On Thursday, April 23, 2015, the House will consider H.R. 1731, the National Cybersecurity Protection Advancement Act of 2015, under a structured rule, which makes in order 11 amendments. The bill was introduced on April 13, 2015 by Rep. Michael McCaul (R-TX) and was referred to the Committee on Homeland Security, which ordered the bill reported, as amended, by voice vote, on April 14, 2015.
H.R. 1731 builds on legislation enacted last year. The legislation last Congress (S. 2519) established the information sharing protocols for the Department of Homeland Security’s National Cybersecurity and Communications Integration Center. H.R. 1731 amends the Homeland Security Act of 2002 to encourage voluntary information sharing about cyber threats, with liability protections, between and among the private sector and Federal government. The bill also includes numerous provisions to ensure the protection of the privacy of American citizens and that shared cyber threat information is solely used for cybersecurity purposes.
Section 2 amends the Homeland Security Act by adding definitions of the terms used in the bill.
Section 3 designates NCCIC as the “lead Federal civilian interface” for multi-directional and cross-sector information sharing related to cybersecurity. The bill also adds cyber threat indicators and defensive measures to the types of technical threat data that it will collect, analyze, and share to provide enhanced situational awareness to Federal, non-Federal, and private entities.
The section also adds several new subsections to the second Section 226 of the Homeland Security Act, which:
Section 4 broadens the functions of Information Sharing and Analysis Organizations to include cybersecurity risk and incident information beyond that pertaining to critical infrastructure.
Section 5 renames the National Protection and Programs Directorate of DHS to the “Cybersecurity and Infrastructure Protection” and directs the Secretary to report to Congress on the feasibility of making it an operational component of the Department.
Section 6 requires the Secretary, in coordination with the heads of other federal departments and agencies, to update, maintain, and exercise the Cyber Incident Annex to the Department’s National Response Framework.
Section 7 requires the Under Secretary for Cybersecurity and Infrastructure Protection to develop and implement a cybersecurity awareness campaign regarding risks and voluntary best practices for mitigating and responding to cyber risks.
Section 8 requires the Secretary, acting through the Department’s Under Secretary for Science and Technology, to submit a report to Congress within 180 days of enactment for guiding the direction of Federal physical security and cybersecurity technology R&D efforts for protecting critical infrastructure against all threats. The bill requires that the plan be updated and submitted to Congress every two years.
Section 9 requires the DHS Secretary to report to Congress on the feasibility of creating an environment for the reduction of cybersecurity risks at DHS data centers.
Section 10 requires the Comptroller General to assess the implementation of the Act and report to Congress no later than two years after the date of enactment.
Section 11 requires the Under Secretary for Cybersecurity and Infrastructure Protection at DHS to report on the feasibility of creating a risk-informed plan should multiple critical infrastructures experience simultaneous cyber incidents.
Section 12 requires the DHS Inspector General to review the operations of the United States Computer Emergency Readiness Team and the Industrial Control Systems Cyber Emergency Response Team to assess their capacity to provide technical assistance to non-Federal entities.
Section 13 provides that the bill does not grant the Secretary of DHS any authority to promulgate regulations or set standards relating to the cybersecurity of non-Federal entities, excluding State, local, and Tribal governments, that were not in effect on the day before the date of enactment.
Section 14 provides that any required reporting requirements terminate seven years after the date of enactment of the bill.
Section 15 specifies that no funds are authorized to be appropriated to carry out the Act or any amendments to the Act.
Despite the growing acknowledgement and understanding of the threat, the U.S. economy and private citizens continue to sustain damage from cyber-attacks. The destructive attack on Sony Pictures attributed to North Korea, and breaches at health insurance providers Anthem and Blue Cross, which compromised sensitive medical records of millions of Americans, are the latest and most prominent examples of intrusions that occur daily, targeting critical infrastructure and business, and victimizing private citizens.
There have been several high-profile cyber-attacks recently that have compromised the sensitive information of millions of Americans and potentially jeopardized our national security. In February, Anthem, the second-largest health insurer in the United States, revealed that hackers had breached its computer system and potentially exposed the sensitive data of as many as 80 million people. Recent media reports even indicate Russian hackers infiltrated the U.S. State Department’s computer systems and penetrated sensitive parts of the White House computer system.
The Heritage Foundation reported last year that “the recent increases in the rate and the severity of cyber-attacks on U.S. companies indicate a clear threat to businesses and customers.” Heritage concluded that “in a cyber-environment with ever-changing risks and threats, the government needs to do more to support the private sector in establishing sound cybersecurity while not creating regulations that hinder businesses more than help them.”
Within DHS, NCCIC serves as an around-the-clock centralized location for the coordination and integration of cyber situational awareness and management. NCCIC partners include: all Federal departments and agencies; State, local, Tribal, and territorial governments; the private sector; and intergovernmental entities. The Center provides its partners with enhanced situational awareness of cybersecurity incidents and risks, as well as information to manage cyber vulnerabilities, threats, and incidents. NCCIC received more than 97,000 incident reports, and issued nearly 12,000 actionable cyber-alerts or warnings in 2014. NCCIC teams detected more than 64,000 significant vulnerabilities on Federal and non-Federal systems and directly responded to 115 significant cyber incidents last year.
These statistics likely underrepresent the full scope of cyber attacks in the U.S. Moreover, they do not account for threat reporting to other Federal agencies, or incidents that went unreported by the private sector and the public. Still, these numbers provide a powerful illustration of the malicious nature and the persistence of the threats to America’s public and private networks, further demonstrating the need for legislation to enhance awareness of the threat through multi-directional information sharing.
At a summit on cybersecurity convened at Stanford University on February 13, 2015, President Obama said that cyberattacks are one of the nation’s most pressing national security, economic and safety issues. He remarked that they are “hurting America’s companies and costing American jobs.” In his speech, the President said that “there is only one way to defend America from these cyber threats, and that is through government and industry working together, sharing information as true partners.”
That day, the President issued Executive Order 13691, titled “Promoting Private Sector Cybersecurity Information Sharing,” to focus attention on the need for action. In response, MasterCard Chief Executive Officer Ajay Banga said that, “We need a real legislative solution. An executive action can only take you so far.” Mr. Banga also expressed his support for information sharing, commenting “Rather than fight this in individualized groups, there’s some merit in joining hands and doing it together.” This statement aligns with the goals industry has articulated to the Committee on Homeland Security while drafting this legislation.
The House passed several cybersecurity bills that were enacted into law during the 113th Congress. These bills include: H.R. 2952, the Cybersecurity Workforce Assessment Act (Public Law 113-246), which directed DHS to facilitate the development of a research and development strategy for critical infrastructure security technologies; S. 2519, the National Cybersecurity Protection Act (Public Law 113-282), which codified and strengthened activities of the NCCIC; and, S. 2521, the Federal Information Security Modernization Act of 2014 (Public Law 113-283), which clarified and codified the roles and responsibilities of DHS and the Office of Management and Budget (OMB) regarding information security and enhanced oversight of federal data breaches.
 House Report 114-83 at 15.
 Los Angeles Times: “Anthem hack exposes data on 80 million; experts warn of identity theft,” February 5, 2015.
 CNN: “How the U.S. thinks Russians hacked the White House,” April 8, 2015.
 Heritage Foundation: “Cyber Attacks on U.S. Companies in 2014” at 5. October 27, 2014.
 See testimony of the Honorable Suzanne E. Spaulding, Under Secretary, National Protection and Programs Directorate, U.S. Department of Homeland Security, at 2, before the House Committee on Homeland Security. February 25, 2015.
 House Report 114-83 at 15 and 16.
 Id. at 16.
 Washington Post: “Obama signs executive order on sharing cybersecurity threat information” February 12, 2015.
 House Report 114-83 at 16.
The Congressional Budget Office (CBO) estimates that enactment of H.R. 1731 would cost approximately $20 million over the 2016 to 2020 period, assuming appropriation of the estimated amounts.
1) Michael McCaul (R-TX) Amendment – Makes technical corrections and further clarifies the provisions of the bill.
2) John Katko (R-NY) Amendment – Amends Section 226 of the Homeland Security Act of 2002 by refining the definition of cyber ‘incident’ to explicitly restrict information sharing to incidents that are directly related to protecting information systems.
3) Jim Langevin (D-RI) Amendment – Clarifies that the term “cybersecurity risk” does not apply to actions solely involving violations of consumer terms of service or consumer licensing agreements.
4) Sheila Jackson Lee (D-TX) Amendment – Ensures that federal agencies supporting cybersecurity efforts of private sector entities remain current on innovation; industry adoption of new technologies; and industry best practices as they relate to industrial control systems.
5) Joaquin Castro (D-TX) Amendment – Makes self-assessment tools available to small and medium-sized businesses to determine their level of cybersecurity readiness.
6) Joaquin Castro (D-TX) Amendment – Codifies the establishment of the National Cybersecurity Preparedness Consortium (NCPC) made up of university partners and other stakeholders who proactively coordinate to assist state and local officials in cyber security preparation and prevention of cyber attacks.
7) Will Hurd (R-TX) Amendment – Authorizes the existing Einstein 3A (E3A) program.
8) Mick Mulvaney (R-SC) Amendment – Sunsets the provisions of the bill after 7 years.
9) Janice Hahn (D-CA) Amendment – Directs the Secretary of Homeland Security to submit a report to Congress containing assessments of risks and shortfalls along with recommendations regarding cybersecurity at most at risk ports.
10) Sheila Jackson Lee (D-TX) Amendment – Provides for a Government Accountability Office (GAO) report to Congress 5 years after enactment to assess the impact of this act on privacy and civil liberties.
11) Sheila Jackson Lee (D-TX) Amendment – Requires a report to Congress on the best means for aligning federally funded cybersecurity research and development with private sector efforts to protect privacy and civil liberties while assuring security and resilience of the Nation’s critical infrastructure.