordon
     Goss
     Graham
     Granger
     Graves
     Green (TX)
     Green (WI)
     Greenwood
     Grucci
     Gutierrez
     Gutknecht
     Hall (TX)
     Hansen
     Harman
     Hart
     Hastings (FL)
     Hastings (WA)
     Hayes
     Hayworth
     Herger
     Hill
     Hilliard
     Hinchey
     Hinojosa
     Hobson
     Hoeffel
     Hoekstra
     Holden
     Holt
     Honda
     Hooley
     Horn
     Hostettler
     Houghton
     Hoyer
     Hulshof
     Hunter
     Hyde
     Inslee
     Isakson
     Israel
     Issa
     Istook
     Jackson (IL)
     Jackson-Lee (TX)
     Jenkins
     John
     Johnson (CT)
     Johnson (IL)
     Johnson, E. B.
     Johnson, Sam
     Jones (OH)
     Kanjorski
     Kaptur
     Keller
     Kelly
     Kennedy (MN)
     Kennedy (RI)
     Kerns
     Kildee
     Kilpatrick
     Kind (WI)
     King (NY)
     Kirk
     Kleczka
     Knollenberg
     Kolbe
     Kucinich
     LaFalce
     LaHood
     Lampson
     Langevin
     Lantos
     Largent
     Larsen (WA)
     Larson (CT)
     Latham
     LaTourette
     Leach
     Lee
     Levin
     Lewis (CA)
     Lewis (GA)
     Lewis (KY)
     Linder
     Lipinski
     LoBiondo
     Lofgren
     Lowey
     Lucas (KY)
     Lucas (OK)
     Lynch
     Maloney (CT)
     Maloney (NY)
     Manzullo
     Markey
     Mascara
     Matheson
     Matsui
     McCarthy (MO)
     McCarthy (NY)
     McCollum
     McCrery
     McGovern
     McHugh
     McInnis
     McIntyre
     McKeon
     McKinney
     McNulty
     Meehan
     Meek (FL)
     Meeks (NY)
     Menendez
     Mica
     Millender-McDonald
     Miller, Dan
     Miller, Gary
     Miller, George
     Miller, Jeff
     Mink
     Mollohan
     Moore
     Moran (KS)
     Moran (VA)
     Morella
     Murtha
     Myrick
     Nadler
     Napolitano
     Neal
     Nethercutt
     Ney
     Northup
     Nussle
     Oberstar
     Olver
     Ortiz
     Osborne
     Ose
     Otter
     Owens
     Oxley
     Pallone
     Pascrell
     Pastor
     Payne
     Pelosi
     Pence
     Peterson (MN)
     Peterson (PA)
     Petri
     Phelps
     Pickering
     Platts
     Pombo
     Pomeroy
     Portman
     Price (NC)
     Pryce (OH)
     Putnam
     Quinn
     Radanovich
     Rahall
     Ramstad
     Rangel
     Regula
     Rehberg
     Reyes
     Reynolds
     Rivers
     Rodriguez
     Roemer
     Rogers (KY)
     Rogers (MI)
     Rohrabacher
     Ros-Lehtinen
     Ross
     Rothman
     Roybal-Allard
     Rush
     Ryun (KS)
     Sabo
     Sanchez
     Sanders
     Sandlin
     Sawyer
     Saxton
     Schakowsky
     Schiff
     Schrock
     Scott
     Sensenbrenner
     Serrano
     Sessions
     Shadegg
     Shays
     Sherman
     Sherwood
     Shimkus
     Shows
     Shuster
     Simmons
     Simpson
     Skeen
     Skelton
     Smith (MI)
     Smith (NJ)
     Smith (TX)
     Smith (WA)
     Snyder
     Souder
     Spratt
     Stark
     Stearns
     Stenholm
     Strickland
     Stump
     Stupak
     Sununu
     Sweeney
     Tanner
     Tauscher
     Tauzin
     Taylor (MS)
     Taylor (NC)
     Terry
     Thomas
     Thompson (CA)
     Thompson (MS)
     Thornberry
     Thune
     Thurman
     Tiahrt
     Tiberi
     Tierney
     Toomey
     Towns
     Turner
     Udall (CO)
     Udall (NM)
     Upton
     Velazquez
     Visclosky
     Vitter
     Walden
     Walsh
     Wamp
     Watkins (OK)
     Watson (CA)
     Watt (NC)
     Watts (OK)
     Waxman
     Weiner
     Weldon (FL)
     Weldon (PA)
     Weller
     Wexler
     Wicker
     Wilson (NM)
     Wilson (SC)
     Wolf
     Woolsey
     Wu
     Wynn
     Young (AK)
     Young (FL)


                                NAYS--12


     Akin
     Collins
     Duncan
     Flake
     Hefley
     Jones (NC)
     Kingston
     Norwood
     Paul
     Royce
     Schaffer
     Tancredo


                             NOT VOTING--23


     Blagojevich
     Bono
     Burton
     Capuano
     Cubin
     Frelinghuysen
     Hall (OH)
     Hastert
     Hilleary
     Jefferson
     Luther
     McDermott
     Obey
     Pitts
     Riley
     Roukema
     Ryan (WI)
     Shaw
     Slaughter
     Solis
     Traficant
     Waters
     Whitfield


                              {time}  1152


  Messrs. AKIN, HEFLEY and NORWOOD changed their vote from ``yea'' to
``nay.''
  So the bill was passed.
  The result of the vote was announced as above recorded.
  A motion to reconsider was laid on the table.
  Stated for:
  Ms. SOLIS. Mr. Speaker, during rollcall vote No. 13 on February 7,
2002, the voting machine malfunctioned and did not record my vote. Had
it registered my vote, I would have voted ``yea.''


                          ____________________

[Congressional Record: February 7, 2002 (House)]
[Page H204-H206]
From the Congressional Record Online via GPO Access [wais.access.gpo.gov]
[DOCID:cr07fe02-60]




 PROVIDING FOR CONSIDERATION OF H.R. 3394, CYBER SECURITY RESEARCH AND
                            DEVELOPMENT ACT


  Mr. DIAZ-BALART. Mr. Speaker, by direction of the Committee on Rules,
I call up House Resolution 343 and ask for its immediate consideration.
  The Clerk read the resolution, as follows:


                              H. Res. 343


       Resolved, That at any time after the adoption of this
     resolution the Speaker may, pursuant to clause 2(b) of rule
     XVIII, declare the House resolved into the Committee of the
     Whole House on the state of the Union for consideration of
     the bill (H.R. 3394) to authorize funding for computer and
     network security research and development and research
     fellowship programs, and for other purposes. The first
     reading of the bill shall be dispensed with. Points of order
     against consideration of the bill for failure to comply with
     clause 4(a) of rule XIII are waived. General debate shall be
     confined to the bill and shall not exceed one hour equally
     divided and controlled by the chairman and ranking minority
     member of the Committee on Science. After general debate the
     bill shall be considered for amendment under the five-minute
     rule. Each section of the bill shall be considered as read.
     During consideration of the bill for amendment, the Chairman
     of the Committee of the Whole may accord priority in
     recognition on the basis of whether the Member offering an
     amendment has caused it to be printed in the portion of the
     Congressional Record designated for that purpose in clause 8
     of rule XVIII. Amendments so printed shall be considered as
     read. At the conclusion of consideration of the bill for
     amendment the Committee shall rise and report the bill to the
     House with such amendments as may have been adopted. The
     previous question shall be considered as ordered on the bill
     and amendments thereto to final passage without intervening
     motion except one motion to recommit with or without
     instructions.


  The SPEAKER pro tempore. The gentleman from Florida (Mr. Diaz-Balart)
is recognized for 1 hour.
  Mr. DIAZ-BALART. Mr. Speaker, for the purpose of debate only, I yield
the customary 30 minutes to the gentleman from Florida (Mr. Hastings),
pending which I yield myself such time as I may consume. During
consideration of this resolution, all time yielded is for the purpose
of debate only.
  (Mr. DIAZ-BALART asked and was given permission to revise and extend
his remarks.)
  Mr. DIAZ-BALART. Mr. Speaker, House Resolution 343 is an open rule
providing for the consideration of H.R. 3394, the Cyber Security
Research and Development Act. The rule provides 1 hour of general
debate evenly divided and controlled by the chairman and ranking
minority member of the Committee on Science. This is a fair and open
rule that will provide every Member with the opportunity to offer
amendments, allowing Members ample time to debate the important issues
related to this legislation.


                              {time}  1015


  Mr. Speaker, the attacks of September 11 have forced the American
people and this Congress to recognize that the threat of terror is
present on many fronts. To adequately protect the United States, we
must address all of our security vulnerabilities. This enormous task
includes securing our Nation's computer and communications
infrastructure.
  The urgency with which we must proceed with regard to this
infrastructure has already been demonstrated. In 1997, the Pentagon
conducted an information warfare exercise to test the vulnerability of
the U.S. information infrastructure. The exercise consisted of 35
National Security Agency computer


[[Page H205]]


specialists using off-the-shelf technology to attack U.S. information
systems. The group of NSA specialists were able to attack and penetrate
government and commercial sites.
  The next year, failure of the Galaxy 4 communications satellite
further demonstrated the effects that a cyberattack could have on our
information systems. The failure of Galaxy 4 disrupted credit card
purchases, ATM transactions, 90 percent of the Nation's pagers and
emergency communications. While studies have concluded that the United
States is vulnerable to cyberattacks, not enough has been done to
safeguard this sensitive information system.
  This is of grave concern for the safety of the Nation. Just this past
Tuesday it was reported that since September 11 there has been a series
of cyberattacks that have targeted the Pentagon, the Department of
Energy, NASA and other agencies, resulting in the theft of vast
quantities of national defense research. One of the groups went as far
as declaring a ``cyber jihad'' against the United States.
  We need only look 90 miles off the coast of Florida to see the
possibility of future attacks, Mr. Speaker. This past year the Director
of the Defense Intelligence Agency testified before the Senate
Permanent Select Committee on Intelligence that the Cuban regime could
initiate information warfare or computer network attacks that could
seriously disrupt the United States military.
  That regime, which is the only one of the seven states on the State
Department's list of terrorist nations in our hemisphere, is believed
to share information with other terrorist states such as Iran, Libya
and Iraq. With its significant ties to fellow terrorist nations in the
Middle East, the Cuban regime has the ability to serve as a type of
forward-operating location for terror in our hemisphere.
  The potential for cyberwarfare is real, and the underlying
legislation that we are going to address to date helps to address that
threat. H.R. 3394 is a bipartisan piece of legislation designed to
increase research efforts which are needed to fill the void in this
critical area. The legislation will task the National Science
Foundation and the National Institute of Standards and Technology to
coordinate a partnership with academic institutions to ensure that
information systems are secure in the United States.
  This partnership will face the emerging threat by increasing the
amount of cybersecurity research being supported by the Federal
Government and by increasing the number of cybersecurity researchers in
the Nation. The bill will provide $878 million over 5 years to
implement new academic programs, provide grants and fellowships,
providing for the common defense of our Nation's technological
infrastructure.
  The underlying legislation, as I stated before, is a product of
bipartisanship. It was reported out of the Committee on Science by
voice vote. It is a very important bill that focuses on obviously a
very important subject matter. As I stated before, Mr. Speaker, it is
an open rule. It is a fair rule. I urge my colleagues to support both
the rule and the underlying legislation.
  Mr. Speaker, I reserve the balance of my time.
  Mr. HASTINGS of Florida. Mr. Speaker, I yield myself such time as I
may consume, and I thank the gentleman from Florida for yielding me the
customary 30 minutes.
  Mr. Speaker, I rise in support of the Cyber Security Research and
Development Act and in support of the rule. I want to especially
congratulate the Committee on Science chairman, the gentleman from New
York (Mr. Boehlert), and the ranking member, the gentleman from Texas
(Mr. Hall), for their very hard work on this bill and for their
recognition of the importance to the entire country of the necessary
investments in research that this bill funds.
  Mr. Speaker, we all know that in 21st century America there is barely
a thing that we do that does not involve the computer. From simple e-
mail from a parent to a child in college, to computer-guided missiles
that fall precisely on their targets, computers are the very backbone
of our society today.
  Currently, the vulnerability of our Nation's computer system to cyber
terrorism is great, as my friend from Florida has pointed out. This
bill is the first step in a long process to secure our Nation's
technological lifeblood.
  In college I was a science major, and I well know the importance of
research and development in helping to solve this country's most
difficult problems. I also had the distinct honor to serve in Congress
on the Committee on Science, and I can tell you, Mr. Speaker, we have a
serious problem on our hands, and it is up to the emerging scientists
and engineers to fix it.
  Why are they not doing it now? Because the Federal Government is not
providing enough resources nor offering the proper incentives. This
bill is a step forward to change this pattern for years to come.
  For just a moment I want to discuss a portion of the bill relating to
minority participation in the programs created in this bill. I was
going to offer an amendment, and I shall not in light of discussions
that I had with the Chair of the Black Caucus, and report language that
seemingly covers some of what I had in mind.
  In particular, I want to commend the Chair of the Congressional Black
Caucus, the gentlewoman from Texas (Ms. Eddie Bernice Johnson), for her
very hard work on this issue.
  A report of the National Science Foundation reveals that blacks,
Hispanics and Native Americans comprise 23 percent of the population,
but earn on a whole only 14.2 percent of the bachelor's degrees, 8.1
percent of the master's degrees and 5 percent of the doctorate degrees
in science and engineering. This bill gives the NSF and the National
Institute of Standards and Technology the tools to correct the
imbalances uncovered in their own studies showing, as throughout
government, that minorities are not being hired at a pace that they
should, and that the process itself is so extraordinary that it makes
it difficult for people to even accomplish the standards that are set
forth.
  If, Mr. Speaker, we are to ensure American security from terrorist
threats, we will need to mobilize all of the human resources available.
That includes minority Americans.
  Again, I congratulate the gentlewoman from Texas (Ms. Eddie Bernice
Johnson), the gentleman from New York (Chairman Boehlert), the ranking
member, the gentleman from Texas (Mr. Hall), and the rest of the
Committee on Science for their recognition of that need and their
attempts to address it.
  Mr. Speaker, this is a necessary bill. It has earned the bipartisan
support of the Committee on Science, and I would suggest that it
deserves the same bipartisan support here on the floor of the House of
Representatives.
  Mr. Speaker, I yield back the balance of my time.
  Mr. DIAZ-BALART. Mr. Speaker, I yield myself such time as I may
consume.
  Mr. Speaker, I again reiterate my strong support for the underlying
legislation, as well the rule before us.
  Mr. Speaker, I have no further requests for time, I yield back the
balance of my time, and I move the previous question on the resolution.
  The previous question was ordered.
  The SPEAKER pro tempore (Mr. Sununu). The question is on the
resolution.
  The question was taken; and the Speaker pro tempore announced that
the ayes appeared to have it.
  Mr. HASTINGS of Florida. Mr. Speaker, I object to the vote on the
ground that a quorum is not present and make the point of order that a
quorum is not present.
  The SPEAKER pro tempore. Evidently a quorum is not present.
  The Sergeant at Arms will notify absent Members.
  The vote was taken by electronic device, and there were--yeas 392,
nays 0, not voting 43, as follows:


                             [Roll No. 12]


                               YEAS--392


     Abercrombie
     Ackerman
     Aderholt
     Akin
     Allen
     Andrews
     Armey
     Baca
     Bachus
     Baird
     Baker
     Baldacci
     Baldwin
     Ballenger
     Barcia
     Barr
     Barrett
     Bartlett
     Bass
     Becerra
     Bentsen
     Bereuter
     Berkley
     Berman
     Berry
     Biggert
     Bilirakis
     Bishop
     Blumenauer
     Blunt
     Boehlert
     Boehner
     Bonilla
     Bonior
     Boozman
     Borski
     Boswell
     Boucher
     Boyd
     Brady (PA)
     Brady (TX)
     Brown (FL)


[[Page H206]]


     Brown (OH)
     Brown (SC)
     Bryant
     Buyer
     Callahan
     Calvert
     Camp
     Cannon
     Cantor
     Capito
     Capps
     Cardin
     Carson (IN)
     Carson (OK)
     Castle
     Chabot
     Chambliss
     Clayton
     Clement
     Clyburn
     Coble
     Collins
     Combest
     Condit
     Conyers
     Cooksey
     Costello
     Cox
     Coyne
     Cramer
     Crane
     Crenshaw
     Crowley
     Culberson
     Cummings
     Cunningham
     Davis (CA)
     Davis (FL)
     Davis (IL)
     Davis, Jo Ann
     Davis, Tom
     Deal
     DeFazio
     DeGette
     Delahunt
     DeLauro
     DeLay
     DeMint
     Deutsch
     Diaz-Balart
     Dicks
     Dingell
     Doggett
     Dooley
     Doolittle
     Doyle
     Dreier
     Duncan
     Dunn
     Edwards
     Ehlers
     Ehrlich
     Emerson
     Engel
     English
     Eshoo
     Etheridge
     Everett
     Farr
     Ferguson
     Filner
     Flake
     Fletcher
     Foley
     Forbes
     Ford
     Fossella
     Frank
     Frost
     Gallegly
     Ganske
     Gekas
     Gephardt
     Gibbons
     Gilchrest
     Gillmor
     Gilman
     Gonzalez
     Goodlatte
     Gordon
     Goss
     Graham
     Granger
     Graves
     Green (TX)
     Green (WI)
     Greenwood
     Grucci
     Gutierrez
     Gutknecht
     Hall (TX)
     Hansen
     Harman
     Hart
     Hastings (FL)
     Hastings (WA)
     Hayes
     Hayworth
     Hefley
     Herger
     Hill
     Hilliard
     Hinchey
     Hinojosa
     Hobson
     Hoeffel
     Hoekstra
     Holden
     Holt
     Honda
     Hooley
     Horn
     Hostettler
     Houghton
     Hoyer
     Hulshof
     Hunter
     Inslee
     Isakson
     Israel
     Issa
     Istook
     Jackson (IL)
     Jackson-Lee (TX)
     Jenkins
     John
     Johnson (CT)
     Johnson (IL)
     Johnson, E. B.
     Johnson, Sam
     Jones (NC)
     Jones (OH)
     Kanjorski
     Keller
     Kelly
     Kennedy (MN)
     Kennedy (RI)
     Kerns
     Kildee
     Kilpatrick
     Kind (WI)
     King (NY)
     Kingston
     Kirk
     Knollenberg
     Kolbe
     Kucinich
     LaFalce
     LaHood
     Lampson
     Langevin
     Lantos
     Larsen (WA)
     Larson (CT)
     Latham
     LaTourette
     Leach
     Lee
     Levin
     Lewis (CA)
     Lewis (GA)
     Lewis (KY)
     Lipinski
     LoBiondo
     Lofgren
     Lowey
     Lucas (KY)
     Lynch
     Maloney (CT)
     Manzullo
     Markey
     Mascara
     Matheson
     Matsui
     McCarthy (MO)
     McCarthy (NY)
     McCollum
     McCrery
     McGovern
     McHugh
     McInnis
     McIntyre
     McKeon
     McNulty
     Meehan
     Meek (FL)
     Meeks (NY)
     Menendez
     Mica
     Millender-McDonald
     Miller, Dan
     Miller, Gary
     Miller, George
     Miller, Jeff
     Mink
     Mollohan
     Moran (KS)
     Moran (VA)
     Morella
     Murtha
     Myrick
     Nadler
     Napolitano
     Neal
     Nethercutt
     Ney
     Norwood
     Nussle
     Oberstar
     Olver
     Ortiz
     Osborne
     Ose
     Otter
     Owens
     Oxley
     Pallone
     Pascrell
     Pastor
     Paul
     Payne
     Pelosi
     Pence
     Peterson (MN)
     Peterson (PA)
     Petri
     Phelps
     Pickering
     Platts
     Pombo
     Pomeroy
     Portman
     Price (NC)
     Pryce (OH)
     Putnam
     Quinn
     Radanovich
     Rahall
     Ramstad
     Rangel
     Regula
     Rehberg
     Reyes
     Reynolds
     Rivers
     Rodriguez
     Roemer
     Rogers (KY)
     Rogers (MI)
     Rohrabacher
     Ros-Lehtinen
     Ross
     Rothman
     Roybal-Allard
     Royce
     Rush
     Ryun (KS)
     Sabo
     Sanchez
     Sanders
     Sandlin
     Sawyer
     Saxton
     Schaffer
     Schakowsky
     Schiff
     Schrock
     Scott
     Sensenbrenner
     Serrano
     Sessions
     Shadegg
     Shays
     Sherman
     Sherwood
     Shimkus
     Shows
     Shuster
     Simmons
     Simpson
     Skeen
     Skelton
     Smith (MI)
     Smith (NJ)
     Smith (TX)
     Smith (WA)
     Snyder
     Solis
     Souder
     Spratt
     Stark
     Stearns
     Stenholm
     Strickland
     Stump
     Stupak
     Sununu
     Sweeney
     Tancredo
     Tanner
     Tauscher
     Taylor (MS)
     Taylor (NC)
     Terry
     Thomas
     Thompson (CA)
     Thompson (MS)
     Thornberry
     Thune
     Thurman
     Tiahrt
     Tiberi
     Tierney
     Toomey
     Towns
     Turner
     Udall (CO)
     Udall (NM)
     Upton
     Velazquez
     Visclosky
     Vitter
     Walden
     Walsh
     Wamp
     Watkins (OK)
     Watson (CA)
     Watt (NC)
     Watts (OK)
     Waxman
     Weiner
     Weller
     Wexler
     Wicker
     Wilson (SC)
     Wolf
     Woolsey
     Wu
     Wynn
     Young (FL)


                             NOT VOTING--43


     Barton
     Blagojevich
     Bono
     Burr
     Burton
     Capuano
     Clay
     Cubin
     Evans
     Fattah
     Frelinghuysen
     Goode
     Hall (OH)
     Hastert
     Hilleary
     Hyde
     Jefferson
     Kaptur
     Kleczka
     Largent
     Linder
     Lucas (OK)
     Luther
     Maloney (NY)
     McDermott
     McKinney
     Moore
     Northup
     Obey
     Pitts
     Riley
     Roukema
     Ryan (WI)
     Shaw
     Slaughter
     Tauzin
     Traficant
     Waters
     Weldon (FL)
     Weldon (PA)
     Whitfield
     Wilson (NM)
     Young (AK)


                              {time}  1047


  So the resolution was agreed to.
  The result of the vote was announced as above recorded.
  A motion to reconsider was laid on the table.
  Stated for:
  Mr. BARTON of Texas. Mr. Speaker, on rollcall No. 12 I was
inadvertently detained. Had I been present, I would have voted ``yea.''


                          ____________________

[Congressional Record: February 7, 2002 (House)] [Page H216] From the Congressional Record Online via GPO Access [wais.access.gpo.gov] [DOCID:cr07fe02-64] PERSONAL EXPLANATION Mr. RILEY. Mr. Speaker, I was unavoidably detained for rollcall No. 12, H. Res. 343, on Agreeing to the Resolution, Providing for consideration of H.R. 3394, the Cyber Security Research and Development Act. Had I been present, I would have voted ``yea.'' I was also unavoidably detained for rollcall No. 13, H.R. 3394, the Cyber Security Research and Development Act. Had I been present, I would have voted ``yea.'' I was also unavoidably detained for rollcall No. 14, Approving the Journal of the House. Had I been present, I would have voted ``aye.'' ____________________