<<

E PL UR UM IB N U U S Congressional Record United States th of America PROCEEDINGS AND DEBATES OF THE 113 CONGRESS, FIRST SESSION

Vol. 159 WASHINGTON, WEDNESDAY, APRIL 17, 2013 No. 52 House of Representatives The House met at 10 a.m. and was Now is the time to choose the budget and their families. When he served for called to order by the Speaker. that reflects our American values. The 10 years as my legislative director, f American people and future genera- John was instrumental in crafting the tions of deserve a balanced Federal Employee Pay Comparability MORNING-HOUR DEBATE budget. Act and in making sure Congress The SPEAKER. Pursuant to the f passed it into law. Mr. Speaker, that order of the House of January 3, 2013, was a bipartisan law, and it was Presi- the Chair will now recognize Members JOHN BERRY dent George Bush I who signed that from lists submitted by the majority The SPEAKER pro tempore (Mr. COL- piece of legislation into law in 1990. and minority leaders for morning-hour LINS of ). The Chair recog- In that undertaking and in many oth- debate. nizes the gentleman from Maryland ers, John Berry made a real difference The Chair will alternate recognition (Mr. HOYER) for 5 minutes. for the more than 62,000 Federal work- between the parties, with each party Mr. HOYER. Preliminary, however, ers and everyone else who calls my dis- limited to 1 hour and each Member to my remarks, I want to say I thank trict home. Just as we look to our Fed- other than the majority and minority the previous speaker for his remarks, eral workers to watch out for us, our leaders and the minority whip limited and I would hope that with the Sen- Federal employees have looked to John to 5 minutes each, but in no event shall ate’s having passed a budget, our hav- to watch out for them—to make sure debate continue beyond 11:50 a.m. ing passed a budget, and the President that they have a safe work environ- ment, that their paychecks will arrive f submitting a budget that we will now, hopefully as soon as this week, go to on time, and that the benefits they THE AMERICAN PEOPLE DESERVE conference so that we might discuss earn are the ones they receive. A BALANCED BUDGET the differences and get that budget to Under President Clinton, John served The SPEAKER. The Chair recognizes which the gentleman addressed him- as deputy Assistant Secretary and act- ing Assistant Secretary for Law En- the gentleman from Virginia (Mr. self. forcement at the Treasury Depart- HURT) for 5 minutes. Mr. Speaker, I rise today to pay trib- ment, overseeing the United States Se- Mr. HURT. Mr. Speaker, the Amer- ute to a wonderful individual who has cret Service and the Bureau of Alcohol, ican people know that a budget is one served our country in government serv- Tobacco and Firearms. He later moved of the most important documents pro- ice for many years and has spent the to the Interior Department where he duced by any legislative body. It is a last four in overseeing our Federal was Assistant Secretary for Policy, document that reflects the values and workforce as the Director of the Office Management and Budget, essentially priorities of our government and our of Personnel Management. I am speak- the manager of the Department of the Nation; and while it is a document that ing of my dear friend John Berry, who Interior. is a reflection of today, more impor- retired last week as Director of the Of- Before coming to the Office of Per- tantly, it is a document that lays out a fice of Personnel Management. sonnel Management, John spent nearly vision for our Nation’s future—the fu- America, Mr. Speaker, is blessed with a decade working on conservation as ture for our children and the future a Federal workforce composed of hard- Director of the Fish and Wildlife Foun- that they will inherit. working, talented, and dedicated men dation. Then, arguably, the job he per- So now, for the first time in 4 years, and women. Too often, however, their haps enjoyed most was that of Director the American people are able to com- contributions are overlooked or are of the National Zoo. At the National pare, side by side, the three competing even denigrated by those who would Zoo, he was so successful at turning visions for our future as proposed by use our Federal employees as an easy around a faltering institution that the House, as proposed by the Senate, target to attack the institution of gov- after he left they named a lion in his and as proposed by the President. Two ernment. honor. of these proposals would give to our John Berry made it one of his central John, indeed, was a lion—a lion on children more taxes, more spending— missions at OPM to stand up for Fed- behalf of the Federal employees, a lion and neither ever reaches balance. eral workers’ achievements and remind on behalf of good government, a lion on There is only one proposal, the House the American people of the true value behalf of integrity. Those who know budget, that would instead give to our we get from recruiting and retaining John can attest that he is not only a children a balanced budget and a the best public workforce in the world. true leader and an effective manager brighter future of freedom and oppor- He came to OPM with plenty of experi- but also an incredibly warm person tunity. ence in fighting for Federal employees with an unfailingly positive outlook.

b This symbol represents the time of day during the House proceedings, e.g., b 1407 is 2:07 p.m. Matter set in this typeface indicates words inserted or appended, rather than spoken, by a Member of the House on the floor.

H2069

.

VerDate Mar 15 2010 01:50 Apr 18, 2013 Jkt 029060 PO 00000 Frm 00001 Fmt 7634 Sfmt 0634 E:\CR\FM\A17AP7.000 H17APPT1 jbell on DSK7SPTVN1PROD with HOUSE H2070 CONGRESSIONAL RECORD — HOUSE April 17, 2013 John Berry will be greatly missed by generation of veterans receives the greatest gifts each of us can give our all who serve our country in its civil- support and timely access to health families is to have a thoughtful and ian workforce, and I wish John and his care that they have so honorably frank discussion about what our wishes partner, Curtis, all the best as he be- earned. would be for medical care if we’re un- gins the next phase in his career. f able to suddenly make those decisions. I hope my colleagues will join me in It’s also one of the greatest gifts that thanking John for his service, for his b 1010 this Congress can make to the people leadership, for his insights, for his in- END-OF-LIFE CARE we represent by doing our job so that spiration, and for being an example to the Federal Government is a better all of us of a positive, constructive, The SPEAKER pro tempore. The partner in making sure those conversa- supportive, and successful career in Chair recognizes the gentleman from tions are possible. Federal service. Oregon (Mr. BLUMENAUER) for 5 min- Please cosponsor our bipartisan Per- Mr. Speaker, our country has been utes. sonalize Your Care Act, H.R. 1173, and the beneficiary of his character, integ- Mr. BLUMENAUER. Mr. Speaker, then sit down and have this conversa- rity, and extraordinary ability. We Monday in the blink of an eye, hun- tion with your family. It’s not always wish him well in all that he will be dreds of people at the Boston Marathon the easiest, but it is far better than doing. I’m sure it will be extraor- were faced with an awful decision. making your loved ones guess and feel dinarily productive and of service to None of them woke up that morning guilty. expecting they, or a loved one, was our country as he moves on from Fed- f eral service at the OPM to a new chal- going to need emergency care in a life- lenge and a new career. threatening situation. We tend to PATH TO STATEHOOD think of end-of-life care as the province f The SPEAKER pro tempore. The of a terminally ill person, often elder- Chair recognizes the gentleman from THE VETERANS TIMELY ACCESS ly, but that’s just one circumstance, Puerto Rico (Mr. PIERLUISI) for 5 min- TO HEALTH CARE ACT and not necessarily the most common. utes. The SPEAKER pro tempore. The The decisions need to be made in- Mr. PIERLUISI. Mr. Speaker, in No- Chair recognizes the gentleman from stantly about whether to amputate a vember 2012, Puerto Rico held a ref- (Mr. ROSS) for 5 minutes. limb, and a decision must be made that erendum on its political status. The re- Mr. ROSS. Yesterday, I had the dis- moment. If a person is in shock or un- sults demonstrated that a clear major- tinguished opportunity to greet three conscious, who helps make that deci- ity of the U.S. citizens of Puerto Rico busloads of Florida World War II vet- sion for them? want to end the island’s current terri- erans participating in an Honor Flight. Last week, I had two more cir- tory status, that a supermajority pre- In total, more than 80 proud Florid- cumstances where people in my life fers statehood among the possible al- ians who bravely fought to free the were faced with totally unexpected ternatives, and that—for the first time world of evil during World War II had life-threatening circumstances that in history—more voters favor state- the wonderful opportunity to visit and brought these questions into sharp per- hood than the current status. reflect at their memorial. As the son of spective. Anybody, anywhere, any As I have remarked before, not a sin- a World War II veteran, I was blessed time. How do we make sure that these gle one of my stateside colleagues in to have the opportunity to join my fa- decisions, which are made every day in Congress would accept territory status ther as he participated in a previous every State in virtually every city, are for their own constituents. So they Honor Flight just 2 years ago. Al- made in accordance with the best in- must recognize and respect that the though he has since passed on, I know terest and wishes of the patient and American citizens of Puerto Rico no he truly cherished this great experi- the patient’s family? longer accept it either. I also trust ence. I’ve been working for the last 5 years that my colleagues who represent American veterans are the backbone for the Federal Government to be a States will credit my constituents for of the freedom and prosperity this better partner with families. It’s called aspiring to have the same rights and country has enjoyed for over 200 years. end-of-life care, and the Federal Gov- responsibilities as their constituents. Without their service, we would not be ernment, the Department of Health Last week, the President took an im- the Nation we are today. We would not and Human Services, and Congress are portant step. As part of the proposed enjoy the privileges of this democ- missing in action. Medicare will spend budget the administration submitted racy—the greatest experiment in gov- billions of dollars on the most expen- to Congress, the Justice Department is ernment known to mankind. Unfortu- sive, invasive, painful, and in some seeking $2.5 million to conduct the nately, veterans across the country cases, if not unnecessary, at least ques- first Federally sponsored vote on Puer- continue to encounter unacceptable tionable care, often regardless of the to Rico’s political status in the 115 problems and delays in receiving ap- wishes of the patient and their family. years that the territory has been under pointments from the Veterans Admin- Yet Medicare won’t pay $100 or $200 for the U.S. flag. The funding would be istration for essential medical and spe- that medical professional to have a granted to Puerto Rico’s Elections cialty health care needs. conversation with the patient and their Commission to conduct objective voter That is why I am proud to introduce family. education and a vote on ‘‘options that H.R. 241, the Veterans Timely Access It’s time for us to step up. We need to would resolve Puerto Rico’s future po- to Health Care Act. make sure that we clear up the ques- litical status.’’ This legislation, supported by the tions in everyone’s minds about the Key congressional leaders in the Military Officers Association of Amer- choices, the consequences, what the pa- House and the Senate, Republican and ica, will ensure that veterans seeking tient and the family want, and most Democrat alike, have already issued medical care from the VA facility re- critically, make sure those wishes are statements of support for the Presi- ceive an appointment within 30 days. honored. Like my friend, whose heart dent’s action, calling it an appropriate Moving forward, this legislation will go stopped this weekend, totally unex- response to the local referendum. a long way in ensuring veterans’ crit- pectedly, we don’t know when or where Mr. Speaker, my constituents may ical medical needs no longer slip a loved one will be in this position. But not have a vote in the government that through the cracks of the system. there’s no excuse we don’t do every- makes their national laws, but they do As I continue to reflect on the proud thing we can to help families and en- have a voice—and they made that voice history and service of the many World courage everyone that is close to us, heard loud and clear in November. A War II veterans like my good friend that works with us, to take their own budget reflects one’s priorities and val- Charlie Clark, with whom I visited yes- steps to identify who speaks for them ues. I support the President’s budget terday and whom I had the pleasure of when they can’t, and what they want because it shows respect for the demo- knowing for several years as a member to happen. cratically expressed aspirations of the of the local YMCA, I will also look for- This is personal for me. I had these U.S. citizens who reside in Puerto Rico. ward to ensuring that our youngest jarring reminders that one of the And it demonstrates a clear desire to

VerDate Mar 15 2010 01:50 Apr 18, 2013 Jkt 029060 PO 00000 Frm 00002 Fmt 7634 Sfmt 0634 E:\CR\FM\K17AP7.001 H17APPT1 jbell on DSK7SPTVN1PROD with HOUSE April 17, 2013 CONGRESSIONAL RECORD — HOUSE H2071 move forward on this complex but crit- us strong as a Nation is the tremen- her commitment to what she called ical issue. dous care we have for our fellow Ameri- doing the Lord’s work on this Earth. As the budget request states, the cans, especially during the hardest She was a woman who understood Federally sponsored vote is to be times. This is a lesson that I learned that she had to have a comprehensive among options that would resolve deeply from my friend and mentor, agenda. It just couldn’t be a single Puerto Rico’s political status. The only Maudelle Shirek. Maudelle died last issue like health care or seniors or way to resolve the island’s status is week at the age of 101. She would have peace and justice, but it had to be through statehood or national sov- been 102 June 18. My heart and my about being committed to comprehen- ereignty. Puerto Rico cannot resolve prayers go out to her friends and fam- sive and positive changes that seek to its status by maintaining the same un- ily. improve the lives of all Americans. democratic status that my people have Maudelle worked at the Berkeley Co- b 1020 endured since 1898 and that they sound- Op Credit Union. She engaged all of us, ly rejected in November. The current Maudelle was truly the ‘‘godmother in the seventies, mind you, in financial status is the root cause of Puerto of East Bay progressive politics.’’ The literacy, and urged me, as a young sin- Rico’s political, economic, and social former city of Berkeley vice mayor and gle student to buy a house because she problems, so it cannot also be the solu- eight-term council member was born reminded me over and over again that tion to those problems. and raised in Jefferson, Arkansas. As one’s equity in one’s home was the pri- In addition, the budget language the granddaughter of slaves, she was mary path to the middle class, and clearly states that the Department of passionate about justice and civil that that was the main way that I Justice shall not provide funding until rights. could get the resources to take care of it certifies that the ballot and voter After moving to Berkeley in the my kids and send them to school, a les- education materials are consistent 1940s, she became active in the antiwar son we should teach our own children with the Constitution, basic laws, and movement, fought on behalf of unions, today. policies of the United States. The pur- advocated for HIV and AIDS aware- Several years ago, I tried to name pose of this language is to ensure that ness, care, and treatment, and helped the Berkeley Post Office after the ballot does not include impossible organize the Free Mandela Movement. Maudelle. While this body has a tradi- status proposals that have been repeat- She was also the first elected official in tion of supporting post office bills in a edly declared unworkable as a matter the United States to advocate for nee- bipartisan way, Congressman STEVE of both law and policy by the Federal dle exchange programs. KING from Iowa came to this floor and Government. I am pleased that the ad- During her tenure as a Berkeley tried to tarnish her character. He ministration understands that true elected official, she was instrumental brought groundless accusations, and self-determination is a choice among in creating multiple city commissions, this body voted against—mind you, options that can be implemented, not including the Berkeley Commission on against—naming the post office in my an exercise in wishful thinking. Labor. When she retired, mind you, at district after this great icon. I hope The President’s request represents 92 years of age, she was the oldest one day, in her memory, Representa- one path forward, but it is important elected official in at that tive KING will apologize to Maudelle to underscore that it is not the only time. In 2007, the Berkeley City Coun- and her family and the city of Berkeley path forward. In the coming weeks, I cil renamed city hall in her honor. for such an unfair and unwarranted at- will introduce stand-alone legislation She not only urged me to get in- tack. She was deeply hurt by it, but on the status issue that will both com- volved in politics, but also inspired my kept her head high and lived to see the plement President Obama’s request and predecessor, Congressman Ron Del- Berkeley City Hall named after her. reflect the undisputable fact that lums, to run for Congress. Her under- Maudelle refused to accept arbitrary statehood won the November ref- standing of the importance of investing limitations. That’s one of the best erendum. in people won the solid support of vot- things we all respected about her. Puerto Rico stands in a far different ers in her district and across the coun- Maudelle is one of the best examples of place today than it did six months ago. try. how one person can make a difference. A historic referendum was held, the I met Maudelle in the early seventies She was a fearless and inspirational President responded to the results, and while I was a student at Mills College. woman who tirelessly fought to make Congress now has a responsibility to She widened my perspective on global this world a fair and just place. She act. Those who seek democracy, equal- politics during our travels around the spoke for the voiceless and was such a ity, and progress for Puerto Rico are world. She reinforced the idea that we staunch defender of our basic civil on the forward march, while those who are all part of a global family and what rights. support the failed status quo are in re- happens here in the United States af- I believe, like many, that Maudelle’s treat. We drive the debate, while they fects our brothers and sisters in other legacy of over 70 years of service to merely react to the debate. And, in the parts of the world and vice versa. Berkeley, the East Bay, the Nation, end, mindful that the arc of history is Maudelle was a personal friend, men- and the world will inspire many to long but that it bends towards justice, tor, and confidante. speak for the voiceless and to stand up I am confident we will prevail. Maudelle actually was a health afi- for justice, both here in America and cionado. She was committed to edu- f around the globe. I will deeply miss her cating seniors and the entire commu- wise counsel, love, and support. HONORING MAUDELLE SHIREK nity on the benefits of healthy living. f The SPEAKER pro tempore. The She loved shopping for fresh fruits and Chair recognizes the gentlewoman from vegetables, and you would often find LET’S DO OUR PATRIOTIC DUTY California (Ms. LEE) for 5 minutes. her cooking nutritious meals at the AND VOTE ON GUN CONTROL Ms. LEE of California. Mr. Speaker, West Berkeley Senior Center. The SPEAKER pro tempore. The let me first send my thoughts and We loved to walk Lake Merritt and Chair recognizes the gentleman from prayers to the city of Boston, the fami- the Berkeley Marina together, where Connecticut (Mr. LARSON) for 5 min- lies and friends of all of those touched she talked to me about acupuncture utes. by Monday’s horrific tragedy. Incred- and natural remedies like cayenne pep- Mr. LARSON of Connecticut. Mr. ible strength was in full display in the per and warm water for colds and the Speaker, our hearts as well go out to streets of Boston when untold numbers importance of exercise. the victims and the families of those of people—the police, firefighters, vol- Maudelle was a woman of great faith. who were killed and seriously wounded unteers, runners, and bystanders—ran During the seventies, we enjoyed at- in Boston on Patriots’ Day. towards the explosions to try to help in tending the Church for Tomorrow, This has been a very difficult time any way they could without regard for which formerly was the Church for for our country. At that event in Bos- their own safety. Today. We went there together, and ton were families from Newtown, Con- As we learn the details of this at- this is where I realized that her passion necticut, invited to celebrate Patriots’ tack, let us remember that what makes for service and justice was driven by Day in Boston. The Red Sox play in the

VerDate Mar 15 2010 01:50 Apr 18, 2013 Jkt 029060 PO 00000 Frm 00003 Fmt 7634 Sfmt 0634 E:\CR\FM\K17AP7.003 H17APPT1 jbell on DSK7SPTVN1PROD with HOUSE H2072 CONGRESSIONAL RECORD — HOUSE April 17, 2013 morning, the Marathon takes place, ments of great entrepreneurs, whether WVON RADIO’S 50TH ANNIVERSARY families gather, and again, America the automobile industry of Henry Ford The SPEAKER pro tempore. The faces another tragedy. or the iPhone of Steve Jobs. Business Chair recognizes the gentleman from Last week, family members from was the province of people with money. Illinois (Mr. DANNY K. DAVIS) for 5 min- Newtown came to the Hill to lobby As the old cynical joke goes, banks utes. Congress, to ask Congress what the would loan money only to people who Mr. DANNY K. DAVIS of Illinois. I President of the United States has don’t need it. rise to congratulate WVON Radio on 50 asked of us, both in the State of the So throughout the world, and espe- years of broadcasting. Union and in his two trips up to Con- cially in the post-colonial developing On April 1, 1963, WVON Radio in Chi- necticut. world, the chance of escaping poverty cago, Illinois, was launched, and since What the President has said is: how- and living a dignified life seemed an that time has gone from being ‘‘the ever you feel about the issue of gun vi- impossible dream for millions and mil- voice of the Negro’’ to ‘‘the voice of the olence, however you feel about the Sec- lions. One person has helped transform Nation.’’ ond Amendment, we deserve a vote, the dream into a possibility—in fact, a WVON began when two brothers, both in the other body, in the Senate, reality—of family sufficiency for peo- Leonard and Phil Chess, the owners of and here, on the floor of the House of ple all over the planet. a successful music business, Chess Representatives; a vote not only for When the Nobel Committee awarded Records, with a plentiful supply of the 20 children and six teachers and ad- Dr. Muhammad Yunus and the finan- local music under their banner such as ministrators who died in that tragedy cial institution he created, the Muddy Waters, Lil’ Howlin’ Wolf, on December 14, but for people in Tuc- Grameen Bank in Bangladesh, the Jimmy Reed, and others, needed a way son and Aurora and on virtually every Nobel Peace Prize a few years back, the to express their music. Therefore, the street in cities all across America Committee made the award for ‘‘their brothers bought WHFC–1450 AM, a where we have seen this needless and efforts to create economic and social 1,000-watt station licensed in Cicero, Il- development from below.’’ I’ll phrase it senseless violence take place. Patriots’ linois. differently. Muhammad Yunus and On April 1, 1963, WVON hit the air- Day, another act of violence. Grameen Bank received the award for waves in Chicago with a group of hand- Strides are being made in the United treating people with dignity and giving picked personalities: Franklin McCar- States Senate. Compromise is being of- millions around the world hope. thy, E. Rodney Jones, Herb Kent, Wes- fered on something that 92 percent of Today, in the rotunda here at the ley South, and Pervis Spann. They be- the American people agree with: uni- U.S. Capitol, we honor Dr. Yunus with came known as ‘‘The Good Guys.’’ Ric versal background checks, universal the Congressional Gold Medal. Muham- Ricardo, Bill ‘‘Butterball’’ Crane, Ed background checks to keep guns out of mad Yunus has shown us being a vi- Cook, Joe Cobb, Roy Wood, Ed Malo- the hands of terrorists. sionary does not mean promoting the ney, Bill ‘‘Doc’’ Lee, Don Cornelius, The United States of America is cur- impractical or the impossible. Unlike Richard Pegue, Isabel Joseph Johnson, rently mocked by Adam Gadahn, an some economic theories advanced over Cecil Hale, and McKee Fitzhugh even- American al Qaeda on the FBI’s Most centuries, Dr. Yunus’ theories have tually joined the roster. Wanted List, who taunts America and been proven to work. To date, the Under the direction of the station’s says this, and you can see it on Grameen Foundation and the bank and general manager, Lucky Cordell, and BuzzFeed: its partners have helped 9.4 million of its ‘‘Ambassador of Goodwill,’’ America is absolutely awash with easily the world’s poorest people receive Bernadine C. Washington, The Good attainable firearms, large-capacity clips. microloans. The bank has given loans Guys held black radio listeners hostage You can get them, even without any identi- of a few dollars to millions to those in Chicago for a number of years. It be- fication. who, by traditional standards, are not came the hottest station in the mar- This from the most wanted on the worthy of credit. ket. Not only did it convey music, it FBI list. His idea of a socially conscious busi- also conveyed public information, pub- We need to vote in the United States ness focused on serving the poor flew in lic events, and what was going on. It Congress. If these young children had the face of conventional economic the- was the voice during the civil rights the courage to go after their assailant, ory and certainly in the face of exist- movement, and individuals were often if the teachers stepped in the way to ing banking practice. But it worked. given the opportunity to speak. Dr. protect, does Congress have the will Recipients paid back the loans and got Martin Luther King was interviewed by and the courage to stand up and merely ahead financially. Leslie South, as well as Elijah Muham- do what it was elected to do? Cast a The Grameen Foundation’s financial mad and others. vote in both Chambers. Cast a vote on outreach to people living below the These personalities became so infor- behalf of the American people. Cast a poverty level has been life-altering for mational and influential that during vote on behalf of these children, on be- women in Nigeria and Haiti and Cam- the riots after the death of Dr. Martin half of these parents who have come bodia and Peru. Dr. Yunus has inspired Luther King, they called for calm and here to beseech the United States Con- similar local efforts in dozens of na- peace. And people began to listen to gress only to do its responsibility, to tions, including our own. His life and them. They were very influential do what we take the oath of office for. work are a testament to the difference throughout what was called the civil Ninety-two percent of the American a single person can make here on rights movement, and individuals often people believe that we need universal Earth. went to them. background checks. We have to make Dr. Yunus’ legacy will be measured They also had a relationship with sure that our bodies, both the Senate not simply by the many awards he has Berry Gordy in Detroit, when he and the House, take up this legislation. won over his career, such as we honor formed Motown Records; and every In the aftermath of yet another trag- him with today, but by the current and time a record would come out, he edy, on Patriots’ Day, the most patri- future generations of people who will would send it to the WVON station be- otic thing we can do is vote. travel the road from poverty to success fore sending it anyplace else. and sufficiency because of Dr. Yunus’ WVON actually was instrumental in f vision and commitment. He believes electing Harold Washington, the first b 1030 that we have the power to end pov- black mayor of Chicago. Lou Palmer, erty—not just to alleviate it, but end who had a radio series called ‘‘Lou’s AWARDING THE CONGRESSIONAL it—and we should take him seriously. Notebook,’’ had a slogan: ‘‘We shall see GOLD MEDAL TO PROFESSOR Muhammad Yunus is showing us how. in ’83.’’ And that became the rallying MUHAMMAD YUNUS I ask my colleagues to join me in giv- cry. It was also instrumental in elect- The SPEAKER pro tempore. The ing Dr. Yunus congratulations on re- ing Carol Moseley Braun to the United Chair recognizes the gentleman from ceiving the Congressional Gold Medal States Senate, electing Barack Obama (Mr. HOLT) for 5 minutes. today, and join me in giving thanks to to the United States Senate, and ulti- Mr. HOLT. Mr. Speaker, for cen- him for making many, many lives mately electing Barack Obama Presi- turies, we have lauded the achieve- around the world better. dent of the United States of America.

VerDate Mar 15 2010 04:23 Apr 18, 2013 Jkt 029060 PO 00000 Frm 00004 Fmt 7634 Sfmt 0634 E:\CR\FM\K17AP7.005 H17APPT1 jbell on DSK7SPTVN1PROD with HOUSE April 17, 2013 CONGRESSIONAL RECORD — HOUSE H2073 Always more than a radio station, it ley South, the hotline show in the evening with greater; though created mortal and fal- belonged to the community and was journalist Lu Palmer doing a notebook series lible, we need Your gifts of wisdom and the heart of the community. So I con- called ‘‘Lou’s notebook.’’ Lou spearheaded the patience to find partners, even in sur- gratulate Melody Spann Cooper and all election of Harold Washington as Chicago’s prising and unlikely places, with whom of those who have made WVON what it first Black mayor with the slogan, ‘‘We Shall we must work together to benefit our is today: the voice of the Nation. See in ’83.’’ country and our world. Congratulations to WVON Radio on fifty Upon the urging of Wesley South,a radio We turn to You, Source of Peace, to years of broadcasting. talk show pioneer, WVON changed to a talk inspire and support the leaders of our Mr. Speaker, On April 1, 1963, WVON format and has never looked back. It has been Nation to find accord even in these Radio in Chicago, Illinois was launched and instrumental in not only electing Harold Wash- times of challenge. May it be Your will since that time has gone from being ‘‘the voice ington as Chicago’s first Black mayor, but also that in recognizing the Unity of the Di- of the negro’’ to ‘‘the voice of the Nation.’’ in electing Carol Mosley Braun, U.S. Senator; vine, they will strive to foster a similar WVON began when two brothers, Leonard Barack Obama, United States Senator; and unity among themselves for the sake of and Phil Chess, the owners of Chess Barack Obama, President of the United States this great Nation. Records, a successful record company with a of America. Joining together, we say the Hebrew plentiful supply of local music talent under WVON’s current line-up of hosts are some word affirming faith; faith in each their banner, such as Muddy Waters, Lil’ of the best in the Nation: Cliff Kelly, called the other, continued faith in humanity, Howlin Wolf, Jimmy Reed and others, who governor of talk radio; Matt McGill; Perry and faith in the Holiness beyond us. needed an outlet for their music. Therefore, Small; Reverend Al Sharpton; Saleem Amen. the brothers bought WHFC–1450 AM, a 1000 Muwakil; Kendall Moore; Dr. Leon Finney; and f watt station licensed in Cicero, Illinois. from time to time, Pam Morris, Dr. Terry On April 1, 1963, WVON hit the airwaves in Mason, and countless others who buy time THE JOURNAL Chicago with a group of hand-picked personal- like Garfield Major, talking to the people. The SPEAKER pro tempore. The ities: Franklin McCarthy, E. Rodney Jones, Congratulations to Melody Spann Cooper Chair has examined the Journal of the Herb Kent, Wesley South, and Pervis Spann. and all of those who have helped to make last day’s proceedings and announces They became known as ‘‘The Good Guys’’ WVON Radio what it is today. to the House his approval thereof. and Ric Ricardo, Bill ‘‘Butterball’’ Crane, Ed f Pursuant to clause 1, rule I, the Jour- Cook, Joe Cobb, Roy Wood, Ed Maloney, Bill nal stands approved. RECESS ‘‘Doc’’ Lee, Don Cornelius, Richard Pegue, f Isabel Joseph Johnson, Cecil Hale, and The SPEAKER pro tempore. Pursu- McKee Fitghugh eventfully joined the roster. ant to clause 12(a) of rule I, the Chair PLEDGE OF ALLEGIANCE Under the direction of the station’s general declares the House in recess until noon The SPEAKER pro tempore. Will the manager, Lucky Cordell, and its ‘‘Ambassador today. gentleman from Oklahoma (Mr. of Good Will’’, Bernadine C. Washington, The Accordingly (at 10 o’clock and 37 LANKFORD) come forward and lead the Good Guys held Black Chicago captive for minutes a.m.), the House stood in re- House in the Pledge of Allegiance. more than a decade and ranked consistently cess. Mr. LANKFORD led the Pledge of Al- in the top five of the most listened to stations f legiance as follows: in the market. b 1200 I pledge allegiance to the Flag of the The power of WVON went beyond the Chi- United States of America, and to the Repub- cago market. Berry Gordy, the founder of AFTER RECESS lic for which it stands, one nation under God, Motown Records had a special arrangement The recess having expired, the House indivisible, with liberty and justice for all. with WVON that every song he produced was called to order by the Speaker pro f would be sent immediately to WVON before tempore (Mr. WOMACK) at noon. WELCOMING RABBI ROBERT any other station. WVON was so powerful that f SILVERS it produced airplay in other markets, which im- pacted the overall sales and success of the PRAYER The SPEAKER pro tempore. Without project. Rabbi Robert Silvers, Congregation objection, the gentleman from Florida WVON has always been more than a radio B’Nai Israel, Boca Raton, Florida, of- (Mr. DEUTCH) is recognized for 1 station. During a time when Blacks were ac- fered the following prayer: minute. tively involved in the civil rights movement, Eternal God, we children of human- There was no objection. WVON was the voice of information for local ity pray to You by many names, but in Mr. DEUTCH. Mr. Speaker, I’m proud and national affairs. During the riots that fol- our hearts we all know You as One. to have the opportunity to welcome lowed the death of Dr. Martin Luther King, Jr., Your unity creates the common bond one of my constituents, Rabbi Robert WVON on-air personalities were there to lift between us and is our common bond Silvers, of the Congregation B’Nai the tension that had erupted in neighborhoods with You. And though Your absolute Israel in Boca Raton, Florida, as he of- across the city. They pleaded for calmness. truth eludes us, nonetheless we strive fered the opening prayer here today. He Following the death of Chess in 1969, the to be more like You and to carry out is a leader in the Jewish community in family decided to sell WVON to George Gil- Your will for humanity: that we live south Florida. His life epitomizes the lette (heir to the Shaving Products Company) together in peace. Jewish tradition of tikkun olam— and to Potter Palmer (heir to Palmer house) And though some seek to disrupt the bettering the world. who formed Globetrotter Communications. peace and deprive us of our very lives, Rabbi Silvers’ impact is felt well be- Their first order of business was to take as we witnessed in Boston, we pray, O yond the 1,200 families of Congregation WVON from 1450 frequency to 5,000 watt God, that their actions be thwarted and B’Nai Israel, with pastoral work and 1390 signal, which would improve their cov- that You continue to shelter us with care that he provides not only to his erage of Chicago. The 1450 frequency was Your canopy of peace. Send healing of own congregation but also to the great- left dormant. body and soul, O God, to the victims of er local community as a volunteer In 1977, Globetrotter Communications sold this act of terror, to our Nation, and to chaplain for the Palm Beach County WVON to the Gannett Company, whose major all who grieve with them. Keep forever Sheriff’s Office. He has served as presi- holdings were in print media. Gannett had pur- in Your loving embrace the souls of dent of the Palm Beach County Board chased an FM station in Chicago which be- those who lost their lives. of Rabbis and as president of the Great- came known as WGCI. In 1979, Wesley South We pray that those who do harm be er Boca Raton Religious Leaders Asso- and Pervis Spann formed Midway Broad- brought to justice and that You, O God, ciation, an interfaith coalition of cler- casting Corporation and purchased the license instill in all peoples everywhere a love gy. Rabbi Silvers has been involved in for the 1450 AM frequency. of humanity and a respect for each and education and interfaith dialogue Their station WXOL premiered in August of every human being created in Your di- throughout south Florida. 1979 and remains one of the few minority- vine image. I’m proud to call Rabbi Silvers and owned stations in the market. WVON became Help us, O God, to realize that each his wife, Ava, friends. I welcome them a mixed music/talk radio station and with Wes- of us holds a glimpse of something and all of his congregants who watched

VerDate Mar 15 2010 01:50 Apr 18, 2013 Jkt 029060 PO 00000 Frm 00005 Fmt 7634 Sfmt 0634 E:\CR\FM\K17AP7.006 H17APPT1 jbell on DSK7SPTVN1PROD with HOUSE H2074 CONGRESSIONAL RECORD — HOUSE April 17, 2013 on C–SPAN as he delivered this mean- minute and to revise and extend his re- for 1 minute and to revise and extend ingful prayer. marks.) his remarks.) f Mr. COFFMAN. Mr. Speaker, I rise to Mr. LANKFORD. Mr. Speaker, in a draw attention to cutting-edge re- historic red brick building in Philadel- ANNOUNCEMENT BY THE SPEAKER search now underway at the Charles C. phia, a man and his staff performed PRO TEMPORE Gates Center for Regenerative Medi- thousands of abortions under horrid The SPEAKER pro tempore. The cine and Stem Cell Biology at the Uni- conditions, which has led to a murder Chair will entertain 15 further requests versity of Colorado in Aurora. As you trial which is currently under way for for 1-minute speeches on each side of know, our Nation faces major defi- seven children and one adult. Some the aisle. ciencies in its ability to maintain an children were torn apart with surgical f adequate blood supply for civilian and instruments in the womb. Some moth- military demands. Traditional methods ers were given abortion-inducing drugs THE SPIRIT OF AMERICA for obtaining blood or producing a new and were seated on a toilet until they (Mr. MCCARTHY of California asked supply fall far short of current demand. delivered their baby into that toilet. and was given permission to address But a collaborative effort at the Other women had their labor induced; the House for 1 minute.) Gates Center at the University of Colo- and when they delivered, an assistant Mr. MCCARTHY of California. As we rado is working to develop a new tech- flipped the baby over and used the scis- gather today in this House, we opened nology that enables the rapid growth of sors to cut their spinal cord. it with prayer—prayer to remember adult blood stem cells. This propri- The horrific murder of innocent chil- those families, those children, those etary technology can generate large dren was repeated over and over again runners, those spectators that were numbers of cells that can be frozen and in the clinic; but amazingly enough, lost in Boston. As I watched that hor- thawed while retaining their stem cell only the children fully out of the womb rific incident, I paused for a moment. characteristics. This also means that are considered murder victims. Can At the same time that I saw this tragic soon there will be an ability to culture someone explain to me how the chil- incident, I also saw the spirit of Amer- adult blood stem cells in an almost in- dren of the same age, size, and develop- ica. The spirit of America was with definite manner. ment, who were still in the womb when those individuals who rushed in to This research is being funded with they were torn to pieces by surgical in- help, not knowing whether they would peer-reviewed grants from NIH, and struments, are not victims of murder, be injured or not, not knowing what they have joined a consortium funded but those who were delivered and then would happen to them. But they rushed by DARPA to further help develop the their spinal cord was cut three feet to help one another. Red Blood Cell program. I’m very hope- from their mother are victims of mur- I want this body to instill that same ful about the research at the Charles C. der? American spirit—that we are bound to- Gates Center, and I urge support for I will never understand the strained gether—so that we will remember their efforts. logic that says if a child is killed where those lost, but more importantly, we f you cannot see them in the womb, it’s will bring to justice those that per- PASS GUN CONTROL LEGISLATION choice; but if you kill that child in the petrated this action and that we will be daylight, it’s murder. (Ms. JACKSON LEE asked and was stronger in the end as a Nation and f never forget those who were lost. given permission to address the House CONGRATULATING MIROSLABA f for 1 minute.) Ms. JACKSON LEE. Today, Mr. ‘‘LILI’’ VELO ON BEING NAMED BOSTON MARATHON ATTACK Speaker, the other body has an oppor- 2013 OUTSTANDING SENIOR HIGH (Ms. CHU asked and was given per- tunity to do what 90 percent of the SCHOOL TEACHER OF THE YEAR mission to address the House for 1 American people would like us to do— (Mr. SWALWELL of California asked minute.) to be prayerful and to come together to and was given permission to address Ms. CHU. Imagine what the front respond to the horrific siege of gun vio- the House for 1 minute and to revise page of The Boston Globe should have lence in America. and extend his remarks.) looked like yesterday: marathon win- It is important to note that, on aver- Mr. SWALWELL of California. Many ners jubilantly accepting medals; age, 13 young people from ages 10 to 24 students often remember that one en- throngs of people triumphantly cross- are victims of homicide every day, and gaging and empowering teacher who in- ing the finish line; bystanders passing 82.8 percent of these youth are killed spired them to change the course of out Gatorade; families and friends by a gun. Every 30 minutes a child or their lives. I am proud to recognize one cheering on loved ones. Instead, the teenager in America is injured by a of those teachers, Ms. Miroslaba ‘‘Lili’’ front page depicted a war zone. gun. Every 3 hours and 15 minutes a Velo, a social studies teacher from This vicious, senseless attack left child or a teenager loses their life from Hayward’s Tennyson High School in nearly 200 people injured, some criti- a firearm. In 2010, 82 children under the my congressional district. cally, and three dead. My heart breaks ages of 5 lost their lives due to guns. Ms. Velo was named the 2013 Out- for everyone affected, and justice must To put that number in perspective, 58 standing Senior High School Teacher be served. law enforcement lost their lives. of the Year by the California Council But even this dark act couldn’t blot And so today, we don’t have to vio- for Social Studies. As the chair of the out the examples of love, compassion, late the Second Amendment. As I said, Social Studies Department at Tenny- and selflessness on display. Volunteers we can be prayerful. We can pass uni- son High School, Ms. Velo is a true and officers raced to aid blast victims. versal background checks—the same leader in advancing social studies edu- Marathon runners continued running— thing we do with registering our cars, cation by teaching educators in her straight to the nearest hospital to do- getting licenses. This is a time for high school and across California how nate blood. And thousands of people America to rise to our higher angels to engage students with new and inno- opened their homes to athletes who and do what our children need them to vative teaching methods. This is some- had nowhere else to go. do. I ask the Senate to challenge its thing we will need as we continue to These are the stories that define us conscience and to vote for universal lead our students to be competitive in as a Nation. This is the spirit that no background checks to stop the vio- a changing global economy. terrorist attack will break. lence. Ms. Velo is a wonderful example of f f the most dedicated teachers from b 1210 across the Nation, who strive every day CHARLES C. GATES CENTER FOR to better the lives of their students and REGENERATIVE MEDICINE AND THE FINE LINE BETWEEN CHOICE assist the teachers around them. STEM CELL BIOLOGY AND MURDER Once again, I congratulate Ms. Velo (Mr. COFFMAN asked and was given (Mr. LANKFORD asked and was on receiving this well-deserved recogni- permission to address the House for 1 given permission to address the House tion.

VerDate Mar 15 2010 01:50 Apr 18, 2013 Jkt 029060 PO 00000 Frm 00006 Fmt 7634 Sfmt 0634 E:\CR\FM\K17AP7.009 H17APPT1 jbell on DSK7SPTVN1PROD with HOUSE April 17, 2013 CONGRESSIONAL RECORD — HOUSE H2075 DEFENDING OUR HOMELAND CONGRATULATING ASHLAND UNI- Among those hit hardest by our 4- VERSITY WOMEN’S BASKETBALL million-word Tax Code are senior citi- (Mr. PITTENGER asked and was TEAM FOR WINNING NCAA DIVI- zens. Many live on fixed incomes and given permission to address the House SION II CHAMPIONSHIP have common forms of income, like for 1 minute and to revise and extend dividends, Social Security benefits, and his remarks.) (Mr. GIBBS asked and was given per- mission to address the House for 1 IRA distributions; yet they face the Mr. PITTENGER. Mr. Speaker, I rise minute.) high cost of compliance. That’s why I today to pay respect and grief for those Mr. GIBBS. Mr. Speaker, I rise today introduced the Seniors’ Tax Simplifica- who suffered loss of life and harm in to honor and congratulate the Ashland tion Act. This commonsense bill—and Boston. I had two of my own constitu- University women’s basketball team it is bipartisan—would create one sim- ents who suffered grievous loss and one for winning the NCAA Division II ple form, much like the popular 1040EZ of them the loss of a leg. It reminds us Championship. The Ashland Eagles form. It would be used for the rel- once again that those who seek our de- earned Ashland University’s first bas- atively simple tax filing situations struction are fully committed to that ketball national championship with a that are common for seniors anyway. objective. 71–56 victory over New York’s Dowling Creating a no-nonsense 1040SR form While the terrorists and others work College on Friday, March 29, 2013. would reduce compliance costs for sen- in a very open way, seeking public no- I would like to congratulate the Ea- iors and lessen the burden of the tax toriety, they have also learned to work gles MVP, AU senior Kari Daugherty, season for them. in a very quiet and sophisticated and for contributing 26 points to the win. The Seniors’ Tax Simplification Act tactical way in cyber warfare. Ms. Daugherty was also honored with is a straightforward, no-cost bill that Mr. Speaker, we have a very impor- the Player of the Year title for the di- has bipartisan support and has been en- tant bill before us today, H.R. 624. We vision. dorsed by many senior citizen groups need to really look at it, and we need I would also like to congratulate and deserves a vote in this House. to pass it. We need to show the world Coach Sue Ramsey for leading her f that we are fully committed to defend- team to victory. This sportsmanship, IMMIGRATION REFORM ing our homeland. determination, and hard work dis- played by the Ashland Eagles through- (Ms. TITUS asked and was given per- 300,000 cyber attacks occur on major mission to address the House for 1 industry every single day—on each in- out the season has been unparalleled. This momentous accomplishment de- minute.) dustry. We must stop this. They are Ms. TITUS. After far too long, there serves the most sincere congratula- bent on our destruction. We can do is finally real bipartisan momentum in tions, and we’re very proud of Ashland what it takes today to show the world Washington towards implementing University and the Ashland Eagles. that we are fully committed to defend- much-needed comprehensive immigra- Go Eagles. ing our homeland. tion reform. f Our immigration system today is f IMMIGRATION crowded and confusing. It divides fami- (Mr. CA´ RDENAS asked and was lies, it stifles the American Dream for MEMPHIS SOUL given permission to address the House high-skilled foreign students and entre- for 1 minute.) preneurs, and it does not address the (Mr. COHEN asked and was given per- Mr. CA´ RDENAS. Last week, right exploitation of many immigrants in mission to address the House for 1 here in D.C., I hosted farm workers the workplace. minute.) from all over this country that only The proposals unveiled last night are Mr. COHEN. Last night, PBS aired ask for fair treatment and compensa- not perfect. For example, they elimi- the ‘‘Memphis Soul’’ performance re- tion as they do their work. As they nate diversity visas and certain family corded last week at the White House. chanted ‘‘Si, se puede’’—yes, it is pos- visas. But we are making progress. I The performance featured many songs sible—with 20 of us congressional Mem- look forward to supporting a bill that that were recorded at Stax Records lo- bers, I saw the look of hope on their secures our borders, makes our existing cated in Memphis. faces—hope that they would soon have laws more efficient and timely, pro- In 1998, Memphis civic leaders raised a pathway to citizenship, fair wages, motes entrepreneurship and innova- more than $10 million to build the Stax and adequate worker protections. I saw tion, provides a fair pathway to citi- Museum on the original site of Stax the same hope in the eyes of my par- zenship for the millions of immigrants Records. The museum honors all of the ents who came here as farm workers. already in the United States, and in- artists who recorded at Stax, including With the introduction of the Senate’s cludes the DREAM Act. It must also Isaac Hayes, Al Green, Otis Redding, immigration bill, farm workers are one include humane provisions to keep Booker T and the MGs, and others. step closer to gaining legal status and families of all kinds together. We can and must get this done. From Eddie Floyd’s ‘‘Knock on the right to feed their families as they Wood’’ to Booker T and the MGs’ clas- feed America. However, as any legisla- f sic ‘‘Green Onions,’’ Isaac Hayes’ tion moves forward, I will remain vigi- b 1220 ‘‘Shaft,’’ and Sam and Dave’s ‘‘Soul lant against any effort to legalize farm worker mistreatments. IN MEMORY OF FORMER MEMBER Man,’’ the recordings at Stax Records CHARLIE WILSON made significant contributions to the I look forward to working with both music of the era. sides of the aisle and both of our (Mr. CHABOT asked and was given Houses to make sure that we fix this permission to address the House for 1 Beyond honoring its history, Stax is broken immigration system. minute.) about education. In 2005, the Soulsville f Mr. CHABOT. Mr. Speaker, as dean of Charter School opened its doors to 60 the Republican delegation in the sixth graders. Now expanded to grades SENIORS’ TAX SIMPLIFICATION House, I was greatly saddened to hear 6–12, the 2013 class of Soulsville Charter ACT of the untimely passing early Sunday School has a 100 percent college accept- (Mr. FLEMING asked and was given morning of our friend and former col- ance rate and scholarships. permission to address the House for 1 league, Representative Charlie Wilson. I encourage everyone to come to minute.) Although Charlie and I were on dif- Memphis to visit the Stax Museum and Mr. FLEMING. Mr. Speaker, the ferent sides of the aisle and often dis- see the Soulsville Charter School to American people have just finished the agreed on policy, I always admired his learn more about Memphis’ contribu- annual aggravation of tax preparation. dedication to our State and his tireless tion to music. I also hope you will tune Every year, individuals and businesses energy as he worked to serve his con- in to PBS this afternoon to watch an- spend more than 6 billion hours and stituents to the best of his ability. other performance of ‘‘Memphis Soul’’ about $168 billion just to meet the fil- I am not alone when I say that a con- at 5 o’clock eastern, 4 o’clock central. ing requirements of the IRS. versation with Charlie was always

VerDate Mar 15 2010 04:23 Apr 18, 2013 Jkt 029060 PO 00000 Frm 00007 Fmt 7634 Sfmt 0634 E:\CR\FM\K17AP7.012 H17APPT1 jbell on DSK7SPTVN1PROD with HOUSE H2076 CONGRESSIONAL RECORD — HOUSE April 17, 2013 memorable and usually ended with officers and they’re paramedics and thought. In addition to most of the 11 broad smiles as you parted company. they’re doctors and nurses, and some- million illegal immigrants already in One thing that Charlie and I did have times they’re just somebody who never the country, it offers to legalize their in common is that we played college expected to be in that situation at that relatives outside the country and even football, and we were both defensive time. And yet, our fellow countrymen others who have already been deported linemen. And at least in our own respond; they’re there. home. So current immigration laws are minds, the older we got, the better we And right now we have people re- shredded. had been. sponding in the Senate. They’ve put The good news is that the House Ju- Charlie Wilson was an honorable themselves out there. They’ve run to diciary Committee will come up with a man, a trusted ally, and a worthy oppo- the challenges. It is the American spir- better plan. nent. I ask my colleagues to join in it. They touch the heart of all of us. f wishing his four sons and nine grand- And, Mr. Speaker, I just wanted to IMMIGRATION REFORM children our condolences. His 14 years say God bless them, and God bless the of government service in Ohio and in United States of America. (Mr. GALLEGO asked and was given Washington, D.C., is a legacy they f permission to address the House for 1 should always cherish and be proud of. minute and to revise and extend his re- SUPPORT BACKGROUND CHECKS God bless Charlie Wilson. marks.) ON GUN SALES f Mr. GALLEGO. Mr. Speaker, I rise (Mr. YARMUTH asked and was given today encouraged that comprehensive NOAA PROPOSES FURLOUGHS permission to address the House for 1 immigration reform is moving now (Ms. EDWARDS asked and was given minute.) that a framework has been released by permission to address the House for 1 Mr. YARMUTH. Mr. Speaker, this is our colleagues in the Senate. minute and to revise and extend her re- what my constituent, Barbara Kelty, The 23rd Congressional District, marks.) wrote to the Louisville Courier-Journal which I represent, runs some 800 miles Ms. EDWARDS. Mr. Speaker, like this morning: along the -Mexico border and in- many Americans, I began my morning While polls continue to say that a majority cludes five ports of entry. No other this morning with a check of the local of NRA members and a sizable majority of congressional district shares a larger weather forecast. It actually helps me the American people support background border with Mexico. answer questions, important questions, checks and a majority of citizens support After more than two decades, I’m en- such as what should I wear, do I need limiting magazine size, a majority in Con- couraged that our friends in the Senate an umbrella, or is a storm approaching gress at this point apparently does not favor are taking steps and we finally have either. that’s going to tie up traffic. How can that be? To me, it is evident that this framework. I look forward to The weather forecast is really impor- these Members of Congress do not feel obli- working in a bipartisan and bicameral tant, but too often it’s taken for grant- gated to us, the people who elected them, way to get it done this way. ed. And, unfortunately, thanks to the whom they represent. Rather, they feel be- Our values teach us that our families Republican insistence that sequester holden to the gun lobby which fattens their should stick together and that hard cuts take effect, our access to these campaign chests. And it is obvious that the work, not circumstance, should shape timely and reliable weather forecasts gun-making industry, which does not con- our future. I believe that our Nation may be impacted negatively. done or support gun violence, benefits from becomes stronger as more people the emotional rush of citizens exercising the On Monday, the National Oceano- right to buy protection for their families pledge allegiance to our flag and com- graphic and Atmospheric Agency, after these tragedies. mit themselves fully to our Nation and which includes the National Weather We, the citizens, must do our bit to lobby to our economy. Service, proposed 4 furlough days, with Congress and remind them that our will Last week I asked the Senate Gang of a potential for 10. The cash-strapped takes precedence. Eight to give special consideration to Weather Service provides predictions Ms. Kelty is right. In Kentucky, members of the armed services who for the ever-more-frequent extreme three out of four people support back- risk their lives every day for our coun- weather events, such as Superstorm ground checks for every gun sale. More try and our families—it’s particularly Sandy, the historic drought impacting than 90 percent of the American people, important to folks and families at our agricultural sector last year, and and three-quarters of NRA members, Joint Base Lackland in San Antonio, the tornados that ravished the South support background checks, which Laughlin Air Force Base in Del Rio, in 2011. have stopped nearly 2 million people and Fort Bliss in El Paso—and re- On a daily basis, it impacts the lives from illegally buying guns. Still, 40 quested that comprehensive immigra- of Americans across the country. Even percent of guns are purchased without tion reform eliminate the 3- and 10- today, severe storms are ravaging the a background check. year bar on spouses for spouses, pre- midsection of the country. The Weath- Mr. Speaker, I urge my colleagues in vent the termination of petitions of er Service is already understaffed. Se- the Senate to listen to the vast major- spouses and children of fallen heroes, questration could further deteriorate ity of Kentuckians and the American and streamline the naturalization proc- forecasting abilities. So, once again, people and support background checks. ess for those deployed overseas. they’ve made indiscriminate spending f I look forward to working with my cuts our top priority. We need to stop colleagues to getting it done this year. SENATE IMMIGRATION BILL this and protect our economic safety f and our national security. WORSE THAN WE THOUGHT TAXES f (Mr. SMITH of Texas asked and was given permission to address the House (Mr. STIVERS asked and was given IN RECOGNITION OF FIRST for 1 minute and to revise and extend permission to address the House for 1 RESPONDERS his remarks.) minute and to revise and extend his re- (Mr. CHAFFETZ asked and was given Mr. SMITH of Texas. Mr. Speaker, marks.) permission to address the House for 1 it’s hard to believe, but the Senate im- Mr. STIVERS. Mr. Speaker, as you minute and to revise and extend his re- migration bill is worse than we all know, Monday was tax day, so it’s marks.) thought. an appropriate time to talk about the Mr. CHAFFETZ. Mr. Speaker, our Despite assurances, the border is not need for tax reform. We need a simpler, hearts and prayers go out to those in secured before almost everyone in the more competitive Tax Code that’s flat- Boston and and all the country illegally is given amnesty. So ter and fairer so that we can create States where people came from to par- the bill guarantees there will be a rush jobs and put Americans back to work. ticipate in the marathon. across the border to take advantage of We need a simpler code. In fact, the I, in particular, Mr. Speaker, wanted massive amnesty. code, when you include all its regula- to stand and thank those first respond- And the bill offers amnesty to far tions, annotations, and explanations, ers. They’re firemen and they’re police more illegal immigrants than we totals 74,000 pages. And according to

VerDate Mar 15 2010 03:14 Apr 18, 2013 Jkt 029060 PO 00000 Frm 00008 Fmt 7634 Sfmt 0634 E:\CR\FM\K17AP7.013 H17APPT1 jbell on DSK7SPTVN1PROD with HOUSE April 17, 2013 CONGRESSIONAL RECORD — HOUSE H2077 the latest estimate from the United talking about meaningful, strategic owe. But what we don’t need is higher States Treasury, Americans spent 6.1 tax reform. taxes. billion hours complying with the Tax I was a business owner and CEO for 12 The government is already poised to Code. We also need a more competitive years. Because of that, I understand in take in record revenues this year, yet Tax Code. The United States has the a very personal way that the current the President insists on calling for an- highest corporate tax rate in the world. tax system is rife with waste. It invites other $1.1 trillion in new taxes. Lev- Simplifying our Tax Code and closing abuse. Worst of all, it creates so much ying more taxes on families and busi- loopholes for everyone will help create uncertainty as to make it difficult, if nesses won’t create jobs and won’t lead an environment that encourages job not impossible, to make good decisions to economic prosperity. Rather, we growth and increases wages. The Ryan about our future. need to cut spending, balance the budg- budget is based on such reforms. These Again and again, we read stories and et, and rein in excessive government. reforms can help get Americans back we see examples where the current Tax Comprehensive tax reform is some- to work. Code punishes success while ignoring thing that the American people over- whelmingly support and something f the economic impacts of poor govern- ment policy. We can do better than that House Republicans remain com- RECOGNIZING THE MERCED COM- this. We have an opportunity to do bet- mitted to addressing. MUNITY VIOLENCE INTERVEN- ter than this. We must do better. Ev- f TION AND PREVENTION TASK eryone will benefit. GUN REFORM FORCE Let’s do this now. (Ms. HAHN asked and was given per- (Mr. COSTA asked and was given per- f mission to address the House for 1 mission to address the House for 1 REMEMBERING THE VICTIMS IN minute.) minute and to revise and extend his re- BOSTON Ms. HAHN. Mr. Speaker, background marks.) checks may not have changed what Mr. COSTA. Mr. Speaker, on Monday, (Mr. CICILLINE asked and was given permission to address the House for 1 happened at Sandy Hook, but I hope in Boston, we were reminded how vul- Sandy Hook changes what happens nerable we all are as Americans and minute.) Mr. CICILLINE. Mr. Speaker, last here. how important it is that we stay to- Ninety percent of the American peo- gether. Monday, men and women from around the world traveled to the beautiful city ple agree that expanding background Today, I rise to recognize the Merced checks for gun sales is the right thing Community Violence Intervention and of Boston to take part in the 117th run- ning of the Boston Marathon. to do. These checks will help keep guns Prevention Task Force. This hard- out of the hands of the mentally unsta- working organization in the San Joa- But this longstanding American tra- dition, this celebration of athletic ble, convicted felons, and domestic quin Valley that I represent is the 2013 abusers who threaten the safety of our recipient of the Lois Haight Award of achievement was shattered at 2:50 east- ern time when two bombs went off families and our communities. Excellence and Innovation from the It’s time for Congress to listen to along the finish line, killing three Victims’ Rights Caucus, of which I am common sense and the voices of the spectators, including an 8-year-old a cochair. American people. child, and injuring nearly 200 more. The task force is an innovative col- I say to my Senate colleagues: You At times like this, words fail to cap- laboration of local leaders that was came here to work for the American ture the sense of our disbelief, the pain formed in 2006 in response to gang-re- people, not just to work for your re- in our hearts, and the anger we feel to- lated violence throughout the Merced election. We’re here to do a job, not wards anyone who would do such great community. The task force makes just keep our jobs. harm to so many innocent lives. Merced a safer place by educating the I support Senators MANCHIN and Although we do not yet know the community about violence, promoting TOOMEY for coming together in a bipar- character development, and providing identity of the perpetrators, what we tisan way to push forward this legisla- information to families and, most im- do know is that our country will not tion for expanded background checks. portantly, our youth. rest until they are brought to justice. All we need is 60 Senators who have the From gang awareness workshops to The American people will emerge from courage to stand up and do the right Merced County’s first anonymous ‘‘text this horrific incident stronger and thing. a tip’’ line, the task force has contrib- more united than ever before. Commonsense measures to fight trag- uted greatly to our Merced community Like all Rhode Islanders since last edy shouldn’t be a heavy lift. This and throughout the area. Monday, my thoughts have remained should be an easy vote. On behalf of the Victims’ Rights Cau- with the people of Boston and all of the The SPEAKER pro tempore. All cus, congratulations and thank you to victims of this vicious act of violence Members are reminded to direct their the Merced Community Violence Inter- and their loved ones, and I pray that remarks to the Chair. the passage of time might bring them vention and Prevention Task Force. f some level of comfort. f IMMIGRATION REFORM f b 1230 (Mr. KING of Iowa asked and was TAX REFORM given permission to address the House TAX REFORM (Mr. DESJARLAIS asked and was for 1 minute.) (Mr. STEWART asked and was given given permission to address the House Mr. KING of Iowa. Mr. Speaker, I permission to address the House for 1 for 1 minute and to revise and extend come to the floor here to announce minute.) his remarks.) that the Senate released their Gang of Mr. STEWART. Like all Americans, Mr. DESJARLAIS. Mr. Speaker, this Eight immigration bill sometime my heart and prayers go out to the week, many of my constituents filed around 2:45 a.m. this morning. It didn’t people of Boston. tax returns. Unfortunately, their taxes take very long for the secret group in Mr. Speaker, I’m grateful for the op- weren’t the only thing that they had to the House to release their support for portunity to stand and speak on a very pay. Hardworking Americans will the bill. They had time, apparently, to important issue today. It may not be spend $168 billion completing their analyze the 844 pages that are in this as interesting, it may not grab as much taxes under our country’s 4-million- bill. attention as any other issue, but I’m word Tax Code. I’ve had time to analyze a little bit of not aware of any other thing that we America’s tax system is broken and it. Mr. Speaker, what it says is this: could talk about that has the potential simply doesn’t meet the needs of the they want to instantaneously legalize to invigorate our economy, to expand 21st century economy. It is time for a everybody that’s here in America ille- personal freedoms, and restore faith in simpler, fairer, flatter code, one that gally, with a few exceptions, in case our government and, frankly, in our fu- eliminates special interest loopholes to they decide to enforce the law against ture like this issue could. Of course I’m ensure that everyone pays what they them.

VerDate Mar 15 2010 03:14 Apr 18, 2013 Jkt 029060 PO 00000 Frm 00009 Fmt 7634 Sfmt 0634 E:\CR\FM\K17AP7.014 H17APPT1 jbell on DSK7SPTVN1PROD with HOUSE H2078 CONGRESSIONAL RECORD — HOUSE April 17, 2013 That doesn’t satisfy them, Mr. fying the Tax Code will help them save How about $168 billion? That’s how Speaker. They even want to legalize time and money that they can then put much our fellow Americans spend each the people that have been deported and towards growing their businesses, hir- year just to make sure they comply sent to their home countries and bring ing new employees and raising wages. with our overcomplicated Tax Code. them back to the United States. If that Washington must also streamline Just how complicated are the tax rules occurs, 11 million to 20 million be- regulations that are strangling growth. in this country? Well, here is another comes at least 30 million people. The REINS Act would require that any number—4 million. That’s how many Because we have what they call a ‘‘de regulation with an annual impact of words there are in the U.S. Tax Code. facto’’ amnesty now, it is, in fact, lit- $100 million or more be subject to a There are 4,500 words in the U.S. Con- erally amnesty now, and making that vote of this House. stitution. There are 775,000 words in the promise is going to start another rush With the right tax and regulatory Bible. Yet there are 4 million in our over our borders. policies, America’s economy can thrive Tax Code. We must restore the rule of law. again. What does this all add up to? It means that our current tax system f f is broken. We need fundamental, com- IMMIGRATION REFORM b 1240 prehensive tax reform to make our Tax (Mr. PAYNE asked and was given CLOSE GUANTANAMO BAY Code fairer and simpler for all Ameri- permission to address the House for 1 (Mr. MORAN asked and was given cans. That is the House Republican minute.) permission to address the House for 1 plan. Mr. PAYNE. Mr. Speaker, creating minute and to revise and extend his re- f an immigration process for new Amer- marks.) PROVIDING FOR CONSIDERATION ican immigrants is not just an issue Mr. MORAN. Mr. Speaker, about 12 OF H.R. 624, CYBER INTEL- that will shape the future for one years ago, 779 people were gathered ini- LIGENCE SHARING AND PROTEC- group. tially and sent to the prison at Guanta- TION ACT So much is at stake for 3 million Af- namo Bay, Cuba. About 85 percent of Mr. WOODALL. Mr. Speaker, by di- rican and Caribbean immigrants that them had never actually engaged in di- live and work here. They’re a vital part rection of the Committee on Rules, I rect combat against the United States. call up House Resolution 164 and ask of our future as hardworking, upstand- A report was issued by an independent, ing individuals in search of freedom for its immediate consideration. authoritative commission yesterday The Clerk read the resolution, as fol- and a better life. They also deserve a that I want to bring attention to. It lows: fair system that works, and they are was headed by Asa Hutchinson, a more than just a number on a page. former Republican colleague of ours, H. RES. 164 Last week, a young lady came to my and 4 star General Jim Jones, who was Resolved, That at any time after the adop- tion of this resolution the Speaker may, pur- office who was born in America to Hai- head of the National Security Council tian parents. Her name is Natalie. Nat- suant to clause 2(b) of rule XVIII, declare the in the Obama administration. House resolved into the Committee of the alie is a graduate student who has job It concluded that the United States Whole House on the state of the Union for offers lined up. She is ready to work engaged in the practice of torture at consideration of the bill (H.R. 624) to provide and commits herself to this country. Guantanamo Bay. It concluded that for the sharing of certain cyber threat intel- But Natalie can’t do those things be- the methods we used, like ligence and cyber threat information be- cause of our broken immigration sys- waterboarding, slamming prisoners tween the intelligence community and cy- tem. She is neither recognized as a cit- into walls, chaining them in stress po- bersecurity entities, and for other purposes. izen here nor in Haiti. While in tears, The first reading of the bill shall be dis- sitions for hours, violated inter- pensed with. All points of order against con- she said she has no home. She can’t see national legal obligations with ‘‘no sideration of the bill are waived. General de- her family. She’s scared and feels firm or persuasive evidence that they bate shall be confined to the bill and shall alone. Natalie is one of those 11 million produced valuable information that not exceed one hour equally divided and con- people that are looking for a pathway could not have been obtained by other trolled by the chair and ranking minority to citizenship. means.’’ It also concluded that what we member of the Permanent Select Committee It is time to pass commonsense legis- did had ‘‘no justification’’ and ‘‘dam- on Intelligence. After general debate the bill lation that fixes our immigration sys- shall be considered for amendment under the aged the standing of our Nation, re- five-minute rule. In lieu of the amendment tem once and for all, one that serves duced our capacity to convey moral in the nature of a substitute recommended our interests and reflects our values for censure when necessary, and poten- by the Permanent Select Committee on In- Natalie and the 11 million other Nat- tially increased the danger to U.S. telligence now printed in the bill, it shall be alies who call America home. military personnel taken captive.’’ in order to consider as an original bill for the f It concluded that President Bush and purpose of amendment under the five-minute rule an amendment in the nature of a sub- AMERICA’S ECONOMY CAN THRIVE Vice President Cheney were directly involved in condoning such tactics and stitute consisting of the text of Rules Com- AGAIN mittee Print 113-7. That amendment in the that their legal advisors engaged in (Mr. ROTHFUS asked and was given nature of a substitute shall be considered as ‘‘acrobatic’’ legal analysis to attempt read. All points of order against that amend- permission to address the House for 1 to establish legal justification. ment in the nature of a substitute are minute and to revise and extend his re- There was no legal precedent. Guan- waived. No amendment to that amendment marks.) tanamo Bay should be closed—now. in the nature of a substitute shall be in order except those printed in the report of the Mr. ROTHFUS. Mr. Speaker, the so- f lution to our economic challenges is Committee on Rules accompanying this res- one simple word: growth. Unfortu- TAX REFORM olution. Each such amendment may be of- nately, the only place really growing in (Mr. SOUTHERLAND asked and was fered only in the order printed in the report, our country today is Washington, D.C. may be offered only by a Member designated given permission to address the House in the report, shall be considered as read, As I travel my district, workers, job for 1 minute and to revise and extend shall be debatable for the time specified in seekers, and small business owners tell his remarks.) the report equally divided and controlled by me they’re concerned about jobs and Mr. SOUTHERLAND. Mr. Speaker, the proponent and an opponent, shall not be economic security. it’s tax week. As you know, that means subject to amendment, and shall not be sub- Washington must unleash their eco- that Americans’ heads are chock-full of ject to a demand for division of the question nomic potential by spending less, tax- all kinds of numbers. We’ve done all in the House or in the Committee of the ing less, and regulating less. Wash- kinds of itemizations, deductions, and Whole. All points of order against such ington has to stop growing so the rest calculations in our personal finances amendments are waived. At the conclusion of consideration of the bill for amendment of the country can start to grow. just to make sure that we know how the Committee shall rise and report the bill Small business owners this year much we are going to hand over to to the House with such amendments as may spent upwards of 2 billion hours trying Uncle Sam. Let me share with you have been adopted. Any Member may de- to comply with our Tax Code. Simpli- some more numbers. mand a separate vote in the House on any

VerDate Mar 15 2010 03:14 Apr 18, 2013 Jkt 029060 PO 00000 Frm 00010 Fmt 7634 Sfmt 0634 E:\CR\FM\K17AP7.016 H17APPT1 jbell on DSK7SPTVN1PROD with HOUSE April 17, 2013 CONGRESSIONAL RECORD — HOUSE H2079 amendment adopted in the Committee of the of them is a bipartisan amendment. morrow than we are today, but the Whole to the bill or to the amendment in the But the rule is designed to allow that bulk of the words in this bill don’t nature of a substitute made in order as origi- further discussion because of the very speak to the sharing in terms of ena- nal text. The previous question shall be con- important nature of the underlying bling it. It speaks to the sharing in sidered as ordered on the bill and amend- ments thereto to final passage without inter- bill. terms of restricting it. Page after page vening motion except one motion to recom- I rise, of course, in support of the after page after page of this short, 24- mit with or without instructions. rule to allow for that debate, and I rise page bill talks about how we as citizens The SPEAKER pro tempore. The gen- in support for the underlying bill. In must, must, must continue to be safe tleman from is recognized for 1 today’s world, you don’t have to have a and secure in the privacy of our own hour. battlefield full of tanks to wage war on information. Mr. WOODALL. Mr. Speaker, for the your enemy. A nation-state can have a It’s a four-step process the bill lays purpose of debate only, I yield the cus- roomful of young computer scientists out, Mr. Speaker, in terms of how we tomary 30 minutes to my friend, the and a couple of computers and begin to can ensure that no personally identifi- able information is being shared from gentleman from Florida (Mr. HAS- be a threat to the largest, most demo- Home Depot or Delta or UPS or any of TINGS), pending which I yield myself cratically controlled country in the such time as I may consume. During world. the other folks who are out there on consideration of this resolution, all How do we stop that, Mr. Speaker? the Internet when they’re sharing that time yielded is for the purpose of de- Because we don’t want to close our bor- with the government or with one an- bate only. ders. We don’t want to have Federal other in order to prevent threats to control over the Internet. In so many American security or economic pros- GENERAL LEAVE of these nation-states, the government perity, to ensure that personally iden- Mr. WOODALL. I ask unanimous con- does control the Internet. That’s never tifiable information is not a part of sent that all Members may have 5 leg- going to happen here in America. that information that’s shared, because islative days to revise and extend their That’s not who we are. That’s not what privacy is paramount. remarks. we’re about. In fact, 10 private sector I’ve been tremendously impressed The SPEAKER pro tempore. Is there providers control about 80 percent of through this process, Mr. Speaker, be- objection to the request of the gen- the networks here in America—as it cause I’m one of the folks who is most tleman from Georgia? should be. likely to be suspect when we start There was no objection. But what can we do to make our- talking about sharing information with Mr. WOODALL. Mr. Speaker, I al- selves safer tomorrow than we are the government. I’m a big lover of lib- ways enjoy the reading of the resolu- today? Here is what the underlying bill erty. There’s not many things I’m will- tion. There are a lot of readings that does, Mr. Speaker: it enables, for the ing to give liberty up for. In fact, I dare you can waive on the floor of this very first time, businesses and govern- say there’s not a one that I’m willing House, but not so with a Rules resolu- ments to share information about the to give liberty up for. tion because this resolution is framing threats that they are facing. But the Intelligence Committee, the nature of the debate we are going If you go up the road to Maryland, from which this bill came, has worked to have perhaps on the most important where the NSA is operating today, with Members month after month after issue that we’ve taken up so far in this there are some smart, smart folks month after month to ensure that pri- Congress. there, and I’m glad we have every sin- vacy is protected, that we as citizens The underlying bill is H.R. 624. It’s gle one of them on the front lines of can be secure. At the same time that the Cyber Intelligence Sharing and cyber warfare—protecting America, we’re fighting threats that perhaps Protection Act. protecting American enterprise. Yet we’re not allowed to talk about on this Whenever we start talking about today, when they are aware of threats floor, we’re protected from threats that cyber intelligence sharing and protec- that are impending threats to our fi- each and every one of us experiences in tion, folks often think that sharing and nancial system, threats to our eco- our day-to-day lives—a threat to pri- protection are oxymorons—you can’t nomic system, they can’t share that in- vacy. have protected sharing, and you can’t formation with the private sector. It’s not been easy to craft this bill, have shared protection. It’s not an easy Back in my home district, Mr. and it has been an incredible bipartisan nut to crack, Mr. Speaker. I don’t sit Speaker, we’re home to UPS—the effort throughout, Mr. Speaker, in on the Intelligence Committee, but I’ve United Parcel Service—Delta, Home order to put this language together. been down to the classified briefings Depot. If those companies come under Again, we have four Republican amend- where folks are sharing details of the attack today, Delta can’t share that ments made in order by this rule, seven amazing successes that our teams, both information with American Airlines Democratic amendments made in order domestically and abroad, are having and say, Look at what has just hap- by this rule, and one bipartisan amend- and combating in cyber threats; but pened to us. Be on the lookout. It ment made in order by this rule. It is it’s getting harder and harder every might happen to you. Home Depot my great hope that we can move for- day, and we have to balance the na- can’t share with Lowe’s today, This is ward today with this rule, with debate tional security implications of failing what has happened to us. We want you on the underlying bill, and move for- to address these threats with what we, to be on the lookout. Don’t let it hap- ward with something that is far, far, as all Americans, love, which is our lib- pen to you. far overdue, Mr. Speaker, and that’s erty here at home—our liberty here at protecting America—American busi- 1250 home, our privacy here at home. b ness and American individuals, Amer- In order to try to crack that, Mr. This bill changes that. This bill, for ican citizens—from the threats posed Speaker, you’ll know that we brought the first time, says in the name of de- by nation states through cyber warfare this bill to the floor in the last Con- fending America and American inter- from abroad. gress, and it has been changed and im- ests against cyber threats around the With that, I reserve the balance of proved since that time. Today, this globe, you can begin to share with one my time. rule makes in order an additional 12 another what your experiences are and Mr. HASTINGS of Florida. Mr. amendments. Now, of course we’ll have opportunities to protect yourself from Speaker, I thank my friend from Geor- the traditional 1 hour of debate on the having that happen to you again in the gia for yielding me the customary 30 underlying bill, but there will be an- future. minutes, and I yield myself such time other 12 amendments, each debated—2 Now, the real important thing to me as I may consume. hours of total additional time—so that about this bill, and I will just hold it Before I begin, I would like to take a Members can have their voices heard. up for you, Mr. Speaker, the Cyber In- moment, as have almost all of our col- Of these additional 12 amendments, telligence Sharing and Protection as- leagues that have spoken here today, four of them were offered by Repub- pect of this bill, it’s the important to offer my sincerest condolences to lican Members; seven of them were of- part. It’s the meat of this bill. It’s the people of Boston, Massachusetts, fered by Democratic Members; and one what’s going to allow us to be safer to- following the deadly explosions at

VerDate Mar 15 2010 03:14 Apr 18, 2013 Jkt 029060 PO 00000 Frm 00011 Fmt 7634 Sfmt 0634 E:\CR\FM\A17AP7.001 H17APPT1 jbell on DSK7SPTVN1PROD with HOUSE H2080 CONGRESSIONAL RECORD — HOUSE April 17, 2013 Monday’s marathon. I can’t speak for espionage that range as high as $400 measure as complicated as this one, everyone here, but I believe that most billion a year. contemplating all of the factors that of us would say that the thoughts and Unfortunately, the same vulnerabili- I’ve identified and more, including the prayers of the United States Congress ties used to steal trade secrets can be members of the committee. are with the victims, their families and used to attack the critical infrastruc- I would urge Members of the House of friends at this most difficult time. ture we depend on every day. Our econ- Representatives—many of them con- Those responsible for this act of terror omy, our power grids, and our defenses tinue to have concerns, not only about will be brought to justice. are increasingly reliant on computers this particular legislation, but about Mr. Speaker, while I rise today in and network integration. These net- other intelligence matters, and rightly support of H.R. 624, the Cyber Intel- works power our homes, provide our so are they concerned. But let me re- ligence Sharing and Protection Act, clean water, protect our bank ac- mind them that they are Members of a better known as CISPA, I do not sup- counts, defend our intellectual prop- body that allows, if they wish to go port the rule. My friend from Georgia erty, guard our national security infor- into the spaces of the Intelligence spoke about how important it is that mation, and manage other critical Committee and to be briefed by staff we have the reading of the rule, and services. In addition to intellectual and Members there on classified infor- one of the particular efforts of Con- property and national security intel- mation, upon appropriate under- gress that allows for there not to be ligence, personal finance, health care, takings, they too can gain the informa- any abridgement of that, but I do be- and other private records are prime tion and insight that’s needed in order lieve that we would be better served if targets for hackers to steal. to make an intelligent determination this were an open rule. According to the Information Tech- when they are voting, rather than Last night, during our Rules Com- nology Industry Council, 18 adults be- come out here and criticize the people mittee hearing, the majority blocked come victims to cyber crime—includ- that do that hard work. They get no several germane Democratic amend- ing identity theft and phishing cam- benefits, no concerns from the Mem- ments which would have further helped paigns—every second. This adds up to bers, and yet, cannot say all of the to balance cybersecurity concerns with 1.5 million cyber crime victims each things that are needed to say or be said smart policies that protect our citi- day. to the American public. zens. I spoke to those issues last night, The same holds for ADAM SCHIFF and b 1300 and I raise them again, particularly JAN SCHAKOWSKY and others that I the two amendments offered by our Cyber attacks present a very real and won’t mention that I served on that colleagues, Ms. SCHAKOWSKY and Mr. dangerous threat to the United States. committee with. These are conscien- SCHIFF, and others. However, the government currently tious people who spend more time than However, the underlying CISPA leg- does not have the authority to share almost any Member of Congress on any islation is, as my friend from Georgia classified cyber intelligence informa- matter that he or she is attending to, said, a bipartisan bill that aims to safe- tion with the private sector. and I have great respect for them. I guard our Nation’s computer networks While private companies have taken don’t agree with everything that either and critical infrastructure by allowing considerable measures to protect their or all of them say, but I know they put for two-way cyber threat information networks, they often have limited in- their heart and time, both in the sharing on an entirely voluntary basis, formation and can only respond to amendments that are offered, as well both between the private sector and known threats. as in this bill and the particulars that the Federal Government, and within Cyber threats evolve at the speed of are being put forward to this body. the private sector itself. technology, and CISPA, this measure, As a result of their work, 19 improve- In his March 12, 2013, testimony be- helps the private sector protect against ments to enhance privacy and protect fore the Senate Intelligence Com- cyber attacks by providing companies Americans have been adopted. Chief mittee, the Director of National Intel- with the latest cyber threat informa- among them, this CISPA measure that ligence, James Clapper, stated for the tion from the intelligence community, requires the government to eliminate first time that cyber attacks and cyber which has timely, classified informa- any personal information it receives espionage have supplanted terrorism as tion about destructive malware. This that is not necessary to understand the the top security threat facing the cyber threat intelligence is the infor- cyber threat. United States. mation that companies and the govern- It creates no new authorities for any In recent months, media reports have ment need to protect and defend their agency, and I can’t say that enough. It highlighted cyber attacks on several networks. creates no new authorities for any major U.S. companies, including The so-called ‘‘signatures’’ are pri- agency. Facebook, Google, and the network se- marily made up of numerical codes It gives companies the flexibility to curity firm RSA, as well as The New consisting of zeros and ones, without choose which agency within the intel- York Times, Bloomberg News, and The any personal information attached. ligence community they would like to Washington Post newspapers. CISPA is the product of close co- work with to protect the cyber net- Furthermore, government networks operation between the intelligence works. It requires an annual review such as those of the Central Intel- community, the private sector compa- and report by the intelligence commu- ligence Agency and the United States nies, and trade groups and, to a certain nity’s inspector general of the govern- Senate have also been targeted by degree, the White House, as it pertains ment’s use of any information shared hackers. Waves of cyber attacks have to many of the measures that are in- by the private sector. sought to disrupt operations at finan- cluded in this legislation. And I would urge Members, when we cial institutions and service providers, During their efforts to improve the increase the responsibilities of the in- including American Express, JPMorgan bill, they also maintained a dialogue spector general that we also give the Chase, Citigroup, Wells Fargo, Bank of with privacy advocates in an effort to inspector general the resources in America, MasterCard, PayPal, and strengthen civil liberties protections order to be able to do the necessary Visa. and oversight. oversight that is required in this legis- The fact of the matter is that state I add a personal note here for the rea- lation. actors, terrorist organizations, crimi- son that, over a period of 10 years, I It includes something that I very nal groups, individuals, and countless served 8 of those years on the Intel- much support, and that is a 5-year sun- persons that describe themselves as ligence Committee, and the now-chair- set provision. I’ve supported other 5- hackers attack our public and private man of the Intelligence Committee and year sunset provisions in the intel- computer networks thousands of times ranking member were both junior ligence community and would have every day. Many foreign hackers seek members of the committee that I preferred, in this instance, that it be a to steal valuable trade secrets, which served on. They have risen to the posi- 3-year provision. But the fact of the results in the loss of countless Amer- tion that they are in and have acted in matter is, it’s 5, and we will learn an ican jobs. There are estimates that an extremely responsible way, over a 2- awful lot during that period of time, have been quoted of loss from economic year period of time, trying to bring a and we will be back here dealing with

VerDate Mar 15 2010 03:14 Apr 18, 2013 Jkt 029060 PO 00000 Frm 00012 Fmt 7634 Sfmt 0634 E:\CR\FM\K17AP7.019 H17APPT1 jbell on DSK7SPTVN1PROD with HOUSE April 17, 2013 CONGRESSIONAL RECORD — HOUSE H2081 this same subject at some point in the personal information is scrubbed from ward by Members of both parties and future. that as it comes in. under this rule were prevented from Allowing for the appropriate sharing There are immense reporting require- being debated upon here on the floor of of cyber threat information between ments for this system to be put in the House, which is why I strongly en- the government and private sector is place, so that if there are occasional courage my colleagues to vote ‘‘no’’ on key to protecting our Nation from breaches, and there may be, that those the rule and ‘‘no’’ on the underlying those who would do us harm. CISPA breaches are reported on a timely basis bill in its present form. balances the critical need to strength- to the committee, not at the end of There’s no disagreement that cyber- en our cyber defenses while protecting some arbitrary period but as quickly as security is a very real and important Americans’ individual privacy. the system can report it to the over- issue. Threats come from criminal en- I reserve the balance of my time. sight committees that have jurisdic- terprises, they come from nation Mr. WOODALL. Mr. Speaker, at this tion. states, they come from corporations, time it’s my great pleasure to yield 3 There is no ambiguity in this bill. It they come from 16-year-olds. There’s a minutes to the gentleman from Texas says what can be done and what cannot variety of threats to both the public (Mr. CONAWAY), one of those Members be done, and it outlines the con- and private sector both here and on the Intelligence Committee my sequences for breaking the law. abroad. The question is, What’s the so- friend from Florida spoke of, a gen- Let me also agree with my colleague lution? tleman who serves us all. from Florida. It has a sunset provision. One of the first fallacies with the Mr. CONAWAY. Mr. Speaker, I appre- Five years from now, future Congresses premise of this bill at the 20,000-foot ciate the opportunity to speak. will have to either deal with this or it level is, Who helps who? Frankly, it is I rise in strong support of the rule goes away. And so unlike many of our the government that needs to learn and and the underlying legislation that is bills that just simply go on unless we the private sector that leads the way. before us this afternoon. actually do something, this has the I’ve talked to a number of technology I also want to congratulate my col- protection of allowing those who dis- executives, having been a technology league from Florida. I agree whole- agree with it to know that there will executive before I got here, and they heartedly with his reasons why this is be another bite at this apple 5 years are frequently ahead of the govern- important. He walked through those from now if, in fact, there are things ment. Because everyday they’re fight- very eloquently. we’ve learned about that intervening 5- ing hacking attempts and they’re on I’d like to speak quickly as to what year period. the front lines of cybersecurity. this bill does not do. It does not create But this is critical for America to Now it’s not a doubt whether they a government surveillance program. It have this. If this were a physical at- want free help. Who wouldn’t want free does not give the government the au- tack on this country, there would be no help? Should we in fact as taxpayers thority to monitor private networks or question that the Federal Government, subsidize the defense of those who have communications like email or other through its military, would stand in not invested in their own cybersecu- activities. the breach and protect this country. rity? Should this be a bailout of com- And it is strictly voluntary. It does There are no less dangerous attacks panies with poor cybersecurity? But not create a mandate on the private conducted against infrastructure, the truth of the matter is most of the sector that they participate. In fact, banks, airlines, other things every sin- learning that needs to occur is from these activities, monitoring and sur- gle day that we weren’t able to help the private sector to the government. veillance, are specifically excluded protect the private sector from, and And, in fact, we’re taking some of from being an activity that would be this bill goes a long way toward doing those steps. The government and the authorized under this bill. that. NSA are using private contractors who There are four purposes for which I urge my colleagues to support the are in the forefront of this issue every this activity can be conducted, and rule and the underlying bill. day, and that’s more of the direction whatever gets done has to fit within Mr. HASTINGS of Florida. Mr. we need to go. one of these four. One is cybersecurity. Speaker, I’m privileged to yield 5 min- The notion that somehow the govern- Two is investigating and prosecuting utes to the distinguished gentleman ment would be of assistance to compa- cybersecurity crimes. Three would be from Colorado (Mr. POLIS), my col- nies is laughable to many of the tech- preventing death and physical injury, league on the Rules Committee. nology executives that I talk to; nor and four would be protecting minors Mr. POLIS. Mr. Speaker, where to would they expect to call the govern- from physical and psychological harm. begin? ment for help when they themselves So whatever gets done under this bill Let’s start with process. This, as has are so far ahead. But to the extent we has to fit within those narrow cat- been indicated by everyone who spoke want to get the government involved egories specifically to make that hap- thus far, is a critical issue for our with information and with the private pen. country, getting the balance right be- sector here, we need to be very careful As both speakers have said already, tween protecting American infrastruc- how this information is used, not just great work has been done in trying to ture and our way of life, with our civil from a civil liberties perspective, protect the privacy and the civil lib- liberties and confidence in the Internet which we’ll be talking about, but be- erties that all of us have. Those who ecosystem. And yet, this rule only al- cause this is an economic issue; it’s a have a grave concern that we’ve not lows 1 hour of debate in the House of confidence issue. fixed those, I would ask them to simply Representatives on this bill. The Internet has been a tremendous go review the contract they have with engine of innovation and economic their Internet service provider. They b 1310 growth. And we should be concerned have ceded immense personal liberties I might add, the amendments that for the Internet ecosystem, concerned and privacies under that contract to were talked about in the Rules Com- for the millions of jobs, concerned for simply sign up with that Internet serv- mittee last night, the amendments the great value that’s been created, the ice provider. that actually address some of the defi- benefits to consumers across the coun- So as they look at what we’re trying ciencies which I’ll be getting into try, the way it’s touched our lives in so to do with this bill, I would argue that about this bill, are not allowed under many ways. they may have already gone past that this rule. In fact, out of the 12 amend- What’s fundamentally flawed in this with respect to those guys. ments allowed, two of them are actu- approach is it trumps privacy agree- This bill does nothing like that what- ally the same. The same exact amend- ments in terms of use that Internet soever. No personal information can be ment allowed twice. And yet a number companies enter with their users. So shared. There’s a mandate that the of other amendments are not even al- you could sign up for a service on the government put in place filters so that, lowed to be debated or voted on here on Internet, it could say explicitly we will as that data’s coming in at the speed of the floor of the House. not share this information with the light, no one’s reading this informa- I hold in my hands many, many government unless required by law, in tion. This is machine-to-machine. That amendments that were brought for- terms of use—and frequently there are

VerDate Mar 15 2010 03:14 Apr 18, 2013 Jkt 029060 PO 00000 Frm 00013 Fmt 7634 Sfmt 0634 E:\CR\FM\K17AP7.020 H17APPT1 jbell on DSK7SPTVN1PROD with HOUSE H2082 CONGRESSIONAL RECORD — HOUSE April 17, 2013 statements analogous to that in ly heartfelt are his concerns to na- under the immunized conduct in the there—and the minute you click send tional security if we fail to come to- bill, private entities can share informa- and complete it, if this bill were law, gether and address this issue. tion with each other without ever the company you gave that informa- I would like to be able to say, Mr. going through the government. In tion to could then turn around, in vio- Speaker, that when we pass this bill those circumstances, how can the gov- lation of their own terms of use, and today, it’s going directly to the Presi- ernment minimize what it never pos- provide all that information to the dent’s desk for signature. I don’t actu- sesses? So government-side minimiza- government. ally believe that to be true. I think it’s tion alone, which is all this bill in- The limitations on what the govern- a long process between now and getting cludes, is not enough. ment would do with that information it to the President’s desk for signature. We have responded to the concerns of are completely inadequate. There is a And I know the gentleman will be rais- industry by making sure that when we section of the bill on pages 10 and 11 ing these concerns throughout that ask them to take reasonable efforts to that deals with those limitations. process. remove personal information, they can First, it says that information can be But I just cannot emphasize enough, do so in real-time through automated used for cybersecurity purposes. Okay, Mr. Speaker, the dangers to the lib- processes. The witnesses who testified that’s the purpose of the bill: inves- erties of the American people of failing before the Intelligence Committee said tigation and prosecution of cybersecu- to begin this process today. I’m very that often the private parties are in rity crimes. That’s okay. Then it goes proud we’re allowing 12 amendments the best position to anonymize the far afield into pretty much everything. today to work through the concerns data. This is something they’re doing It talks about bodily harm, danger of that the gentleman has, among others. anyway. And it’s more than reasonable to require them to do that, particu- death. When we look at bodily harm But the importance of beginning this larly if we want to give them a broad and bodily injury, that includes things process today cannot be overstated. grant of immunity. under USC section 18, 365: cuts, abra- I reserve the balance of my time. sions, bruises, disfigurement, including Mr. HASTINGS of Florida. Mr. b 1320 mental pain. Speaker, I am very pleased at this time Mr. Speaker, without an amendment So this is anything the government to yield 3 minutes to the gentleman to ensure that companies remove pri- wants to use the information for. Paper from California (Mr. SCHIFF), my friend vate information when they can do so— that can cause paper cuts. The govern- and a distinguished member of the In- when they can do so through reason- ment can collect who’s buying paper, telligence Committee. able efforts—I cannot support the un- who’s buying scissors, who’s playing Mr. SCHIFF. I thank the gentleman derlying bill. I believe that Members of football, who’s organizing gun shows, for yielding. both parties who support this change who’s a Tea Party enthusiast. Mr. Speaker, I rise in opposition to deserve the chance to vote on it. I sus- The SPEAKER pro tempore. The the rule. At the outset, let me say that pect that because that issue would time of the gentleman has expired. the cyber threat is real and its damage have gathered broad support, it is not Mr. HASTINGS of Florida. I yield the already devastating. And I very much being brought up for a vote here on the gentleman 1 additional minute. appreciate the work that the chair and floor, and that is very disappointing. Mr. POLIS. And there are absolutely ranking member of the Intelligence Accordingly, I urge a ‘‘no’’ vote on the no protections with regard to what is Committee have done on this bill, and rule, and I thank the gentleman for done with that information. I appreciate that we have made and are yielding. There are a number of improvements continuing to make improvements. Mr. WOODALL. Mr. Speaker, I yield that could make this bill viable, and But as the bill currently stands and myself 60 seconds to say I agree with these are not allowed under this rule. as it will stand even after the amend- my friend, that the private sector is My colleague, Mr. SCHIFF, has put for- ments allowed by the rule are adopted, often in the best position to get the ward an amendment that would have the bill simply does not do enough to work done that we’re talking about in simply required that reasonable pre- protect the private information of this bill. cautions were taken to ensure privacy Americans. Most importantly, I’m dis- I would refer my colleague, Mr. was protected. That would be a strong appointed that the proposed rule does Speaker, to the Intelligence Commit- step forward. Real limitations about not allow an amendment that I offered tee’s Web site—it’s intel- actually tying the use of this informa- with Ms. SCHAKOWSKY, Ms. ESHOO, Mr. ligence.house.gov—where you can see tion to cybersecurity would be an im- HOLT, and Mr. THOMPSON of Mississippi. the long list of those private sector ac- portant step forward with the bill. My amendment would fix an issue spe- tors who are supporting this bill here What’s at danger is, yes, civil lib- cifically cited by the White House in today, that long list of folks in the pri- erties; but the danger is the confidence its Statement of Administration Policy vate sector responsible for the security in the Internet ecosystem that has in explaining why the President’s ad- of their firms, of the information that driven our economic growth over the visers would recommend a veto of Americans have entrusted to them, last decade. There will be great harm if CISPA without important change. It asking this body to move forward with that confidence is shaken, great harm would require the companies that share this bill today. There’s no question, Mr. Speaker, if people know that the information cyber threat information either with when you’re dealing with something of that they provide and sign up for can the government or with another pri- the magnitude of the national security immediately be turned over to a gov- vate company to make reasonable ef- threats posed by cyber warfare and the ernment agency—indeed, a secretive forts to remove personally identifiable privacy protections that everyone in government agency—with no recourse information. this body is committed to, that you’re and completely exempt from any liabil- As the administration stated in its going to end up with conscientious men ity for the company that’s done it. veto threat, the administration re- and women on both sides of this issue. It’s been noted that this program is mains concerned that the bill does not But it is important to note that the voluntary. It may be voluntary for the require private entities to take reason- private sector—which is being corporations. It’s not voluntary for the able steps to remove irrelevant per- bombarded each and every day with individual. It’s not voluntary for the sonal information when sending cyber- threats from nation-state actors over- citizens of the country who provide security data to the government or seas—is asking, pleading with this that information. other private sector entities. Citizens body to move forward with this bill. Mr. WOODALL. Mr. Speaker, I yield have a right to know that corporations I reserve the balance of my time. myself 1 minute to say I know my will be held accountable—and not Mr. HASTINGS of Florida. Mr. friend from Colorado’s concerns are granted immunity—for failing to safe- Speaker, may I inquire about how heartfelt, and he shared those last guard personal information adequately. much time remains on both sides? night in the Rules Committee. The The requirement of government- The SPEAKER pro tempore. The gen- gentleman has a great deal of experi- alone efforts to safeguard or minimize tleman from Florida has 9 minutes re- ence in this industry. And as heartfelt personal information is simply not maining. The gentleman from Georgia as his concerns are, I know, too, equal- enough. This is most apparent when, has 17 minutes remaining.

VerDate Mar 15 2010 03:14 Apr 18, 2013 Jkt 029060 PO 00000 Frm 00014 Fmt 7634 Sfmt 0634 E:\CR\FM\K17AP7.022 H17APPT1 jbell on DSK7SPTVN1PROD with HOUSE April 17, 2013 CONGRESSIONAL RECORD — HOUSE H2083 Mr. HASTINGS of Florida. With that, We have criminal procedures and have protected the information flowing into Mr. Speaker, in an effort to respond to processes around how information can the government. my colleague and friend from Georgia, and can’t be used. This is the biggest A second critical flaw with CISPA is that it fails to include meaningful limits on the I yield 1 additional minute at this time government takeover of personal infor- extent of private sensitive information that to the gentleman from California (Mr. mation that I’ve seen during my time companies can send into the government. SCHIFF). here in Congress. Again, I believe, on The HPSCI also voted down an amendment Mr. SCHIFF. I thank the gentleman the balance, it harms what it purports requiring that before sharing cyber threat for yielding the additional time. to protect. information with the government, companies must ‘‘make reasonable efforts’’ to remove And just to respond to my colleague, ‘‘JUST SAY NO’’ TO CYBERSECURITY BILL ‘‘any information that can be used to iden- I’d be interested to know if there is (By Former Rep. Bob Barr (R–Ga.), Apr. 16, anything you can point to in those 17 tify a specific person unrelated to the cyber 2013) threat.’’ A similar provision was included in amendments that governs or requires Anyone who has read or watched any news last year’s Senate cybersecurity bill, and the private sector, when it shares in- source over the past year knows President witnesses at a hearing before HPSCI earlier formation with other private sector en- Obama, numerous Administration officials, this year testified that companies can easily tities, to remove personally identifi- and many leaders in Congress agree that ad- strip out personally identifiably information able information. Because under the dressing the threat of cyber attacks is a crit- that is not necessary to address cyber bill, the only minimization that’s re- ical national priority. Based on this threat threats. Yet CISPA still lacks any such safe- analysis, the administration and many mem- guard. quired is being done by the govern- bers of Congress continue to push for passage It is true that from a privacy perspective, ment; and in the case of private-to-pri- of cybersecurity legislation that would clar- this version of CISPA is an improvement vate sector sharing, there is no govern- ify and expand the government’s powers to over last year’s bill. Most notably, the bill ment role. So this is the big hole. receive and process traffic from American no longer permits private information to be While there are many private sector computer networks. used for broad ‘national security uses’’ unre- companies that may support the bill It would, however, be a mistake for Con- lated to cybersecurity. But it clearly is not because it gives them broad immunity gress to rush to enact legislation that could sufficient. Congress must take the civil lib- without any responsibility, that militarize our computer networks, and pave erties threats created by this bill just as se- the way for private companies to share vast riously as it takes the cyber threats the leg- doesn’t mean it’s good policy, particu- quantities of sensitive and highly personal islation purports to address. CISPA does not larly when private companies have said information with the government, all in the meet this test, and members of the House they would make reasonable efforts. name of ‘‘cybersecurity.’’ Although a care- should just say no. They’re willing to do it; they can do it; fully-crafted ‘‘information sharing’’ program they have the capacity to do it; we’re that includes robust protections for civil lib- STATEMENT OF ADMINISTRATION POLICY just not asking them to do it or requir- erties could be an effective approach to cy- H.R. 624—VYBER INTELLIGENCE SHARING AND ing them to do it. And we’re giving bersecurity, the bill about to come up for a PROTECTION ACT something of great value to them, and vote in the House clearly fails this test. (Rep. Rogers, R–MI, and Rep. Ruppersberger, The Cyber Intelligence Sharing and Pro- D–MD), Apr. 16, 2013) that is we’re giving them broad immu- tection Act (CISPA), H.R. 624, is set to be nity. I think with that immunity ought Both government and private companies considered by the full House of Representa- need cyber threat information to allow them to come some responsibility; and it tives later this month. Although the bill to identify, prevent, and respond to mali- shouldn’t be too much to ask that that that emerged from markup by the House cious activity that can disrupt networks and responsibility take the form of a rea- Permanent Select Committee on Intelligence could potentially damage critical infrastruc- sonable effort, not a herculean one, not (HPSCI) includes some improvements in pri- ture. The Administration believes that care- an impossible one, but a reasonable ef- vacy safeguards over the earlier version, fully updating laws to facilitate cybersecu- fort to ensure that Americans’ privacy CISPA’s proponents have overstated the pro- rity information sharing is one of several tections incorporated into the bill. As a re- interests are observed and they take legislative changes essential to protect indi- sult, members of Congress should vote viduals’ privacy and improve the Nation’s out that information when they can. against CISPA when it comes to the House cybersecurity. While there is bipartisan con- Mr. WOODALL. Mr. Speaker, I re- floor. sensus on the need for such legislation, it serve the balance of my time. Last year, The Constitution Project’s bi- should adhere to the following priorities: (1) Mr. HASTINGS of Florida. Mr. partisan Liberty and Security Committee, carefully safeguard privacy and civil lib- Speaker, again, for purposes of clarity, on which I serve, prepared a detailed report erties; (2) preserve the long-standing, respec- I yield 1 additional minute to my col- on ways that Congress could protect our na- tive roles and missions of civilian and intel- tion’s computer networks from cyber league from Colorado (Mr. POLIS). ligence agencies; and (3) provide for appro- Mr. POLIS. Mr. Speaker, I have three threats, while at the same time preserving priate sharing with targeted liability protec- the constitutionally-guaranteed rights of tions. documents to submit to the RECORD: Americans. Unfortunately, the drafters of The Administration recognizes and appre- one from former Representative Bob CISPA failed to incorporate the robust safe- ciates that the House Permanent Select Barr, one Statement of Administration guards we recommended. Committee on Intelligence (HPSCI) adopted Policy, and a letter from several tech Most critical, CISPA’s sponsors have re- several amendments to H.R. 624 in an effort companies and others opposed to the sisted all efforts to ensure that the new cy- to incorporate the Administration’s impor- bill. bersecurity program would maintain civilian tant substantive concerns. However, the Ad- I quote, in part: control of our nation’s computer networks. ministration still seeks additional improve- CISPA would allow private companies, ments and if the bill, as currently crafted, Developments over the last year make cloaked with broad immunity from legal li- were presented to the President, his senior CISPA’s approach even more questionable ability, to share sensitive information such advisors would recommend that he veto the than before. as internet records or the content of emails, bill. The Administration seeks to build upon Former Representative Bob Barr: with any agency in the government, includ- the continuing dialogue with the HPSCI and Congress must take the civil liberties ing military and intelligence agencies. Sen- stands ready to work with members of Con- threats created by this bill just as seriously sitive personal information from private gress to incorporate our core priorities to as it takes the cyber threats the legislation computer networks should not be shared di- produce cybersecurity information sharing purports to address. rectly with the military or the National Se- legislation that addresses these critical Mr. Speaker, we should not hurt the curity Agency (NSA), the agency that gained issues. widespread public notoriety seven years ago H.R. 624 appropriately requires the Federal Internet to save the Internet; and this for its warrantless wiretapping program— Government to protect privacy when han- bill, in its current form, leaves the lan- hardly the agency we want to see tasked dling cybersecurity information. Impor- guage wide open with potential abuse. with receiving private internet traffic. tantly, the Committee removed the broad Again, when we talk about bodily Sadly, the members of HPSCI voted down national security exemption, which signifi- harm, I have learned that in a Cali- an amendment that would have ensured ci- cantly weakened the restrictions on how this fornia statute that includes dog bites. vilian control of computer networks, by information could be used by the govern- Essentially, anything is included in specifying that when private companies ment. The Administration, however, remains this information without limitation share information with the federal govern- concerned that the bill does not require pri- ment, they should not provide it to the NSA vate entities to take reasonable steps to re- with regard to how the government can or any other military agency or department. move irrelevant personal information when use it. This is a backdoor attack on the This amendment would still have permitted sending cybersecurity data to the govern- Fourth Amendment against unreason- the NSA to share its own expertise on cyber ment or other private sector entities. Citi- able search and seizures. threats with the private sector, but would zens have a right to know that corporations

VerDate Mar 15 2010 03:14 Apr 18, 2013 Jkt 029060 PO 00000 Frm 00015 Fmt 7634 Sfmt 0634 E:\CR\FM\K17AP7.024 H17APPT1 jbell on DSK7SPTVN1PROD with HOUSE H2084 CONGRESSIONAL RECORD — HOUSE April 17, 2013

will be held accountable—and not granted APRIL 15, 2013. Association of Criminal Defense Lawyers; immunity—for failing to safeguard personal DEAR REPRESENTATIVE: Earlier this year, New American Foundation’s Open Tech- information adequately. The Administration many of our organizations wrote to state our nology Institute; OpenMedia.org; is committed to working with all stake- opposition to H.R. 624, the Cyber Intelligence PolitiHacks; Reddit; RootsAction.org; Tech holders to find a workable solution to this Sharing and Protection Act of 2013 (CISPA). Freedom. challenge. Moreover, the Administration is We write today to express our continued op- Mr. WOODALL. Mr. Speaker, I yield confident that such measures can be crafted position to this bill following its markup by in a way that is not overly onerous or cost the House Permanent Select Committee on myself 60 seconds again to say to my prohibitive on the businesses sending the in- Intelligence (HPSCI). Although some amend- friend from Colorado that I know his formation. Further, the legislation should ments were adopted in markup to improve concerns are heartfelt; but he knows, also explicitly ensure that cyber crime vic- the bill’s privacy safeguards, these amend- as I do, there’s nothing that we can do tims continue to report such crimes directly ments were woefully inadequate to cure the in statute here today that would trump to Federal law enforcement agencies, and civil liberties threats posed by this bill. In any of our civil liberties that are pro- continue to receive the same protections particular, we remain gravely concerned tected under the Constitution of the that they do today. that despite the amendments, this bill will The Administration supports the long- allow companies that hold very sensitive and United States of America. The Con- standing tradition to treat the Internet and personal information to liberally share it stitution of the United States of Amer- cyberspace as civilian spheres, while recog- with the government, including with mili- ica trumps all. nizing that the Nation’s cybersecurity re- tary agencies. What we’re doing here today, Mr. quires shared responsibility from individual CISPA creates an exception to all privacy Speaker, is responding to a very seri- users, private sector network owners and op- laws to permit companies to share our infor- ous national security threat, and we’re erators, and the appropriate collaboration of mation with each other and with the govern- doing so in a way that can give Ameri- civilian, law enforcement, and national secu- ment in the name of cybersecurity. Although rity entities in government. H.R. 624 appro- a carefully-crafted information sharing pro- cans great comfort that their civil lib- priately seeks to make clear that existing gram that strictly limits the information to erties are every bit as protected today public-private relationships—whether vol- be shared and includes robust privacy safe- as they were yesterday. In fact, Mr. untary, contractual, or regulatory—should guards could be an effective approach to cy- Speaker, in that these nation-states be preserved and uninterrupted by this newly bersecurity, CISPA lacks such protections are hacking into these accounts and authorized information sharing. However, for individual rights. CISPA’s information accessing our personal information newly authorized information sharing for cy- sharing regime allows the transfer of vast every single day, I would tell you that bersecurity purposes from the private sector amounts of data, including sensitive infor- we will actually have our privacy more to the government should enter the govern- mation like internet records or the content ment through a civilian agency, the Depart- of emails, to any agency in the government protected in the presence of a secure ment of Homeland Security. including military and intelligence agencies Internet than we do today, as nation- Recognizing that the government will con- like the National Security Agency or the De- states are frequently eroding our cy- tinue to receive cybersecurity information partment of Defense Cyber Command. bersecurity border here in the United through a range of civilian, law enforcement, Developments over the last year make States of America. and national security agencies, legislation CISPA’s approach even more questionable With that, I reserve the balance of must promote appropriate sharing within than before First, the President recently my time. the government. As stated above, this shar- signed Executive Order 13636, which will in- Mr. HASTINGS of Florida. Mr. ing must be consistent with cybersecurity crease information sharing from the govern- use restrictions, the cybersecurity respon- ment to the private sector. Information Speaker, I would advise my friend from sibilities of the agencies involved, as well as sharing in this direction is often cited as a Georgia that I’m the last speaker. If he privacy and civil liberties protections and substantial justification for CISPA and will is prepared to close, I am prepared to transparent oversight. Such intra-govern- proceed without legislation. Second, the cy- close. mental sharing and use should not be subject bersecurity legislation the Senate considered Mr. WOODALL. I thank my friend. I to undue restrictions by the private sector last year, S. 3414, included privacy protec- have one speaker remaining. companies that originally share the informa- tions for information sharing that are en- Mr. HASTINGS of Florida. I reserve tion. To be successful in addressing the tirely absent from CISPA, and the Obama the balance of my time. range of cyber threats the Nation faces, it is administration, including the intelligence vital that intra-governmental sharing be ac- community, has confirmed that those pro- Mr. WOODALL. Mr. Speaker, at this complished in as near real-time as possible. tections would not inhibit cybersecurity pro- time it is my great pleasure to yield as The Administration agrees with the need grams. These included provisions to ensure much time as he may consume to the to clarify the application of existing laws to that private companies send cyber threat in- chairman of the Rules Committee, the remove legal barriers to the private sector formation only to civilian agencies, and a re- gentleman from Texas (Mr. SESSIONS). sharing appropriate, well-defined, cybersecu- quirement that companies make ‘‘reasonable Mr. SESSIONS. Mr. Speaker, I want rity information. Further, the Administra- efforts’’ to remove personal information that to thank the gentleman, my dear tion supports incentivizing industry to share is unrelated to the cyber threat when shar- friend from Georgia (Mr. WOODALL), appropriate cybersecurity information by ing data with the government. Finally, wit- providing the private sector with targeted li- nesses at a hearing before the House Perma- not only for managing his rule, but for ability protections. However, the Adminis- nent Select Committee on Intelligence con- the time that he has invested not into tration is concerned about the broad scope of firmed earlier this year that companies can just this issue, but the issues that liability limitations in H.R. 624. Specifically, strip out personally identifiably information come before the Rules Committee, and even if there is no clear intent to do harm, that is not necessary to address cyber I want to thank him for his service. the law should not immunize a failure to threats, and CISPA omits any requirement I also want to thank, if I can, the take reasonable measures, such as the shar- that reasonable efforts be undertaken to do gentleman from Florida (Mr. HAS- ing of information, to prevent harm when so. and if the entity knows that such inaction We continue to oppose CISPA and encour- TINGS)—welcome back to the com- will cause damage or otherwise injure or en- age you to vote ‘no.’ mittee after a couple of days of being danger other entities or individuals. Sincerely, out with surgery—and for the vigorous Information sharing is one piece of larger Access; Advocacy for Principled Action in hearing that we had yesterday at the set of legislative requirements to provide the Government; American Arab Anti-Discrimi- Rules Committee. private sector, the Federal Government, and nation Committee; American Association of Mr. Speaker, we had an opportunity law enforcement with the necessary tools to Law Libraries; American Civil Liberties to have Mr. RUPPERSBERGER, the leader combat the current and emerging cyber Union; American Library Association; Ami- for the Democrats from the Intel- threats facing the Nation. In addition to up- cus; Association of Research Libraries; Bill dating information sharing statutes, the of Rights Defense Committee; Breadpig.com; ligence Committee, as well as MIKE Congress should incorporate privacy and Center for Democracy & Technology; Center ROGERS from Michigan, the chairman civil liberties safeguards into all aspects of for National Security Studies; Center for of the committee. Both came and vig- cybersecurity and enact legislation that: (1) Rights; Competitive Enterprise Institute; orously talked about the things which strengthens the Nation’s critical infrastruc- The Constitution Project; Council on Amer- are aimed at our country—cyber ture’s cybersecurity by promoting the estab- ican-Islamic Relations; CREDO Action; threats, nation-states, nations such as lishment and adoption of standards for crit- Daily Kos; Defending Dissent Foundation; China, North Korea, and others who are ical infrastructure; (2) updates laws guiding Demand Progress. Federal agency network security; (3) gives DownsizeDC.org, Inc.; Electronic Frontier trying to invade our Internet here in law enforcement the tools to fight crime in Foundation; Fight for the Future; Free Press the United States and to steal not only the digital age; and (4) creates a National Action Fund; Government Accountability information and data, but also Data Breach Reporting requirement. Project; Liberty Coalition; Mozilla; National thoughts, ideas, and money. So it gave

VerDate Mar 15 2010 03:14 Apr 18, 2013 Jkt 029060 PO 00000 Frm 00016 Fmt 7634 Sfmt 0634 E:\CR\FM\A17AP7.004 H17APPT1 jbell on DSK7SPTVN1PROD with HOUSE April 17, 2013 CONGRESSIONAL RECORD — HOUSE H2085 us an opportunity yesterday to have a I thank the distinguished chairman time and time again in order to under- great hearing, one which was full of de- of the Rules Committee, my good stand the threats that this Nation is tail, one which really offered intrigue friend, Mr. SESSIONS, for his expla- facing, understand the challenges that by our Members and a lot of thought nation of the measure going forward. I this community of intelligence profes- process by all those who came before certainly do not anticipate that my sionals is grappling with around the the committee. side will oppose the measure as offered. globe, and I don’t want to be the one However, I would like to advise, if I In addition thereto, I would highlight who shares those stories here on the can, that following the closing state- what he did eloquently point out, and House floor by mistake. I don’t envy ments on the rule before us, the gen- that is the bipartisan effort that has the gentleman from Florida having to tleman from Georgia (Mr. WOODALL) been put into this, including all of the balance being in that committee every will be offering an amendment to the negotiations leading up to now what single day, trying to protect the secu- rule that seeks to address concerns will be the McCaul amendment offered rity of every single citizen, and not with the role of civilian Federal agen- by Mr. WOODALL. being able to come out of that com- cies in receiving the cyber information CISPA, Mr. Speaker, provides the mittee room and share with, not just that would be transmitted from the government and private sector with your colleagues here in the House, but private sector that is included in the the tools they need to secure our net- your constituents back home, why it is underlying bill. This amendment was works and prevent future cyber at- you’re doing the things that you do. in negotiation yesterday and submitted tacks, while respecting the privacy of Can you imagine, Mr. Speaker, what for consideration to the Rules Com- individuals. would have happened in World War II if mittee, but the final compromise was In bringing private companies and we had to keep the bombing of Pearl not ready at the time that the com- trade groups to the table, as well as Harbor a secret? It’s a secret. Nobody mittee finished its work product yes- taking into consideration the concerns knows. What do you think the support terday evening, so negotiations contin- expressed by civil liberties organiza- would have been, Mr. Speaker, for tak- ued all last night and through this tions, CISPA has been improved to bet- ing affirmative action in World War II? morning until today. ter address the growing cybersecurity It would have been hard to generate On a bipartisan basis, these negotia- risks faced by the Federal Government that support. I would have voted ‘‘no.’’ tions have given us what I consider to and private sector, provide greater There are things going on in this Na- be a good amendment with good merits oversight, and protect Americans’ pri- tion and in this world today, Mr. and should be considered under this vacy. We can take significant steps to Speaker, that our Intelligence Com- rule. The amendment has been vetted reduce our vulnerability to cyber mittee grapples with, that our intel- thoroughly by the five committees threats today. ligence professionals grapple with, which share jurisdiction in this matter, I have had the honor and privilege of things that are frightening, and things including Ranking Members THOMPSON meeting many of our intelligence pro- that threaten the liberty of this coun- and RUPPERSBERGER, and, by the way, fessionals when I served as a member of try and the economic security of this my colleague, the ranking member of the Intelligence Committee; and since country. Now, I don’t want to be a fear- the Rules Committee, Ms. SLAUGHTER. that time, I cannot overstate how monger, Mr. Speaker. What I love If the rule is amended, the language much I appreciate, and am humbled by, about this country is no matter what would be offered by Mr. MCCAUL, the their service. the challenge is, we are great enough chairman of the House Committee on Furthermore, I want to take this mo- collectively to rise to meet it. Homeland Security. I’m confident that ment of personal privilege to thank my In this case, we happen to need to this work product and the work which good friends, Chairman ROGERS and rise to meet it in a subject matter that we are bringing to this floor will con- Ranking Member RUPPERSBERGER, and is near and dear to the heart of every tinue to support not just the rule, but to underscore one of the unnoticed and American, which is my Internet pri- the legislation that would be before hardworking staffs’ efforts, and that vacy. I care a lot about Internet pri- this House tomorrow by the Rules would be the House Intelligence Com- vacy, Mr. Speaker. I’ve got a VPN sys- Committee. mittee staff, for their hard work and tem set up so nobody is listening in on So I believe that this helps not just dedication in helping to see this and my Wi-Fi. I change my password about the underlying bill, but really is a tes- other measures having to do with the every 10 days to make sure nobody is tament to the work on a bipartisan intelligence of this committee to the making any progress towards hacking basis among our committees, among a House floor, as well as in cooperation my system. I’ll occasionally go on the lot of people who had a chance to look with their colleagues and ours at the Internet and use one of those at not just jurisdictional issues, but United States Senate. anonymizers to make sure my IP ad- the actual substance of trying to make I urge my colleagues to vote ‘‘no’’ on dress isn’t being tracked when I’m protecting this country, its assets, and the rule and ‘‘yes’’ on the underlying looking at things that perhaps my its people a reality now in law that the bill, and I yield back the balance of my friends in Congress, I’m trying to get a United States House of Representatives time. bill done, I don’t want you to know I’m will fully debate tomorrow, vote on, Mr. WOODALL. Mr. Speaker, I yield getting that bill done. Who knows what and support. myself the balance of my time. those people down in HIR, House Infor- Part of the role of the Rules Com- I thank my friend from Florida for mation Resources, what they’re track- mittee about this process has been to his service on the Rules Committee and ing that we do here? We have tools make sure that the final product that his service on the Intelligence Com- available to us in that way, Mr. Speak- came to the floor of the House of Rep- mittee. er. resentatives was well vetted, received The work that goes on in the Intel- But do you know who I can’t out- the attention that was necessary, and, ligence Committee, Mr. Speaker, is smart? Perhaps I can outsmart my perhaps more importantly, was lead- work that so many Members of Con- next-door neighbor who wants to pig- ing-edge. gress do not involve themselves in. It gyback on my Wi-Fi system. Perhaps I goes on deep in the bowels of the Cap- can outsmart the guy at the hotel who b 1330 itol Complex. It’s under great security, is trying to piggyback on my informa- And, lastly, the most important all electronic devices left outside the tion there in the hotel room. Perhaps I thing is that we know what we’ve door, so that they can discuss things can even outsmart the U.S. House of agreed to; that we know what we’ve within the four walls of that com- Representatives. But what I can’t out- agreed to where we’re very clear about mittee that we’re not allowed to dis- smart is that team of cyber warriors what the law is and the expectations of cuss here on the House floor. gathered by nation-states around the that performance. In fact, when they asked me to han- globe who are hacking my information I thank the gentleman for yielding. dle the rule today, Mr. Speaker, I was and your information every single day, Mr. HASTINGS of Florida. Mr. a little concerned because throughout stealing our intellectual property, Speaker, I yield myself such time as I this process of developing CISPA, I stealing our military technology, may consume. traveled down to that committee room threatening the privacies that we’ve

VerDate Mar 15 2010 03:14 Apr 18, 2013 Jkt 029060 PO 00000 Frm 00017 Fmt 7634 Sfmt 0634 E:\CR\FM\K17AP7.025 H17APPT1 jbell on DSK7SPTVN1PROD with HOUSE H2086 CONGRESSIONAL RECORD — HOUSE April 17, 2013 talked so much about here on the floor shall designate an entity within the Depart- ment receiving cyber threat information today. ment of Justice as the civilian Federal enti- shared with the Federal Government under I’m very glad, Mr. Speaker, that as ty to receive cyber threat information re- such section 1104(b) shall— you page through this bill, you will lated to cybersecurity crimes that is shared ‘‘(i) implement the policies and procedures by a cybersecurity provider or self-protected find line after line after line aimed at established under subparagraph (A); and entity in accordance with section 1104(b) of ‘‘(ii) promptly notify the Secretary of protecting your and my privacy. I the National Security Act of 1947, as added Homeland Security, the Attorney General, think we do a good job of finding that by section 3(a) of this Act, subject to the the Director of National Intelligence, the balance. We even will offer amend- procedures under paragraph (4). Secretary of Defense, and the appropriate ments today on the floor to do even ‘‘(3) SHARING BY COORDINATING ENTITIES.— congressional committees of any significant better. But without security at the The entities designated under paragraphs (1) violations of such policies and procedures. Internet border, I have no protection of and (2) shall share cyber threat information ‘‘(D) OVERSIGHT.—The Secretary of Home- shared with such entities in accordance with my privacy because those agents of the land Security, the Attorney General, the Di- section 1104(b) of the National Security Act rector of National Intelligence, and the Sec- state of China, North Korea, and be- of 1947, as added by section 3(a) of this Act, yond are accessing that information retary of Defense shall jointly establish a consistent with the procedures established program to monitor and oversee compliance today. under paragraphs (4) and (5). with the policies and procedures established Mr. Speaker, it’s been 18 months that ‘‘(4) PROCEDURES.—Each department or under subparagraph (A). agency of the Federal Government receiving we’ve been working to craft that bal- ‘‘(6) INFORMATION SHARING RELATIONSHIPS.— cyber threat information shared in accord- ance of privacy and security. We’ll con- Nothing in this section shall be construed ance with section 1104(b) of the National Se- tinue to work on that throughout 12 to— curity Act of 1947, as added by section 3(a) of ‘‘(A) alter existing agreements or prohibit amendments here today. I urge my col- this Act, shall establish procedures to— new agreements with respect to the sharing leagues, look through this resolution, ‘‘(A) ensure that cyber threat information look through H.R. 624 to see the efforts shared with departments or agencies of the of cyber threat information between the De- that have gone into crafting this bipar- Federal Government in accordance with such partment of Defense and an entity that is tisan piece of legislation; and look at section 1104(b) is also shared with appro- part of the defense industrial base; priate departments and agencies of the Fed- ‘‘(B) alter existing information-sharing re- those 12 amendments, look at those 12 lationships between a cybersecurity pro- amendments that we’ll have an oppor- eral Government with a national security mission in real time; vider, protected entity, or self-protected en- tunity to vote on over the next 2 days ‘‘(B) ensure the distribution to other de- tity and the Federal Government; to make this bill even better. But the partments and agencies of the Federal Gov- ‘‘(C) prohibit the sharing of cyber threat time for delay, Mr. Speaker, has passed ernment of cyber threat information in real information directly with a department or us, and the cost of delay is most cer- time; and agency of the Federal Government for crimi- tainly measured in dollars, and I fear it ‘‘(C) facilitate information sharing, inter- nal investigative purposes related to crimes is measured in lives. action, and collaboration among and be- described in section 1104(c)(1) of the National Let’s move forward with this bill tween the Federal Government; State, local, Security Act of 1947, as added by section 3(a) of this Act; or today, Mr. Speaker. I urge strong sup- tribal, and territorial governments; and cy- bersecurity providers and self-protected enti- ‘‘(D) alter existing agreements or prohibit port for the rule, and I urge strong sup- ties. new agreements with respect to the sharing port after the debate of these 12 amend- ‘‘(5) PRIVACY AND CIVIL LIBERTIES.— of cyber threat information between the De- ments on the underlying legislation. ‘‘(A) POLICIES AND PROCEDURES.—The Sec- partment of Treasury and an entity that is AMENDMENT OFFERED BY MR. WOODALL retary of Homeland Security, the Attorney part of the financial services sector. Mr. WOODALL. Mr. Speaker, at this General, the Director of National Intel- ‘‘(7) TECHNICAL ASSISTANCE.— time, I offer an amendment to the reso- ligence, and the Secretary of Defense shall ‘‘(A) DISCUSSIONS AND ASSISTANCE.—Noth- jointly establish and periodically review ing in this section shall be construed to pro- lution. policies and procedures governing the re- The SPEAKER pro tempore. The hibit any department or agency of the Fed- ceipt, retention, use, and disclosure of non- eral Government from engaging in formal or Clerk will report the amendment. publicly available cyber threat information informal technical discussion regarding The Clerk read as follows: shared with the Federal Government in ac- cyber threat information with a cybersecu- At the end of the resolution, add the fol- cordance with section 1104(b) of the National rity provider or self-protected entity or from lowing: Security Act of 1947, as added by section 3(a) providing technical assistance to address SEC. 2. Notwithstanding any other provi- of this Act. Such policies and procedures vulnerabilities or mitigate threats at the re- sion of this resolution, the amendment speci- shall, consistent with the need to protect quest of such a provider or such an entity. fied in section 3 shall be in order as though systems and networks from cyber threats ‘‘(B) COORDINATION.—Any department or printed as the last amendment in House Re- and mitigate cyber threats in a timely man- agency of the Federal Government engaging port 113–41 if offered by Representative ner— in an activity referred to in subparagraph McCaul of Texas or his designee. That ‘‘(i) minimize the impact on privacy and (A) shall coordinate such activity with the amendment shall be debatable for 10 minutes civil liberties; entity of the Department of Homeland Secu- ‘‘(ii) reasonably limit the receipt, reten- equally divided and controlled by the pro- rity designated under paragraph (1) and tion, use, and disclosure of cyber threat in- ponent and an opponent. share all significant information resulting formation associated with specific persons SEC. 3. The amendment referred to in sec- from such activity with such entity and all tion 2 is as follows: After section 1, insert that is not necessary to protect systems or other appropriate departments and agencies the following new section (and renumber networks from cyber threats or mitigate of the Federal Government. subsequent sections accordingly): cyber threats in a timely manner; ‘‘(C) SHARING BY DESIGNATED ENTITY.—Con- ‘‘(iii) include requirements to safeguard ‘‘SEC. 2. FEDERAL GOVERNMENT COORDINATION sistent with the policies and procedures es- WITH RESPECT TO CYBERSECURITY. non-publicly available cyber threat informa- tablished under paragraph (5), the entity of ‘‘(a) COORDINATED ACTIVITIES.—The Federal tion that may be used to identify specific the Department of Homeland Security des- Government shall conduct cybersecurity ac- persons from unauthorized access or acquisi- ignated under paragraph (1) shall share with tivities to provide shared situational aware- tion; all appropriate departments and agencies of ness that enables integrated operational ac- ‘‘(iv) protect the confidentiality of cyber the Federal Government all significant in- tions to protect, prevent, mitigate, respond threat information associated with specific formation resulting from— to, and recover from cyber incidents. persons to the greatest extent practicable; ‘‘(i) formal or informal technical discus- ‘‘(b) COORDINATED INFORMATION SHARING.— and sions between such entity of the Department ‘‘(1) DESIGNATION OF COORDINATING ENTITY ‘‘(v) not delay or impede the flow of cyber of Homeland Security and a cybersecurity FOR CYBER THREAT INFORMATION.—The Presi- threat information necessary to defend dent shall designate an entity within the De- against or mitigate a cyber threat. provider or self-protected entity about cyber threat information; or partment of Homeland Security as the civil- ‘‘(B) SUBMISSION TO CONGRESS.—The Sec- ian Federal entity to receive cyber threat in- retary of Homeland Security, the Attorney ‘‘(ii) any technical assistance such entity formation that is shared by a cybersecurity General, the Director of National Intel- of the Department of Homeland Security provider or self-protected entity in accord- ligence, and the Secretary of Defense shall, provides to such cybersecurity provider or ance with section 1104(b) of the National Se- consistent with the need to protect sources such self-protected entity to address curity Act of 1947, as added by section 3(a) of and methods, jointly submit to Congress the vulnerabilities or mitigate threats. this Act, except as provided in paragraph (2) policies and procedures required under sub- ‘‘(c) REPORTS ON INFORMATION SHARING.— and subject to the procedures established paragraph (A) and any updates to such poli- ‘‘(1) INSPECTOR GENERAL OF THE DEPART- under paragraph (4). cies and procedures. MENT OF HOMELAND SECURITY REPORT.—The ‘‘(2) DESIGNATION OF A COORDINATING ENTITY ‘‘(C) IMPLEMENTATION.—The head of each Inspector General of the Department of FOR CYBERSECURITY CRIMES.—The President department or agency of the Federal Govern- Homeland Security, in consultation with the

VerDate Mar 15 2010 03:14 Apr 18, 2013 Jkt 029060 PO 00000 Frm 00018 Fmt 7634 Sfmt 0634 E:\CR\FM\K17AP7.026 H17APPT1 jbell on DSK7SPTVN1PROD with HOUSE April 17, 2013 CONGRESSIONAL RECORD — HOUSE H2087 Inspector General of the Department of Jus- given the term in section 3(4) of the National Mullin Roe (TN) Stivers tice, the Inspector General of the Intel- Security Act of 1947 (50 U.S.C. 401a(4)). Mulvaney Rogers (AL) Stutzman ligence Community, the Inspector General of ‘‘(4) SHARED SITUATIONAL AWARENESS.—The Murphy (PA) Rogers (KY) Terry the Department of Defense, and the Privacy term ‘shared situational awareness’ means Neugebauer Rogers (MI) Thompson (PA) and Civil Liberties Oversight Board, shall an environment where cyber threat informa- Noem Rokita Thornberry Nugent Rooney Tiberi annually submit to the appropriate congres- tion is shared in real time between all des- Nunes Ros-Lehtinen Tipton sional committees a report containing a re- ignated Federal cyber operations centers to Nunnelee Roskam Turner view of the use of information shared with provide actionable information about all Olson Ross Upton the Federal Government under subsection (b) known cyber threats.’’. Owens Rothfus Valadao of section 1104 of the National Security Act Page 5, strike line 6 and all that follows Palazzo Royce Wagner of 1947, as added by section 3(a) of this Act, through page 6, line 7. Paulsen Runyan Walberg including— Page 7, beginning on line 17, strike ‘‘by the Pearce Ruppersberger Walden ‘‘(A) a review of the use by the Federal department or agency of the Federal Govern- Perry Ryan (WI) Walorski Government of such information for a pur- ment receiving such cyber threat informa- Petri Salmon Weber (TX) pose other than a cybersecurity purpose; tion’’. Pittenger Scalise Webster (FL) ‘‘(B) a review of the type of information Page 13, strike line 13 and all that follows Pitts Schneider Wenstrup shared with the Federal Government under through page 15, line 23. Poe (TX) Schock Whitfield such subsection; Pompeo Schweikert Williams Page 17, strike line 15 and all that follows Posey Scott, Austin Wilson (SC) ‘‘(C) a review of the actions taken by the through page 19, line 19. Federal Government based on such informa- Price (GA) Sensenbrenner Wittman tion; Mr. WOODALL. Mr. Speaker, I yield Radel Sessions Wolf Reed Shuster Womack ‘‘(D) appropriate metrics to determine the back the balance of my time, and I Reichert Simpson Woodall impact of the sharing of such information move the previous question on the Renacci Smith (NE) Yoder with the Federal Government on privacy and amendment and on the resolution. Ribble Smith (NJ) Yoho civil liberties, if any; The previous question was ordered. Rice (SC) Smith (TX) Young (AK) ‘‘(E) a list of the departments or agencies The SPEAKER pro tempore. The Rigell Southerland Young (FL) receiving such information; Roby Stewart Young (IN) ‘‘(F) a review of the sharing of such infor- question is on the amendment. mation within the Federal Government to The amendment was agreed to. NAYS—192 identify inappropriate stovepiping of shared The SPEAKER pro tempore. The Andrews Green, Al O’Rourke information; and question is on the resolution, as Barrow (GA) Green, Gene Pallone ‘‘(G) any recommendations of the Inspector amended. Bass Grijalva Pascrell General of the Department of Homeland Se- The question was taken; and the Beatty Hahn Pastor (AZ) curity for improvements or modifications to Becerra Hanabusa Payne the authorities under such section. Speaker pro tempore announced that Bera (CA) Hastings (FL) Pelosi ‘‘(2) PRIVACY AND CIVIL LIBERTIES OFFICERS the ayes appeared to have it. Bishop (GA) Heck (WA) Perlmutter Bishop (NY) Higgins REPORT.—The Officer for Civil Rights and Mr. HASTINGS of Florida. Mr. Peters (CA) Civil Liberties of the Department of Home- Speaker, on that I demand the yeas Blumenauer Himes Peters (MI) Bonamici Hinojosa land Security, in consultation with the Pri- Peterson and nays. Brady (PA) Holt Pingree (ME) vacy and Civil Liberties Oversight Board, the The yeas and nays were ordered. Braley (IA) Honda Pocan Inspector General of the Intelligence Com- The vote was taken by electronic de- Brown (FL) Horsford Polis munity, and the senior privacy and civil lib- vice, and there were—yeas 227, nays Brownley (CA) Hoyer Price (NC) erties officer of each department or agency Bustos Huffman Quigley of the Federal Government that receives 192, not voting 13, as follows: Butterfield Israel Rahall cyber threat information shared with the [Roll No. 109] Capps Jackson Lee Richmond Federal Government under such subsection Capuano Jeffries Rohrabacher YEAS—227 ´ (b), shall annually and jointly submit to Cardenas Johnson (GA) Roybal-Allard Carney Johnson, E. B. Congress a report assessing the privacy and Aderholt Davis, Rodney Hudson Ruiz Alexander Denham Huelskamp Carson (IN) Jones civil liberties impact of the activities con- Rush Amash Dent Huizenga (MI) Cartwright Kaptur Ryan (OH) ducted by the Federal Government under Amodei DeSantis Hultgren Castor (FL) Keating Sa´ nchez, Linda such section 1104. Such report shall include Bachus DesJarlais Hunter Castro (TX) Kelly (IL) T. any recommendations the Civil Liberties Barber Diaz-Balart Issa Chu Kildee Sanchez, Loretta Protection Officer and Chief Privacy and Barletta Duffy Jenkins Cicilline Kilmer Sarbanes Civil Liberties Officer consider appropriate Barr Duncan (SC) Johnson (OH) Clarke Kind Schakowsky to minimize or mitigate the privacy and Barton Duncan (TN) Johnson, Sam Clay Kirkpatrick Schiff Cleaver Kuster civil liberties impact of the sharing of cyber Benishek Ellmers Jordan Schrader Bentivolio Farenthold Joyce Clyburn Langevin threat information under such section 1104. Schwartz Bilirakis Fincher Kelly (PA) Cohen Larsen (WA) Scott (VA) ‘‘(3) FORM.—Each report required under Bishop (UT) Fitzpatrick King (IA) Connolly Larson (CT) Scott, David paragraph (1) or (2) shall be submitted in un- Conyers Lee (CA) Black Fleischmann King (NY) Serrano Bonner Fleming Kingston Cooper Levin classified form, but may include a classified Sewell (AL) Boustany Flores Kinzinger (IL) Courtney Lewis annex. Shea-Porter Brady (TX) Forbes Kline Crowley Lipinski ‘‘(d) DEFINITIONS.—In this section: Sherman Bridenstine Fortenberry Labrador Cuellar Loebsack ‘‘(1) APPROPRIATE CONGRESSIONAL COMMIT- Sinema Brooks (AL) Foxx LaMalfa Cummings Lofgren TEES Sires .—The term ‘appropriate congressional Brooks (IN) Franks (AZ) Lamborn Davis (CA) Lowenthal committees’ means— Broun (GA) Frelinghuysen Lance Davis, Danny Lowey Slaughter ‘‘(A) the Committee on Homeland Secu- Buchanan Gardner Lankford DeFazio Lujan Grisham Smith (WA) rity, the Committee on the Judiciary, the Bucshon Garrett Latham DeGette (NM) Speier Permanent Select Committee on Intel- Burgess Gerlach Latta Delaney Luja´ n, Ben Ray Stockman Calvert Gibbs LoBiondo DeLauro (NM) Swalwell (CA) ligence, and the Committee on Armed Serv- Takano ices of the House of Representatives; and Camp Gibson Long DelBene Maffei Campbell Gingrey (GA) Lucas Deutch Maloney, Thompson (CA) ‘‘(B) the Committee on Homeland Security Cantor Goodlatte Luetkemeyer Dingell Carolyn Thompson (MS) and Governmental Affairs, the Committee on Capito Gosar Lummis Doggett Maloney, Sean Tierney the Judiciary, the Select Committee on In- Carter Gowdy Marchant Doyle Matsui Titus telligence, and the Committee on Armed Cassidy Granger Marino Duckworth McCarthy (NY) Tonko Services of the Senate. Chabot Graves (GA) Massie Edwards McClintock Tsongas Van Hollen ‘‘(2) CYBER THREAT INFORMATION, CYBER Chaffetz Graves (MO) Matheson Ellison McCollum Coble Griffin (AR) McCarthy (CA) Engel McDermott Vargas THREAT INTELLIGENCE, CYBERSECURITY Coffman Griffith (VA) McCaul Enyart McGovern Veasey CRIMES, CYBERSECURITY PROVIDER, CYBERSE- Cole Grimm McHenry Eshoo McNerney Vela CURITY PURPOSE, AND SELF-PROTECTED ENTI- Collins (GA) Guthrie McIntyre Esty Meeks Vela´ zquez TY.—The terms ‘cyber threat information’, Collins (NY) Gutierrez McKeon Farr Meng Visclosky ‘cyber threat intelligence’, ‘cybersecurity Conaway Hall McKinley Fattah Michaud Walz crimes’, ‘cybersecurity provider’, ‘cybersecu- Cook Hanna McMorris Foster Miller, George Wasserman rity purpose’, and ‘self-protected entity’ Costa Harper Rodgers Frankel (FL) Moore Schultz have the meaning given those terms in sec- Cotton Harris Meadows Fudge Moran Waters Cramer Hartzler Meehan Gabbard Murphy (FL) Watt tion 1104 of the National Security Act of 1947, Crawford Hastings (WA) Messer Gallego Nadler Waxman as added by section 3(a) of this Act. Crenshaw Heck (NV) Mica Garamendi Napolitano Welch ‘‘(3) INTELLIGENCE COMMUNITY.—The term Culberson Hensarling Miller (FL) Garcia Negrete McLeod Wilson (FL) ‘intelligence community’ has the meaning Daines Herrera Beutler Miller (MI) Grayson Nolan Yarmuth

VerDate Mar 15 2010 03:14 Apr 18, 2013 Jkt 029060 PO 00000 Frm 00019 Fmt 7634 Sfmt 0634 E:\CR\FM\A17AP7.022 H17APPT1 jbell on DSK7SPTVN1PROD with HOUSE H2088 CONGRESSIONAL RECORD — HOUSE April 17, 2013 NOT VOTING—13 The gentleman from Michigan (Mr. We believe this: this bill will not Bachmann Kennedy Rangel ROGERS) and the gentleman from Mary- work if Americans don’t have con- Blackburn Lynch Shimkus land (Mr. RUPPERSBERGER) each will fidence that it will protect your pri- Gohmert Markey Westmoreland vacy and civil liberties while allowing Holding Miller, Gary control 30 minutes. Hurt Neal The Chair recognizes the gentleman one very simple thing to happen: cyber from Michigan. threat material, that malware that b 1418 Mr. ROGERS of Michigan. I yield goes on your computer and does bad Mr. RAHALL, Ms. PELOSI, Ms. myself such time as I may consume. things, allows somebody else to take BROWNLEY of California, Mr. I want to thank my ranking member over your computer to attack a bank, CA´ RDENAS and Ms. WILSON of Flor- and both the Republican and Demo- allows them to go on your computer ida changed their vote from ‘‘yea’’ to cratic staffs and the Republican and and steal your personally identifiable ‘‘nay.’’ Democratic members of the Intel- information and use it in a crime, al- Messrs. KING of New York, YOHO ligence Committee for 2 years of long lows them to go into your network at and AMASH changed their vote from hours in negotiated efforts to reach the work and steal your most valuable ‘‘nay’’ to ‘‘yea.’’ point that we are. company secrets that keep you alive So the resolution was agreed to. I want to back up just a little bit and and build great products here in the The result of the vote was announced tell you how we got to where we are United States—could we allow the gov- as above recorded. today. We sat down some 2 years ago ernment to share what they know with A motion to reconsider was laid on when the ranking member and I as- the private sector and allow the pri- the table. sumed the leadership of the Intel- vate sector to share when it comes to f ligence Committee and we looked at just that cyber threat, those zeros and the one threat that we knew existed ones in a pattern that equates to mali- APPOINTMENT OF MEMBERS TO but we were not prepared to handle as cious code traveling at hundreds of THE BOARD OF VISITORS TO Americans, both the private sector and millions of times a second the speed of THE UNITED STATES COAST the government. And we knew that we light, can we share that in a way to GUARD ACADEMY had to do something about this new stop them from getting in and stealing The SPEAKER pro tempore (Mr. and growing and misunderstood cyber your private information? RODNEY DAVIS of Illinois). The Chair threat and what it was doing to our in- And the good news is the answer is, announces the Speaker’s appointment, tellectual property across the country, yes, we can do this. We can protect pri- pursuant to 14 U.S.C. 194, and the order what it was doing to the freedom and vacy and civil liberties, and we can of the House of January 3, 2013, of the open Internet that we so enjoy and are allow this sharing arrangement, but following Members on the part of the increasingly dependent on and the not of your identity, not of your per- House to the Board of Visitors to the commercial value of our growing econ- sonally identifiable information. As a United States Coast Guard Academy: omy. And it was at risk. The private matter of fact, if that’s what’s hap- Mr. COBLE, North Carolina sector was at risk because people were pening, it won’t work. But at the speed Mr. COURTNEY, Connecticut stealing their identities, their ac- of light, from machine to machine, f counts, their intellectual property, and from your Internet service provider be- fore it ever gets into your network b 1420 subsequent to that, their jobs, and peo- ple began to question the value of get- they bounce out the nastiest stuff CYBER INTELLIGENCE SHARING ting on the Internet and using it for that’s in there that’s going to take over your computer, steal your money, AND PROTECTION ACT commercial purposes. Their trust in steal your personally identifiable infor- GENERAL LEAVE the free and open Internet the way mation, steal your company secrets. we’ve embraced it in the United States Mr. ROGERS of Michigan. Mr. And they can identify that by a pattern really was at risk. Speaker, I ask unanimous consent that and kick it out. They’ll say, Something How do we solve that problem? We all Members may have 5 legislative looks bad about that. Can the govern- knew that nation states were investing days to revise and extend their re- ment take a look at that and say, you millions and billions of dollars to gen- marks and include extraneous material know what? This is a Chinese attack, erate cyber warriors to go in and crack on the bill H.R. 624. it’s an Iranian attack, it’s a North Ko- your computer network. I don’t care if The SPEAKER pro tempore. Is there rean attack—let’s defend our networks. objection to the request of the gen- you had intellectual property—those It’s really very simple. tleman from Michigan? blueprints that made your business Today, what you see is a collabo- There was no objection. successful, or maybe it was your bank rative effort. This isn’t a bill by DUTCH The SPEAKER pro tempore. Pursu- account, or your ability to have a RUPPERSBERGER and MIKE ROGERS and ant to House Resolution 164 and rule transaction. If they could interrupt this is the only way it has to be. We XVIII, the Chair declares the House in that, they could do great harm to our have taken suggestions from all the the Committee of the Whole House on economy and to the United States. groups I just talked about, from pri- the state of the Union for the consider- We saw nation-states like and vacy to the executive branch to indus- ation of the bill, H.R. 624. China and now and North Korea try to other trade associations. And The Chair appoints the gentlewoman and others developing military-style this is the bill that mutually all of from Florida (Ms. ROS-LEHTINEN) to attacks to actually do harm to the U.S. those people, representing tens of mil- preside over the Committee of the economy, to hurt the very men and lions of employees around this country, Whole. women who get up every day and play said this is the way you do this and by the rules and think that the Inter- b 1422 protect the free and open Internet and net would be a safe place for them to you protect civil liberties. And you fi- IN THE COMMITTEE OF THE WHOLE interact when it comes to commerce. nally raise that big red sign that tells Accordingly, the House resolved We want that to continue. people like China and Iran and Russia, itself into the Committee of the Whole So we sat down and we talked to in- stop. We’re going to prevent you from House on the state of the Union for the dustry folks, people who are in the stealing America’s prosperity. consideration of the bill (H.R. 624) to business, high-tech industry folks from I heard a lot of debate earlier on the provide for the sharing of certain cyber Silicon Valley, financial services folks rule. I’ve heard a lot of misinforma- threat intelligence and cyber threat in- from , manufacturers tion. There are people who don’t like it formation between the intelligence from across the Midwest, who were los- for whatever reason, maybe it’s convic- community and cybersecurity entities, ing intellectual property due to theft tion, maybe it’s politics, maybe it’s po- and for other purposes, with Ms. ROS- from nation-states like China. We litical theater. And I have a feeling LEHTINEN in the chair. talked to privacy groups. We talked to there’s a little bit of all of that when The Clerk read the title of the bill. the executive branch. And over the last they talk about this bill. The CHAIR. Pursuant to the rule, the 2 years, there were some 19 adjust- This bill does none of the things I’ve bill is considered read the first time. ments to this bill on privacy. heard talked about in the rule—that

VerDate Mar 15 2010 04:29 Apr 18, 2013 Jkt 029060 PO 00000 Frm 00020 Fmt 7634 Sfmt 0634 E:\CR\FM\A17AP7.006 H17APPT1 jbell on DSK7SPTVN1PROD with HOUSE April 17, 2013 CONGRESSIONAL RECORD — HOUSE H2089 it’s an exchange of information that protect the government networks. The I’m very proud of the open and trans- they’ve never seen with the govern- problem is, because of laws and policies parent process that produced this bill. ment. This is not a surveillance bill. It and procedures, we can’t share that We’ve had a great conversation over does not allow the national security with the private sector so they can pro- the last 2 years with a broad range of agencies or the Department of Defense tect their own networks. Wouldn’t it be private sector companies, trade groups, or any of our military organizations to great if they know what’s coming? If privacy and civil liberties advocates, monitor our domestic networks. It does you know what you’re looking for, you and the executive branch. I appreciate not allow that to happen. We would not can stop it. That’s really what we’re all the constructive input we have re- allow that to happen. talking about doing here, Madam ceived from the process. This bill has Chair. b 1430 been revised every step of the way in We must also modernize the law to this process, and all of that has been So some notion that that’s happening give the private sector clear authority based on discussions with all the is just wrong, and some of the folks to share cyber threat information groups I just mentioned. who are pretending otherwise know it’s within the private sector, as well as I just want to cover some of the pri- wrong. This is important. the government, on a voluntary, anon- vacy protections we’ve added along the You know, the Iranians, by public re- ymous basis. way. port, are laughing at our shores, look- Again, if you believe in the free and The bill prohibits the government ing for weaknesses in our financial in- open Internet and you look at all the from requiring private sector entities stitutions. They’re not doing it for be- bills that have been introduced, there to provide information to the govern- is a chomping at the bit in this town to nevolence. They’re doing it to try to ment. There is nothing in here that has go out and try to put their mitts on the create chaos in our markets here at any requirement that the private sec- Internet. They want to get in there and home. This isn’t 10 years or 20 years. tor must share cyber threat informa- start regulating and standards and set- This is today. It’s happening today. tion. If they don’t think it’s in their ting up procedures. They want to get in The average credit card in your best interest to stop that cyber crime, from business-to-business communica- purse, Madam Chair, will be hit 300,000 they don’t have to say a word. If they tion. They want the government to be times today by bad actors trying to get do, they’re allowed to share just that at every corner of the Internet. I reject in and steal your personal informa- cyber threat information with the that wholly. It’s the wrong approach. It tion—all those cardholders’ informa- right agencies in real time. Again, this tion—and use it to commit a crime. will not work. It will bring the Inter- net to a halt. This is the only bill that is machine to machine so that they can Today, hundreds of millions of times deal with the international nature of across this great country companies doesn’t have new mandates, new au- thorizations for any government in- that threat. will be besieged by DDoS attacks try- It encourages the private sector to volvement in the Internet. ing to overwhelm their systems and anonymize or minimize the informa- shut them down and not allow com- It does something very simple. I’m going to repeat it a lot today, Madam tion it voluntarily shares with others, merce to happen, by people who are including the government. trying to get into their networks and Chair. It allows the government to share zeros and ones in the right pat- In addition, the bill requires an an- steal something valuable. nual independent inspector general This bill is that right balance be- tern with the private sector. And zeros and ones from the private sector, when audit and report to Congress of all vol- tween our privacy, civil liberties, and they know it’s malicious and attacking untary information sharing with the stopping bad guys in their tracks from their networks, they share it with the government. That’s another layer of ruining what is one-sixth of the U.S. government and say, This is a problem. oversight. We have built multiple lay- economy. It’s that important, and it’s Can you help me? That’s what this bill ers of oversight into this bill so that important that we get at it today. does. And we’ve got a long list of pri- we can gain the confidence of the pub- We must do more to improve our cy- vacy protections and restrictions to lic in its purpose, intent, and success. bersecurity, and this bill is that vital make sure that that’s all that this bill The bill significantly limits the Fed- first step toward that bill. Our intel- does. The bill achieves all of these im- eral Government’s use of information ligence agencies collect important in- portant goals that I just walked voluntarily provided by the private formation overseas about advanced for- through, and it will empower the pri- sector, including a restriction on the eign cyber threats that could dramati- vate sector, which already does signifi- government’s ability to search that cally assist the private sector. That in- cant work to protect computer net- data—very important. formation is the intelligence commu- works, to do even more. The bill also enforces the restrictions nity’s unique value-added when it The bill will allow the government to on the government by levying penalties comes to our cybersecurity. share cyber threat intelligence more against the government through Fed- Unfortunately, we are not getting widely with American companies in eral court lawsuits for any violations the full value of those intelligence in- operationally usable form so they can of those restrictions. Again, another sights. As I said, the intelligence com- help prevent state-sponsored cyber layer of oversight. munity is not monitoring the Internet. spies from stealing American trade se- In the markup, we’ve made some They don’t know what’s happening on crets. It also provides clear, positive progress, as well, between the ranking the domestic Internet. So when there is authority to allow companies to share member and the members on the com- a nasty piece of source code or mali- cyber threat information with others mittee negotiating and working out cious source code attacking the private in the private sector. It also provides what changes we can make to, again, sector, the only way we’re going to authority to allow those companies to improve the confidence that people know that is if we—and these folks are share threat information on a purely have in this bill. We have improved victims of crime, by the way—if we voluntary and anonymized basis with this bill every step of the way for the allow them, in a classified environ- the government, meaning no personal last 2 years, and the markup was no ment, to share malicious source identifying information. different. At our markup, which voted codes—zeros and ones in the right pat- This bill will not require additional the bill out of committee on a strong tern—with the government and say, Federal spending. It will not require 18–2 vote, we adopted five important Hey, I am the victim of a crime. Here’s the creation of a vast new government amendments to further strengthen the what it looks like. Can you help? The bureaucracy. It will not impose any bill’s protections and safeguards. government needs to be able to share Federal regulations or unfunded man- We adopted an amendment by Mr. this threat intelligence so that the pri- dates on the private sector. To the con- LANGEVIN that made it clear that the vate sector can protect its own net- trary, it will be a critical, bipartisan bill contained no new authority to works. first step toward enabling America’s allow companies to hack back into net- The government is going to recip- private sector to better defend itself works in other companies. It certainly rocate. Our intelligence services go from the advanced state-sponsored wasn’t intended in the legislation. I overseas. They find out what the bad cyber threats in which we live in thought it was a well-intended amend- guys are doing. They come back and today. ment. The last thing we want to do is

VerDate Mar 15 2010 04:23 Apr 18, 2013 Jkt 029060 PO 00000 Frm 00021 Fmt 7634 Sfmt 0634 E:\CR\FM\K17AP7.031 H17APPT1 jbell on DSK7SPTVN1PROD with HOUSE H2090 CONGRESSIONAL RECORD — HOUSE April 17, 2013 unleash digital vigilantism across the need to play their important roles, but Madam Chair, as a member of the House country and what that might do to our only after it has been minimized and Permanent Select Committee on Intelligence, I ability to continue to rely on the Inter- screened by a civilian entity like the am very familiar with the types of threats that net as an engine of commerce. DHS or, in some rare cases, the FBI. this country faces every day and the serious We’ve put in place the private sector This bill already contains several ramifications of cyber vulnerabilities. This is an use restriction that limits companies’ levels of strong protections to ensure issue to which the committee has devoted a use of information received to only cy- that it improves cybersecurity without great deal of time and energy during the last bersecurity purposes. Mr. HECK and Mr. compromising our important civil lib- year. HIMES worked diligently on this erties, but this bill will add a signifi- In the cyber security realm these threats are amendment to improve the bill and cant new privacy protection to that ex- growing in frequency and severity, so much so make it very clear that this is just isting structure. that the Director of National Intelligence, about cybersecurity and cybersecurity Again, Madam Chair, you can see the James Clapper, identified cyber security as a purposes. level of effort that we are doing here to top threat facing this country earlier this year. The bill previously gave the govern- protect privacy and civil liberties and Director Clapper stated in an open hearing ment authorization to create proce- still have a workable bill that stops na- just a month ago that the growing cyber capa- dures to protect privacy and civil lib- tion-states like China, Russia, Iran, bilities of both state and non-state actors ‘‘put erties and prevent the government’s re- and North Korea from getting into all sectors of our county at risk, from govern- tention of personal information not your networks and stealing your prop- ment and private networks to critical infrastruc- necessary to understand a cyber erty. tures.’’ We have seen more and more brazen threat. Last week’s amendment makes We have yet to find a single U.S. attacks, from financial institutions and banks to company that opposes this bill. In fact, those procedures mandatory. That was news outlets, credit card companies, tele- we have the enthusiastic support of by Mr. HIMES. We agreed that was the communications providers and even govern- nearly every sector of the economy, be- right place to put the burden to make ment entities. sure there was no personal identifiable cause they are under assault from for- I believe that we should make every effort to information that was not necessary to eign cyber attacks and they need our safeguard the privacy of Americans’ personal help. They need it now. Companies and determine the nature of the attack. information even as we take steps to prevent industry groups from across the coun- We also struck the bill’s authorized attacks to our electronic networks and at- try, including Intel, the chip maker, government ‘‘national security’’ use of tempts to steal trade secrets, facilitate critical IBM, the Internet Security Alliance, information received from the private information sharing, and protect our critical in- the U.S. Chamber of Commerce, the sector. This would have provided the frastructure. Business Roundtable, TechAmerica, government flexibility in the future to To that end, the committee made a number TechNet, companies of Silicon Valley, address advanced cybersecurity of improvements to the bill with bipartisan sup- the Financial Services Roundtable, threats. In conversations with govern- port during our markup last week. Most nota- U.S. Telecom, the Nuclear Energy In- ment national security lawyers in re- bly, we voted to remove the authority for pri- stitute, and the National Association cent months, they assured us that this vate information to be used for broad non- of Manufacturers, just to name a few, flexibility wouldn’t be required in the cyber ‘‘national security’’ purposes. We also have sent the committee letters of sup- expanded oversight responsibilities for the Pri- near future. In light of that, and given port. And that list is growing by the vacy and Civil Liberties Oversight Board and the widespread misunderstanding this day of people who are encouraged by restricted usage of information received by pri- language was generating, we thought it the very light touch of the govern- was prudent to take it out. Ms. SEWELL ment; no new programs, no new author- vate entities to cyber security information. The from Alabama offered that amendment izations, it’s not a surveillance bill. bill also requires the government to minimize and worked with the committee to This is the only appropriate way to try any personal information that is unrelated to a make sure it was adopted. to deal with this problem. cyber threat. The bill has improved since the We also added additional oversight in By allowing the private sector to ex- last time it was considered by the House of the already very strong oversight pand its own cyber defense efforts and Representatives in 2012. structure in the bill to monitor the to employ classified information to I understand that there remain areas of con- government’s receipt and use of cyber protect systems and networks, this bill cern for some of my colleagues. I share your threat information voluntarily pro- will harness private-sector drive and reservations and am disappointed that we vided by the private sector. We added innovation while also keeping the gov- were unable to adopt amendments to address roles for the Privacy and Civil Lib- ernment out of the business of moni- some of the liability issues, require private erties Board and the individual agency toring and guarding private-sector net- sector entities to make ‘‘reasonable efforts’’ to privacy officers to provide additional works. remove irrelevant personally identifiable infor- oversight of the government’s use of This important legislation would en- mation, and establish the Department of information received from the private able cyber threat sharing and provide Homeland Security as the primary receptor of sector under this bill. clear authority for the private sector cyber threat information. An amendment to I’m also very proud to cosponsor an to defend its own networks while pro- place DHS as the primary agency was not amendment today with Mr. MCCAUL viding strong protections for privacy made in order today and I hope that we can and Mr. THOMPSON of Mississippi, Mr. and civil liberties. continue to work on an agreement to do that. RUPPERSBERGER and myself that would Madam Chair, with this great col- I am sensitive to these privacy concerns put a civilian face on the privacy sec- laborative effort, with the effort facing and hope that we can continue to improve the tor cyber information sharing with this this country, when you see this many Cyber Intelligence Sharing and Protection Act government. It was a concern by many. Republicans and Democrats coming to- through amendments today and ongoing dia- It was something we had long debates gether, recognizing the threat and logue. However, my underlying concerns and conversations on, and I think we crafting a bill that meets that very im- about the national security implications of came to an agreement that will at portant standard, this is the bill we ever-present and even escalating cyber at- least end that debate. It puts the ap- should all stand up and enthusiasti- tacks compels me to support the bill today. propriate civilian face so that, again, cally support, and I reserve the balance Mr. RUPPERSBERGER. Madam people can have confidence in the in- of my time. Chair, I yield myself such time as I tention of this bill and what it will do Mr. RUPPERSBERGER. Madam may consume. to protect cybersecurity on networks Chair, I yield to the gentleman from Il- Chairman ROGERS and I are here or allow the private sector to protect linois (Mr. GUTIERREZ) for the purpose today to discuss the Cyber Intelligence their own networks and protect civil of making a unanimous consent re- Sharing and Protection Act, known as liberties of Americans. quest. CISPA. The bill simply allows the gov- (Mr. GUTIERREZ asked and was ernment to give cyber threat intel- b 1440 given permission to revise and extend ligence to the private sector to protect Other elements of the government, his remarks.) its networks from cyber attacks. such as the intelligence community, Mr. GUTIERREZ. I thank the gen- I don’t want to repeat a lot of what will still receive the information they tleman for yielding. the chairman has said, but the first

VerDate Mar 15 2010 03:14 Apr 18, 2013 Jkt 029060 PO 00000 Frm 00022 Fmt 7634 Sfmt 0634 E:\CR\FM\K17AP7.033 H17APPT1 jbell on DSK7SPTVN1PROD with HOUSE April 17, 2013 CONGRESSIONAL RECORD — HOUSE H2091 thing I want to do is to acknowledge Media reports have said that Iran, a b 1450 the leadership of the chairman. Three rogue country that we know exports An annual report must be sent to years ago, the chairman and I, when we terrorism—we know what Iran’s beliefs Congress. We also have what we call took over the leadership of the House are, and yet reports have said that Iran the ‘‘inspector general,’’ whose job it is Select Intelligence Committee, real- attacked Saudi Arabia’s oil company, to oversee the different agencies they ized how serious the threat of cyber at- one of the largest in the world, represent. Those are four areas of over- tacks were to our country, to our busi- Aramco, and wiped out 30,000 com- sight just in the bill. nesses, to our health, safety, and wel- puters in a weekend. And let me say Regarding the privacy agreements fare. this: Iran is not a very sophisticated that we were concerned about, we only We decided to pull together a group company as it comes to cyber, but they have five elements where this bill ap- of representatives from different parts have the sophistication to be able to plies. That means if you’re a tax cheat of this issue—we had the administra- knock out 30,000 computers and really and we pick up some information, that tion involved, we had the privacy shut their businesses down for a period can’t be used against you. The privacy groups involved, including the ACLU, of time. This is what’s happening in agreements were concerned about the we brought in the industry—because the United States. issue of national security being one of we knew that we had to put together a Cyber Command, whose job it is to those elements in this bill. They bill that would pass the House, the protect our military networks, esti- thought it was too broad. So Chairman Senate and be signed by the President. mated that in the last couple of years ROGERS and I got together, and we were So, what we attempted to do was get that we have had, the United States of able to get the votes from both sides of input, and then we put together a bill. America has had $400 billion—not mil- the aisle, and we were able to take a And, by the way, the bill is only 27 lion, billion—worth of American trade position that the national security pages—it’s probably a record in this secrets being stolen from U.S. compa- issue is not in the bill anymore. We feel Congress—and we did read the bill. nies every year, costing these compa- national security is being covered by Now, what we attempted to do in this nies market share and jobs. That’s one of the elements in the bill that bill is to address a situation where probably the biggest theft in the his- says it deals with the issue of pro- now, the government cannot really tecting people’s lives or liberty. So we communicate with the private sector tory of the world, and yet we still are feel that we have covered national se- to try to help protect our citizens, our not able to help government working businesses from cyber attacks. The rea- with business. curity. You have Secretary Napolitano, the One of the most important issues was son for that is in 1947, there is a law Director of the FBI, you have the Di- the issue of minimization. What is that says that the intelligence commu- rector of the NSA, Alexander, and all minimization? Most people don’t know nity cannot communicate or pass infor- three have said one of the biggest fears what it is. Basically, minimization is if mation to another entity that does not private information is passed, there have clearances. So, basically what our they have now are these attacks, and needs to be an entity out there that bill does is to allow the sharing of in- that unless we have a sharing oppor- will take that private information out formation, which we can’t do now, to tunity between government and be- the private sector. tween business, they feel that they so that it is not used. Now, why is this important? This is cannot protect our country from these We’ve now added to the bill that any something that is very important be- cyber attacks the way that they of the zeroes and ones that are passed— cause most people don’t understand should. It’s so important that we need and that’s what’s happening—if there this. In the United States of America to act now on this bill. was some reason why somebody’s per- we have 10 companies, called the pro- Now, we can pass bills in the House sonal information is passed when those viders, that control 80 percent of our all day long, but if the Senate doesn’t zeroes and ones are coming back and network—80 percent of our network. So pass a bill and the President doesn’t forth, now we have what we call 100 in order for us to protect the United sign it, where are we? We were able to percent minimization, and the govern- States of America from cyber attacks, pass our bill last year in a bipartisan ment will make sure that every single we need to make sure that the govern- manner, and yet our bill went to the entity and all the information that is ment has a partnership with the pri- Senate and it stalled and the bill didn’t passed will be 100 percent minimized. If vate sector and that they can pass the go anywhere, so Chairman ROGERS and there is any personal information in threat information so that the govern- I started again. there at all, it will be knocked out. ment can help protect. But, what we said to each other and That’s very significant, and that gives As an example, if your house is being we discussed was that we need to ad- a lot of coverage. robbed, you call 911 and the police de- dress the issue of privacy. Even though This is also important: you don’t partment comes. That’s the same sce- we felt strongly that our bill does pro- have security if you don’t have pri- nario that we’re looking at here, only tect privacy, we knew there were vacy. That was one of the themes it’s a lot more sophisticated. Again, as groups out there, especially the pri- Chairman ROGERS and I used in the be- the chairman said, passing informa- vacy groups, that felt that there was ginning: if you don’t have security, you tion, mostly zeroes and ones, to the not enough protection in our bill. So don’t have privacy. Even though we government so that we can work to- we rolled up our sleeves, we listened to thought our first bill had it, we felt gether to protect our network. the issues raised by the privacy groups, there was a certain perception, we Now, why is this so important? And I the administration had issues with re- heard what was said and we made these think it’s important that we get into spect to privacy, and we changed the changes. some of the issues of threats. Just re- bill. There is one other issue that is out cently, we understand, and we know, Now, I don’t want to repeat what the there that’s very important that I that The Washington Post, The New chairman said, but basically we made think is also extremely relevant. York Times, The Wall Street Journal, some significant changes to our bill to That’s the issue of when the informa- were cyber-attacked. And basically, deal with the issue of privacy. We pro- tion is passed when we’re attempting our understanding is that they did this, vided that first, there’s a privacy and to protect our citizens and our busi- especially China, to intimidate the civil liberties oversight board, and now nesses from these attacks and hope- paper sources within China. We had our that board must review our program. fully from a destructive attack like U.S. banks. It is very serious for U.S. That’s one area of oversight. Iran did to Aramco in Saudi Arabia, banks to be attacked and hacked. Most In the intelligence community, we there was a perception out there which, of what our banks have are records and have privacy officers in each depart- again, had to deal with perceptions. information. And to be able to shut ment, in each area. And these privacy The perception was that if this infor- down a bank or to be able to manipu- people have to look at the threat infor- mation of zeroes and ones that are late or get privacy information could mation. They must also conduct a clas- being passed back and forth, what is be very destructive to our banks, and sified and unclassified review. That’s the point of entry. We did not want the yet this is being done, and it’s been the second oversight that was changed perception to be that the military in done for a period of time. in the bill. any way would be in charge or would

VerDate Mar 15 2010 03:14 Apr 18, 2013 Jkt 029060 PO 00000 Frm 00023 Fmt 7634 Sfmt 0634 E:\CR\FM\K17AP7.035 H17APPT1 jbell on DSK7SPTVN1PROD with HOUSE H2092 CONGRESSIONAL RECORD — HOUSE April 17, 2013 be the entity that is overseeing this. ing for military and security vulnera- tempting to pass a bill that will help We felt very strongly that it had to be bilities, our networks are at risk. our country and protect us. civil. Cyber looting puts U.S. businesses at Mr. THOMPSON of California. So Chairman ROGERS and I, along a competitive disadvantage, threat- Madam Chair, I thank the gentleman with Chairman MCCAUL of the Home- ening jobs and our private information. for yielding, and I thank both the land Security Committee and Ranking The same vulnerabilities used to steal ranking member and the chairman for Member THOMPSON, have an amend- intellectual and personality property their good work on this measure and ment here today which is very signifi- are also exploited to target America’s for including all of us in trying to build cant. I’m sure it will be very well re- critical infrastructure, such as our a better product. ceived by the privacy groups in the electrical grids and our banking and fi- Clearly, the threat of a devastating White House. What the bill will now nancial institutions. These cyber weak- cyber attack is real and, as has been say is that when information is passed, nesses make the intelligence-sharing mentioned by a number of previous it will be the Department of Homeland provisions within H.R. 624 vitally im- speakers, can’t be understated. Ad- Security. That is very significant, and portant. However, as we seek to secure vanced cyber attacks from China and we would hope that that would truly and defend the U.S. economy and our other nation-state actors are stealing deal with the majority of these privacy country’s critical infrastructure, we hundreds of billions of dollars’ worth of issues. must be mindful of our Nation’s found- cutting-edge research and development We know that we have to move and ing principles. We must ensure that we from our U.S. companies and even from we have to move quickly. We’re here protect our citizens’ privacy and civil our Federal Government. That’s why today to debate this bill. And, again, liberties. it’s essential that the business commu- Chairman ROGERS—he’s not listening, The House Permanent Select Com- nity and the Federal Government work but I’ll say it anyhow—has shown tre- mittee on Intelligence has sought the together to share cyber threat informa- mendous leadership. I say this and I input of and worked closely with pri- tion for the purpose of protecting the say it sometimes in jest, that I was a vacy and civil liberties groups to American people from the fallout of former investigative prosecutor and he strengthen the bill and provide nec- cyber attacks and cyber hackers. was a former FBI agent and all good essary individual protections. These While it’s important that we protect FBI agents must listen to their pros- discussions resulted in a number of against the threat of cybersecurity, it’s ecutors, even if we’re in the minority. amendments that were adopted on a equally as important that we recognize That was a joke. Not withstanding broad bipartisan basis during the com- the responsibility to protect the con- that, he has shown leadership. We mittee markup. stitutional rights of law-abiding citi- threw partisanship out the window. We My amendment, offered with my col- zens. Though I support H.R. 624, both knew the stakes were high. We have league from Connecticut (Mr. HIMES), for the fact that it is important that been concerned that we have not been specifically limits the private sector’s we address these issues and because I able to protect our country. I believe use of cyber threat intelligence only to believe it needs to be moved on and we that Congress needs to act because a cybersecurity purpose. This provision can get it in conference committee we’re standing in the way of protecting addresses the concerns and with the Senate bill, I remain some- our country. misperceptions that private sector what concerned that the bill as drafted This reminds me of a situation. We companies could have used this infor- could lead to the broad sharing of con- know how serious Hurricane Sandy mation for marketing and other com- sumer information which in turn could was. It’s similar to if you are a mete- mercial purposes. be used in ways unrelated to combating orologist and Sandy is coming up the Another amendment requires the es- cybersecurity threats. east coast and you can’t warn your tablishment of minimization proce- b 1500 constituents that Sandy is coming. dures to limit the receipt, retention, That’s why we need to pass this bill to- and use of personally identifiable infor- I emphasize ‘‘could be used.’’ morrow, and we need to do it for the mation, or PII. In the unlikely event Already the chair and the ranking benefit of our country. that PII is inadvertently shared, this member have accepted and we’ve incor- And I do want to end with this: you provision will prevent the government porated a series of provisions in this do not have security if you don’t have from receiving and/or maintaining that bill that I authored that would mini- privacy. We feel that this bill, along information while still ensuring rapid mize the sharing of some personally with the amendments that will be in- transmission of critical cyber threat identifiable information, that would troduced today, will effect that. intelligence necessary to protect our limit permissible uses of information With that, I reserve the balance of systems. which would be shared under this bill, my time. Yet another amendment narrows the and that would insist on a number of Mr. ROGERS of Michigan. Madam authorized use of shared cyber threat reporting requirements that will en- Chair, I yield 3 minutes to a current intelligence by striking the provision sure Congress’ ability to provide the military officer and great member of providing the government broad au- necessary oversight of this program. the Intelligence Committee, the gen- thority to use this information for na- The CHAIR. The time of the gen- tleman from Nevada (Mr. HECK). tional security purposes. tleman has expired. Mr. HECK of Nevada. I want to begin All of these bipartisan amendments Mr. RUPPERSBERGER. I yield the by thanking both the chairman and the will provide the private sector the nec- gentleman an additional 30 seconds. ranking member for their incredible essary tools to protect its own net- Mr. THOMPSON of California. So, leadership on this very difficult task. works while at the same time pro- taken together, these provisions will It was especially gratifying to work in viding critical protections for privacy improve the transparency and the ac- such a bipartisan manner to come to and civil liberties. countability of this bill. However, not- the final product that we’ll be voting This legislation represents an impor- withstanding these important changes, on later tomorrow. tant first step toward securing our Na- the bill is not perfect. Given the sig- Madam Chair, our Nation is under at- tion’s intellectual property and critical nificance of this threat and the com- tack every day, every hour, every infrastructure from cyber attack, and I mitment of everyone to continue to minute. Cyber attacks on our Nation’s urge my colleagues to support its pas- work together, I strongly urge my col- networks threaten our economic and sage. leagues to support this bill and to national security. That is why I rise in Again, I thank the chairman and the move it out of the House. Let’s get the support of H.R. 624, the Cyber Intel- ranking member for their leadership. thing to conference. Let’s get the best ligence Sharing and Protection Act. Mr. RUPPERSBERGER. Madam bill possible, get it signed into law, and Whether it is hacktivists attempting Chair, I now yield 2 minutes to a senior work together to protect the American to disrupt services, criminals intent on member of our committee who worked people. stealing personal information, spies very hard on this bill, the gentleman Mr. ROGERS of Michigan. Madam looking for intellectual property or from California (Mr. THOMPSON). He’s Chair, I am proud to yield 3 minutes to trade secrets or nation-states search- been with us for the last 3 years at- a leader on the Homeland Security

VerDate Mar 15 2010 03:14 Apr 18, 2013 Jkt 029060 PO 00000 Frm 00024 Fmt 7634 Sfmt 0634 E:\CR\FM\K17AP7.036 H17APPT1 jbell on DSK7SPTVN1PROD with HOUSE April 17, 2013 CONGRESSIONAL RECORD — HOUSE H2093 Committee and the chair of the House Mr. RUPPERSBERGER. Madam I’d like to keep things pretty simple. Admin Committee, the gentlelady from Chairwoman, I yield 2 minutes to a If there were a sergeant from the Chi- Michigan (Mrs. MILLER). great Member from the State of Illi- nese People’s Liberation Army inside Mrs. MILLER of Michigan. I thank nois (Mr. ENYART). one of our power plants or inside one of the gentleman for yielding me time. Mr. ENYART. Madam Chair, I rise our banks and if they were trying to Madam Chair, let me just read for today in support of this important leg- steal stuff and if they were looking our colleagues the preamble of our islation. around, trying to figure out how to get Constitution: The threat we face today from cyber in and how to access our systems or to We the people of the United States, in attacks poses a clear and present dan- take property or to do damage to our order to form a more perfect Union, establish ger that must be addressed. When I was power grid, the American people would justice, insure domestic tranquility, provide sworn in to Congress to represent the demand that the government do what- for the common defence, promote the gen- people of southern Illinois, I took a ever it could, and they would be eral welfare, and secure the blessings of lib- vow to protect them from all enemies, erty to ourselves and our posterity, do or- thrilled to learn that that company dain and establish this Constitution for the both foreign and domestic. It was not was permitted and, indeed, protected if United States of America. the first time I had taken such an oath. it decided to share with others that po- Madam Chair, this great statement By supporting CISPA, we move to ful- tential threat to its piece of the infra- that is the foundation for our Federal fill our oath. structure. That’s what we’re doing Government provides us the direction I know there are good Americans who today. that we need to our primary respon- oppose this legislation because they be- The world has changed just a little sibilities. I would suggest that this leg- lieve the protections for civil liberties bit. In just this last month, the last M– islation helps us fulfill every one of the and privacy don’t go far enough, but we 1 tank left Europe. It’s the first time responsibilities mandated on us by our must not let the perfect be the enemy we haven’t had a tank in Europe since Constitution. Now let’s just take them of the good. This bill prohibits the gov- D-day when the great Kansan invaded one by one. ernment from forcing private sector on the great quest to free us from Nazi ‘‘Establish justice’’—it is just to pro- entities to provide information to the totalitarian domination. There are no tect American companies from the government. It places restrictions on tanks. We fight in a different world theft of their intellectual property by the use of any data voluntarily shared. today. We use the word ‘‘cyber,’’ and attackers and by competitors. The bill provides for strong congres- sometimes folks forget what we’re real- ‘‘Insure domestic tranquility’’—can sional oversight. These are tremendous ly talking about. We’re talking about you even imagine the threat to domes- victories to protect our civil liberties. nation-states trying to do terrible tic tranquility if our power grid is suc- I support this bill because American harm to American interests, to Amer- cessfully attacked by a foreign state jobs hang in the balance. Every day, ican property and, indeed, to American like North Korea and this Nation is left our companies are subject to cyber at- civil liberties. in the dark? tacks seeking to steal valuable trade Now, in the last minute I have here, ‘‘Provide for the common defence’’— secrets which deprive American citi- I want to talk about a couple of myths what is more common than our power zens of high-paying high-tech jobs. Lo- that have arisen about this piece of grid, our financial system and our cally, my hometown grocery store in legislation. When I first learned about economy? Are we not required to de- southern Illinois, Schnucks, was re- it, I, too, shared some of the concerns fend all of that? cently hacked, and customers’ debit about what might be happening, about ‘‘Promote the general welfare’’— and credit card information was com- what might take place here. I offered again, if our power grid is taken down, promised, making many of my con- an amendment last year, which is now it is impossible to promote the general stituents vulnerable to theft. incorporated into the bill, along with welfare. I cannot stand by and let an oppor- dozens of such amendments, to make ‘‘Secure the blessings of liberty to tunity to prevent such actions pass me sure belt-and-suspenders that we pro- ourselves and to our posterity’’—our by, which is why I stand in support of tected civil liberties. intellectual property, made with Amer- this legislation. To protect the jobs of I’ve heard the myth propagated that ican ingenuity, our life savings in those who work to build planes at Boe- this piece of legislation violates con- banks, under threat from foreign ac- ing in Belleville or workers at Afton tract rights, that somehow through tors, our jobs, our economy. All of Chemical in Sauget, I must support CISPA we’re going to take away the these blessings of liberty are currently this legislation. To ensure that those ability of people to negotiate privately at risk if we do nothing. who make weapons to defend our coun- for contractual things that they want. I’ve heard some suggest, Madam try at General Dynamics in Marion, Il- I don’t know how that could be. This Chair, that they have constitutional linois, don’t lose their jobs because bill is purely voluntary. It mandates concerns about passing this bill. I some Chinese hacker has stolen propri- that no one participate. It simply al- would just suggest to them that I be- etary information, I must support this lows businesses to voluntarily partici- lieve strongly that you should have legislation. pate and share information they have constitutional concerns about not pass- As the weapons of warfare change about attacks that have been foisted ing this bill. I do not believe that our and adapt, we must make the nec- upon them. Constitution gives foreign state actors essary adjustments to protect our Na- I’ve heard a second myth that this like China or Russia or North Korea or tion while adhering to our founding will authorize warrantless searches Iran uncontested access to the critical principles. I urge my colleagues to join across the United States of America. systems of private American compa- me in support of this act. The CHAIR. The time of the gen- nies. To the contrary, I believe that The CHAIR. The gentleman from tleman has expired. our Constitution requires us, the Fed- Maryland has 141⁄2 minutes remaining, Mr. ROGERS of Michigan. I yield an eral Government, to defend them. and the gentleman from Michigan has additional 60 seconds to the gentleman. I certainly want to applaud the great 51⁄2 minutes remaining. 1510 work that has been done by the chair- Mr. ROGERS of Michigan. Madam b man of the House Intelligence Com- Chair, I yield 2 minutes to a former Mr. POMPEO. There’s talk about mittee, Mr. ROGERS of Michigan, and military officer, the distinguished gen- warrantless searches all across Amer- certainly applaud our ranking member, tleman from Kansas (Mr. POMPEO). ica. The legislation does no such thing. Mr. RUPPERSBERGER. Mr. POMPEO. I want to thank Chair- It’s a short bill. It’s 26 pages. I would Gentlemen, you have worked so man ROGERS and Ranking Member urge everyone to go read it for them- closely together on your committee RUPPERSBERGER for all of their hard selves. and with other committees as well on work over many months, now years, in It fairly clearly limits what govern- this great piece of legislation. bringing this to where we are today, ment may do, what information gov- I would urge all of my colleagues, and I want to thank all of the com- ernment may receive. It limits what Madam Chair, to join me in fulfilling mittee staff who worked so hard to private companies can share with gov- our oath and in voting ‘‘yes.’’ bring it to this point as well. ernment and amongst themselves. It

VerDate Mar 15 2010 03:14 Apr 18, 2013 Jkt 029060 PO 00000 Frm 00025 Fmt 7634 Sfmt 0634 E:\CR\FM\K17AP7.038 H17APPT1 jbell on DSK7SPTVN1PROD with HOUSE H2094 CONGRESSIONAL RECORD — HOUSE April 17, 2013 limits what government can do with PERSBERGER for their efforts. I com- I just want to make very, very that information once it is received. It mend them on a collaborative approach clear—and I thank the gentlelady for has greatly capped what is going on to a very important issue, and I ask my working with us, she is a great member here. colleagues to support this important of the committee—nowhere in this bill Its design is simple: it is to make measure. does it allow the military to collect in- sure that all of the information about Mr. ROGERS of Michigan. I don’t formation on private citizens in the direct attacks on America are widely have any further speakers, and so I will United States. This is not a surveil- known, easily disseminated, and avail- continue to reserve the balance of my lance bill. It does not allow it to hap- able for all to help in the protection of time to close. pen. That needs to be very, very clear the American state. I urge my col- Mr. RUPPERSBERGER. I yield 2 in this debate. It does not allow the leagues to support this legislation. minutes to the gentlewoman from Illi- military to surveil private networks in Mr. RUPPERSBERGER. Madam nois (Ms. SCHAKOWSKY), who is a senior the United States. Period. End of Chair, I yield 2 minutes to my good member of our committee and has story. That’s the biggest part of our friend, the gentleman from Rhode Is- worked very hard on this issue. privacy protections. Again, I want to land (Mr. LANGEVIN); and I do want to Ms. SCHAKOWSKY. Madam Chair, I thank the gentlelady for working with say that we’ve been working together sincerely want to thank the chair and us, but that’s just an inaccurate state- for years on this issue of cybersecurity, ranking member of the Intelligence ment, and I want to make that clear Committee and express my apprecia- and I consider him to be one of the ex- for the RECORD. perts and one of my closest friends tion for all of their efforts to work in I reserve the balance of my time. working on this issue. a bipartisan manner and to address the Mr. RUPPERSBERGER. Madam (Mr. LANGEVIN asked and was given concerns raised by me, by civil lib- Chair, how much time do I have re- permission to revise and extend his re- erties groups, and by the White House. maining? marks.) However, I rise today in opposition to The CHAIR. The gentleman from Mr. LANGEVIN. Madam Chair, I the bill. While I strongly believe that Maryland has 10 minutes remaining. thank the gentleman for yielding. I we need to address the serious cyberse- Mr. RUPPERSBERGER. Madam rise in strong support of H.R. 624, and I curity threat—there is no question Chair, I yield 2 minutes to the gentle- about that—I think we can do it with- do thank Chairman ROGERS and Rank- woman from Texas (Ms. JACKSON LEE), out compromising our civil liberties. ing Member RUPPERSBERGER for their a very active member of our caucus. Despite some positive changes, I feel commitment to a bipartisan and inclu- Ms. JACKSON LEE. I thank the dis- this bill fails to adequately safeguard sive process on a very, very challenging tinguished ranking member and the the privacy of Americans. Cybersecu- issue. chairman, as well, for working to an- We know with certainty that cyber- rity and privacy are not mutually ex- swer an enormous concern on the ques- clusive, and this bill fails to achieve a security threats that we face are real, tion of national and domestic security. balance between protecting our net- and they are increasing both in number Since Robert Tappan Morris in 1988 works and safeguarding our liberties. released one of the first commuter and sophistication every day. Congress Yesterday, I offered an amendment worms, we realized, as the computer may not have acted last year, but that would have made critical advances and the Internet now have grown, the those who would use cyberspace for ne- toward protecting privacy. My amend- proliferation of computer malware, or farious purposes certainly did, and ment would have required that compa- they continue to steal intellectual nies report cyber threat information computer programs designed specifi- property, identities, funds from bank directly to civilian agencies, maintain- cally to damage computers or their accounts, and sensitive security infor- ing the longstanding tradition that the networks or to co-opt systems or steal mation. military doesn’t operate on U.S. soil or data, has attracted public and media I know full well that this is not a collect information of American citi- attention and that we needed to do perfect bill, such is the nature of the zens. something. Now more than ever, cyber- legislative process. But we need the au- Another important amendment of- security impacts every aspect of our thority that CISPA provides to allow fered by Congressman SCHIFF would lives. the voluntary sharing of cybersecurity have required companies to make ‘‘rea- As a member of the Homeland Secu- threat information. sonable efforts’’ to remove personal in- rity Committee, I can assure you that Improvements, I should point out, formation before sharing cyber threat my concern about the electric grid have been made over last year’s bill. information. Unfortunately, those crit- utilities, the energy and financial in- Several amendments have already been ical amendments were not made in dustries, recognize that it is important adopted to alleviate many privacy con- order. to act, and to act with speed and un- cerns, and more may be adopted before Yesterday, the Obama administra- derstanding. Likewise, I am concerned we are done. I welcome such progress. tion expressed ongoing concerns about about the rage in epidemic of hackers This bill is an important step, but in- this legislation, issuing a veto threat. I and the impact that it has on 85 to 87 formation-sharing is only one portion share the President’s concern—despite percent of the infrastructure in this of the broader cybersecurity debate. positive changes, this bill falls short in Nation. I have long maintained that we must several key ways. As written right For that reason, however, I believe also work to ensure the creation of now, and hopefully there still may be that along with this effort, we should minimum standards for critical infra- some changes, CISPA allows the mili- have a lead civilian agency to collect structure; the education of a strong tary to directly collect personal infor- the data. I’m looking forward to the and vibrant future cybersecurity work- mation on American citizens. It fails to manager’s amendment, which I hope force; and effective Federal and mili- safeguard privacy of Americans and will clarify that Homeland Security tary cyber structure, including a Sen- grants sweeping immunity to compa- will be that. ate-confirmed cybersecurity director nies for decisions made based on cyber In addition, I have offered an amend- with real authority, including com- information, prohibiting consumers ment. My amendment ensures that if a prehensive budgetary authority; and from holding companies accountable cloud service provider identifies or de- the coordination of research and devel- for reckless actions and negligence. tects an attempt by someone to access, opment on cybersecurity across the The CHAIR. The time of the gentle- to gain unauthorized access to non- Nation. woman has expired. governmental information stored on Together with the President’s recent Mr. RUPPERSBERGER. I yield 30 the system, it would not be required or executive order, I believe CISPA and seconds to the gentlewoman. permitted to report that attempt to the bills this House approved yesterday Ms. SCHAKOWSKY. I do urge my col- the government and it cannot share are a very promising beginning, but leagues to oppose this bill. We can and that information with the government. there is obviously much more to be should do better, and I’m hopeful that I thank the Rules Committee for allow- done. we still will do better. ing that amendment to be in. Again, I want to thank Chairman Mr. ROGERS of Michigan. Madam I do, however, want to raise the ques- ROGERS and Ranking Member RUP- Chair, I yield myself 30 seconds. tion on privacy. I believe that we could

VerDate Mar 15 2010 04:23 Apr 18, 2013 Jkt 029060 PO 00000 Frm 00026 Fmt 7634 Sfmt 0634 E:\CR\FM\K17AP7.040 H17APPT1 jbell on DSK7SPTVN1PROD with HOUSE April 17, 2013 CONGRESSIONAL RECORD — HOUSE H2095 fix this legislation with a small addi- So all information is affected by this, prove this legislation. I also want to thank all tion dealing with the privacy question under this bill, in its present form, of my colleagues who offered amendments to as we hopefully address the question turned over to the government, shared strengthen this bill by providing more privacy dealing with the lead civilian agency. I with every agency relating to any bod- protections for our citizens and improving thank the chairman and the ranking ily injury or harm, and we haven’t been inter-agency coordination. While this is not a member, and I look forward to further offered an opportunity to amend that. perfect bill, this is a step in the right direction discussion on this legislation. So I encourage my colleagues to vote and I am hopeful that the Senate will take up Mr. ROGERS of Michigan. I continue ‘‘no’’ on this bill. We can and we must this measure and make it even stronger. It is to reserve the balance of my time. do better for our country. also my hope that the White House will con- Mr. RUPPERSBERGER. Madam Mr. RUPPERSBERGER. I yield 2 tinue to work with us in this body’s effort to be Chair, I yield 2 minutes to the gen- minutes to the gentlewoman from Ala- proactive instead of reactive. Madam Speaker, tleman from Colorado (Mr. POLIS), a bama (Ms. SEWELL). Is it ‘‘Roll Tide’’? we simply cannot afford to wait—The threats member of the Rules Committee. She is an outstanding new member of against our national and economic security are Mr. POLIS. I thank the gentleman. the Intelligence Committee. She’s real. Attacks against our financial, energy and This bill, unfortunately, hurts what smart. She works hard. She’s very dy- communication sectors are happening every it purports to help. It’s detrimental to namic, and she is our closer today. day. We have received dire warnings from our job growth, innovation, and privacy. Ms. SEWELL of Alabama. Madam defense and intelligence officials that wide- Chair, today I rise to support the bill. b 1520 spread attacks are the number one threat to I can say, Madam Chair, that I actu- our national security above all else. The Direc- We talked a bit about the process ally voted against the bill last term. tor of National Intelligence, James Clapper, whereby a number of amendments that But today I am proud to say, because has elevated cyber threats to the top of the list would have improved it were not al- of the hard work of both the chairman of national-security concerns. The National In- lowed to be discussed or voted on on and the ranking member and so many telligence Estimate provided evidence of wide- the floor. And there are still enormous members of this committee, that today spread infiltrations of U.S. computer networks. flaws with this bill which need to be I stand before you in support of the Evidence has also emerged of spying inside addressed. bill. the computer networks of major U.S. media, Look, to the extent that companies I am now a new member of the Intel- including the Wall Street Journal and New believe that information-sharing is im- ligence Committee and, as I’ve told my York Times. Defense and intelligence officials portant, it should be done in a way staff, the more you know, the better have grown increasingly alarmed over a re- that’s consistent with sanctity of con- you can vote. And today, I want to rise lentless cyber attack campaign against U.S. tract. If there’s something that gets in to explain why I am voting for this bill. banks, critical infrastructure and a host of the way of information-sharing, we I think that everybody agrees that other private entities. need to identify it. That hasn’t been there are cyber threats each and every We must continue to work together to find a identified. day. And, in fact, Director Clapper, the balance between preserving privacy and pro- Clearly, the answer is not to say Director of National Intelligence, he tecting the security of this country from the whatever a company agrees upon with actually said his number one thing danger of cyber attacks. Sharing cyber threat a personal user, even if explicitly it that keeps him up at night is cyber at- information, as provided for in this bill, is vital says we’re going to keep your informa- tacks. for combatting malicious hackers, criminals, tion private, the minute after that’s And what this bill will do is simply and foreign agents. By removing the legal and agreed to by a user, the company would to share information. It is not about regulatory barriers currently impeding the free be completely indemnified by turning releasing personal identifiable informa- flow of actionable information, the Cyber Intel- all this information, personal informa- tion. That is strictly prohibited by this ligence Sharing and Protection Act (CISPA) tion, credit card information, address, bill. So it is strictly prohibited by this will promote nimble, adaptive innovation—the everything, over to the government. bill. best strategy for defending against a rapidly Now, why not remove anything? And this bill has been greatly en- evolving threat landscape. Why not just pass along the parts hanced by so many of my wonderful This growing number and complexity of that are related to cybersecurity? colleagues who have submitted amend- cyber attacks on private and government com- There’s no incentive to do so. Had ments, many of which I am sure will puters has provided an opportunity for us to there been a requirement that reason- pass tomorrow, as well as greatly en- join together and pass bipartisan legislation to able efforts were taken to delete per- hanced by the amendments that were address the problem. I am committed to find- sonal data, that would have been a step brought forth by committee members. ing a workable solution with the Senate and in the right direction. But, again, it’s I shared some serious concerns about White House, and I believe this bill provides a an extra cost with no benefit for the some privacy protections when I came solid framework on a critical issue for national company to delete personal data be- on the committee, and I have to tell and economic security. I look forward to con- cause they’re completely indemnified you that the committee was gracious sidering any amendments my colleagues put with regard to this matter without the enough to listen to the amendments forth today to help improve the legislation of consent of the user himself. that I offered, as well as other amend- this bill. And though I realize this is not a per- What happens to this information ments that were offered by my col- fect bill, I think the time to act is now to pro- once it reaches the government? leagues on this side of the aisle. tect our national security. I urge members to It can be shared with any govern- I was surprised, given the partisan vote for this legislation. ment agency. It can be shared with the nature of politics here in this House, Mr. RUPPERSBERGER. Madam Bureau of Alcohol, Tobacco and Fire- that the Intelligence Committee really Chair, I yield myself as much time as I arms, the National Security Agency, tries, because of our national security, may consume. the Food and Drug Administration. to work together. And in a true bipar- First thing, we’ve heard testimony Again, the limitations are so open- tisan manner, many of those privacy today about how serious the cyber at- ended that anything that relates even protections were unanimously agreed tacks are to our country. We know to a minor scratch or a cut, issues com- to by members of the committee. what has occurred already. We know pletely unrelated to cybersecurity, Once again, I urge my colleagues to that our banks have been attacked, our things that could be related to dog vote for this bill, and I urge the Presi- major banks. We know that our news- bites, essentially any information. dent to sign this bill into law. papers, New York Times, Washington Part of the problem here, there are Today, I rise in support of this bill. But Post, have been attacked. cyber attacks everywhere. I ran an e- Madam Chair, last year, I voted against the We know that news reports have said commerce site. Tens of thousand every cybersecurity bill that was offered in this body. that Iran attacked Aramco, Saudi Ara- day. I mean, any e-commerce company I am now and am honored to serve as a mem- bia’s largest oil company. They took experiences this every day, so it’s a re- ber of the Intelligence Committee and the out 30,000 computers, which means we ality every day. Everything is a poten- more you know, the better you can vote. I are subjected to those attacks also. tial cybersecurity threat. There’s peo- want to commend the Chairman and the We also know that Cyber Command ple cracking passwords every day. Ranking Member for their leadership to im- has said that we, in the United States,

VerDate Mar 15 2010 03:14 Apr 18, 2013 Jkt 029060 PO 00000 Frm 00027 Fmt 7634 Sfmt 0634 E:\CR\FM\K17AP7.041 H17APPT1 jbell on DSK7SPTVN1PROD with HOUSE H2096 CONGRESSIONAL RECORD — HOUSE April 17, 2013 have lost, from the attacks on our willing to deal with the issue of percep- look forward, Madam Chair, to the de- businesses, approximately $200 billion. tion and to make sure we made privacy bate on the amendments, and I yield Just think what that equates to in an element that we could deal with, back the balance of my time. jobs, stealing information about trade and that we could change our bill to Mr. CONYERS. Madam Chair, this week, secrets, about competing globally with deal with certain perceptions. I feel the House of Representatives is scheduled to a country like China where they have that we’ve done that. take up the Cyber Intelligence Sharing and all of our information, where they’re I also want to thank Chairman Protection Act (CISPA). Among other things, able to shut down banks. MCCAUL from Homeland Security and the legislation would authorize open-ended This is a very serious issue, and we Ranking Member BENNIE THOMPSON sharing of threat information between certain need to do a better job to educate the from Homeland Security, who’ve private companies and the federal govern- public on how serious it is. And we just worked with us to get an amendment ment, and grant those companies unlimited hope that we can pass this bill today in that was very important, as you heard legal immunity. I—along with more than 30 the House, a bill in the Senate, and the from JAN SCHAKOWSKY. civil liberties and privacy groups ranging from President signs the bill, so that we can That amendment basically says that the ACLU to the Competitive Enterprise Insti- protect our citizens, we can protect our the point of entry for any communica- tute—believe the bill is badly flawed, and will businesses from these attacks. tion is on the civil side of our govern- harm the privacy and civil liberties of our citi- If we knew that Iran was sending ment, Homeland Security, and we hope zens. While the Intelligence Committee over an airplane with a bomb we would to pass that amendment. amended CISPA last week, purporting to ad- take it out. And yet we have to make And I feel very strongly that if we do dress privacy-related issues, the changes do sure that we deal with the issue in the that, we will have addressed the major- not ameliorate the core concerns I have with United States of America to protect ity of the issues that are so important the bill. ourselves. to this bill and to our security and to CISPA would create a ‘‘Wild West’’ of infor- Now, there was a major issue raised, our privacy. mation-sharing, where any ‘‘certified’’ private- and that issue was privacy. And believe I yield back the balance of my time. sector entity could share information with any Mr. ROGERS of Michigan. Madam me, I want to say this over and over federal government agency for various ill-de- Chair, I yield myself the remaining again. You don’t have security if you fined purposes. By allowing for the direct shar- time. don’t have privacy. And we feel very I just want to quickly, Madam Chair, ing of information between the private sector strongly that this bill provides privacy. address some of the moving targets on and the National Security Agency, as well as But we also know, Chairman ROGERS the bill. When we move to change other Defense Department agencies, the legis- and I know, that if we pass a bill here, something in the bill, the 19 privacy lation hastily casts aside time-tested legal pro- we need to pass a bill in the Senate, amendments, people who still decide hibitions against intelligence agencies and the and we need the President to sign it. they don’t like it for, again, whatever military from operating on U.S. soil. The bill So we got together, and even though reason, move their challenges of why should be amended to prevent this direct shar- we passed our bill in a bipartisan effort they don’t like it. ing with non-civilian agencies. last year and it stalled in the Senate, The newest, I think, straw man is CISPA would also create duplicative infor- we now have made the bill what we feel that this somehow would violate con- mation-sharing processes with no central over- is a lot stronger as it deals with the tract law. Nothing in this bill allows sight or accountability. Successive administra- perception of privacy. you to avoid contract law. Nothing. tions have expended enormous resources And we’ve added oversight. We have building proper information-sharing programs four categories of oversight, privacy. b 1530 at the Department of Homeland Security and We’ve made sure that minimization— It’s a red herring. It is not accurate. the FBI; these efforts should be enhanced, not taking out any privacy information Nothing in this bill would allow this to clouded by permitting the proliferation of re- that might pass—we made sure that happen. The fact that someone who dundant programs across the federal govern- that is 100 percent minimization so was in the technical business would say ment. that no one’s private information will this hurts job growth, that’s inter- The legislation also removes current legal pass. esting. The sheer number of companies protections applicable to companies that facili- But the most important thing is that who support this, from the Business tate and process our private communications we have to make sure that we pass a Roundtable to the Financial Services and share them with the government and one bill because of the fact that 80 percent Business Group to TechNet, who has another. Companies sharing information would of our network is controlled by 10 com- companies like Intel Corporation, be exempt from all privacy statutes and would panies in the United States of America. Symantec, Juniper, Oracle, EMC, so- be relieved of liability for recklessly sharing, or And all of our experts in this area have cial media, all stand up and say this is deciding not to share information. Without nar- said that if government and business the right approach. It will allow us to rowly defining the information that may be can’t share information about these at- protect our consumers of our product shared, limiting to whom it may be shared and tacks, zeros and ones, if they can’t from foreign governments stealing why, and preserving mechanisms to provide share information, they cannot protect their private information. accountability for wrongdoing, the privacy of our country from these ongoing at- We need to understand what this bill our citizens and confidence in the trust- tacks that are occurring as we speak is and what it is not. It is not a surveil- worthiness of our electronic communications right now. lance bill. Nothing in here authorizes networks would be weakened. For example, So let’s act. Let’s not wait until we surveillance. We’re going to have an the bill would not prevent a company sharing have another catastrophic attack like amendment to clarify that, to say it in cyber threat information from including data 9/11. Let’s deal with this now. Let’s the law so people can regain that con- not necessary to understanding the threat, pass the bill and make sure that we fidence. such as private emails between family mem- protect, again, our citizens. And I want We argue, Read the bill. It’s 27 pages. bers or personal information such as medical to say it one more time. The issue that It is very clear. It is predominantly records, in a data dump to the government. you can’t have security if you don’t protections of your civil liberties, and The bill should narrowly define the cat- have privacy. it also allows companies to voluntarily egories of information that may be shared, I do want to also say, I want to thank share malicious source code—and such as malicious code or methods of defeat- all those individuals in our govern- that’s source code that’s committing a ing cybersecurity controls, and require that ment, in the private sector. The pri- crime against their consumers and companies sharing the data take reasonable vacy groups have all come together. their company—with the Federal Gov- steps to remove information identifying individ- This has been a good debate. It’s been ernment so they can go back overseas uals not involved in the threat. It is not enough a debate about issues that the public and find the Chinese or the Iranians or to require government recipients of the data to needed to know. the Russians or the North Koreans who remove the private information because it And I also want to thank the chair- are perpetrating that crime. This bill is should never be sent to the government in the man for his leadership, and the fact nothing more. It does do that. first place. The bill therefore should be amend- that he was willing, even though we Thanks to the ranking member and ed to require that companies sharing cyber had our bill passed a year ago, he was all who have gotten to this point. I threat information make reasonable efforts to

VerDate Mar 15 2010 03:14 Apr 18, 2013 Jkt 029060 PO 00000 Frm 00028 Fmt 7634 Sfmt 9920 E:\CR\FM\K17AP7.044 H17APPT1 jbell on DSK7SPTVN1PROD with HOUSE April 17, 2013 CONGRESSIONAL RECORD — HOUSE H2097 remove such personally identifiable informa- ‘‘(1) IN GENERAL.—The Director of National HOMELAND SECURITY.—Subject to the use and tion from the data they share with other com- Intelligence shall establish procedures to allow protection of information requirements under panies and the government. elements of the intelligence community to share paragraph (3), the head of a department or The bill’s liability protection provisions are cyber threat intelligence with private-sector en- agency of the Federal Government receiving tities and utilities and to encourage the sharing cyber threat information in accordance with also unnecessarily broad and eliminate the of such intelligence. paragraph (1) shall provide such cyber threat ability of aggrieved citizens and companies to ‘‘(2) SHARING AND USE OF CLASSIFIED INTEL- information in as close to real time as possible to protect and secure their privacy, as well as LIGENCE.—The procedures established under the National Cybersecurity and Communications their property and physical well-being. Regard- paragraph (1) shall provide that classified cyber Integration Center of the Department of Home- less of whether a company acted recklessly or threat intelligence may only be— land Security. negligently, the bill would prevent civil or crimi- ‘‘(A) shared by an element of the intelligence ‘‘(B) REQUEST TO SHARE WITH ANOTHER DE- nal actions for decisions made for cybersecu- community with— PARTMENT OR AGENCY OF THE FEDERAL GOVERN- ‘‘(i) a certified entity; or MENT.—An entity sharing cyber threat informa- rity purposes ‘‘based on’’ cyber threat informa- ‘‘(ii) a person with an appropriate security tion that is provided to the National Cybersecu- tion. In effect, the legislation removes critical clearance to receive such cyber threat intel- rity and Communications Integration Center of incentives for industry to act reasonably con- ligence; the Department of Homeland Security under cerning cyber threat information. ‘‘(B) shared consistent with the need to pro- subparagraph (A) or paragraph (1) may request Consider a situation in which a tele- tect the national security of the United States; the head of such Center to, and the head of communications company through its oper- and such Center may, provide such information in ations becomes aware of a cyber threat di- ‘‘(C) used by a certified entity in a manner as close to real time as possible to another de- which protects such cyber threat intelligence rected toward a utility but fails to notify the partment or agency of the Federal Government. from unauthorized disclosure. ‘‘(3) USE AND PROTECTION OF INFORMATION.— critical infrastructure company of the threat, ‘‘(3) SECURITY CLEARANCE APPROVALS.—The Cyber threat information shared in accordance denying the utility the opportunity to engage in Director of National Intelligence shall issue with paragraph (1)— defensive measures and resulting in a cata- guidelines providing that the head of an element ‘‘(A) shall only be shared in accordance with strophic event producing substantial property of the intelligence community may, as the head any restrictions placed on the sharing of such damage and loss of life. Under the legislation, of such element considers necessary to carry out information by the protected entity or self-pro- the telecommunications company character- this subsection— tected entity authorizing such sharing, includ- izing its decision not to notify as one made for ‘‘(A) grant a security clearance on a tem- ing appropriate anonymization or minimization porary or permanent basis to an employee or of- a cybersecurity purpose would be able to of such information and excluding limiting a de- ficer of a certified entity; partment or agency of the Federal Government avoid legal liability. The bill’s exemption from ‘‘(B) grant a security clearance on a tem- from sharing such information with another de- liability should therefore be narrowed to ex- porary or permanent basis to a certified entity partment or agency of the Federal Government clude protection for such decisions. and approval to use appropriate facilities; and in accordance with this section; The cyber threats our nation faces are seri- ‘‘(C) expedite the security clearance process ‘‘(B) may not be used by an entity to gain an ous, and we need to take action. The presi- for a person or entity as the head of such ele- unfair competitive advantage to the detriment of dent’s recent executive order directing the en- ment considers necessary, consistent with the the protected entity or the self-protected entity hanced sharing of cyber threat information by need to protect the national security of the authorizing the sharing of information; United States. the government to industry is a significant step ‘‘(C) may only be used by a non-Federal re- ‘‘(4) NO RIGHT OR BENEFIT.—The provision of cipient of such information for a cybersecurity in the right direction. Legislation encouraging information to a private-sector entity or a util- purpose; information-sharing by the private sector is ity under this subsection shall not create a right ‘‘(D) if shared with the Federal Government— also required, but it must be carefully crafted or benefit to similar information by such entity ‘‘(i) shall be exempt from disclosure under sec- and limited to actual threats. The House or such utility or any other private-sector entity tion 552 of title 5, United States Code (commonly version of CISPA is not the right solution to or utility. known as the ‘Freedom of Information Act’); this real problem, and it must be fixed before ‘‘(5) RESTRICTION ON DISCLOSURE OF CYBER ‘‘(ii) shall be considered proprietary informa- THREAT INTELLIGENCE.—Notwithstanding any it reaches the president’s desk. tion and shall not be disclosed to an entity out- other provision of law, a certified entity receiv- side of the Federal Government except as au- The CHAIR. All time for general de- ing cyber threat intelligence pursuant to this thorized by the entity sharing such information; bate has expired. subsection shall not further disclose such cyber ‘‘(iii) shall not be used by the Federal Govern- Pursuant to the rule, the bill shall be threat intelligence to another entity, other than ment for regulatory purposes; considered for amendment under the 5- to a certified entity or other appropriate agency ‘‘(iv) shall not be provided by the department minute rule. or department of the Federal Government au- or agency of the Federal Government receiving In lieu of the amendment in the na- thorized to receive such cyber threat intel- such cyber threat information to another de- ture of a substitute recommended by ligence. partment or agency of the Federal Government the Permanent Select Committee on ‘‘(b) USE OF CYBERSECURITY SYSTEMS AND under paragraph (2)(A) if— SHARING OF CYBER THREAT INFORMATION.— ‘‘(I) the entity providing such information de- Intelligence, printed in the bill, it shall ‘‘(1) IN GENERAL.— termines that the provision of such information be in order to consider as an original ‘‘(A) CYBERSECURITY PROVIDERS.—Notwith- will undermine the purpose for which such in- bill for the purpose of amendment standing any other provision of law, a cyberse- formation is shared; or under the 5-minute rule an amendment curity provider, with the express consent of a ‘‘(II) unless otherwise directed by the Presi- in the nature of a substitute consisting protected entity for which such cybersecurity dent, the head of the department or agency of of the text of Rules Committee Print provider is providing goods or services for cyber- the Federal Government receiving such cyber 113–7. That amendment in the nature of security purposes, may, for cybersecurity pur- threat information determines that the provision a substitute shall be considered as poses— of such information will undermine the purpose ‘‘(i) use cybersecurity systems to identify and for which such information is shared; and read. obtain cyber threat information to protect the ‘‘(v) shall be handled by the Federal Govern- The text of the amendment in the na- rights and property of such protected entity; ment consistent with the need to protect sources ture of a substitute is as follows: and and methods and the national security of the Be it enacted by the Senate and House of Rep- ‘‘(ii) share such cyber threat information with United States; and resentatives of the United States of America in any other entity designated by such protected ‘‘(E) shall be exempt from disclosure under a Congress assembled, entity, including, if specifically designated, the State, local, or tribal law or regulation that re- H.R. 624 Federal Government. quires public disclosure of information by a pub- ‘‘(B) SELF-PROTECTED ENTITIES.—Notwith- lic or quasi-public entity. SECTION 1. SHORT TITLE. standing any other provision of law, a self-pro- ‘‘(4) EXEMPTION FROM LIABILITY.— This Act may be cited as the ‘‘Cyber Intel- tected entity may, for cybersecurity purposes— ‘‘(A) EXEMPTION.—No civil or criminal cause ligence Sharing and Protection Act’’. ‘‘(i) use cybersecurity systems to identify and of action shall lie or be maintained in Federal or SEC. 2. CYBER THREAT INTELLIGENCE AND IN- obtain cyber threat information to protect the State court against a protected entity, self-pro- FORMATION SHARING. rights and property of such self-protected entity; tected entity, cybersecurity provider, or an offi- (a) IN GENERAL.—Title XI of the National Se- and cer, employee, or agent of a protected entity, curity Act of 1947 (50 U.S.C. 442 et seq.) is ‘‘(ii) share such cyber threat information with self-protected entity, or cybersecurity provider, amended by adding at the end the following any other entity, including the Federal Govern- acting in good faith— new section: ment. ‘‘(i) for using cybersecurity systems to identify ‘‘CYBER THREAT INTELLIGENCE AND INFORMATION ‘‘(2) SHARING WITH THE FEDERAL GOVERN- or obtain cyber threat information or for shar- SHARING MENT.— ing such information in accordance with this ‘‘SEC. 1104. (a) INTELLIGENCE COMMUNITY ‘‘(A) INFORMATION SHARED WITH THE NA- section; or SHARING OF CYBER THREAT INTELLIGENCE WITH TIONAL CYBERSECURITY AND COMMUNICATIONS ‘‘(ii) for decisions made for cybersecurity pur- PRIVATE SECTOR AND UTILITIES.— INTEGRATION CENTER OF THE DEPARTMENT OF poses and based on cyber threat information

VerDate Mar 15 2010 03:14 Apr 18, 2013 Jkt 029060 PO 00000 Frm 00029 Fmt 7634 Sfmt 6333 E:\CR\FM\A17AP7.012 H17APPT1 jbell on DSK7SPTVN1PROD with HOUSE H2098 CONGRESSIONAL RECORD — HOUSE April 17, 2013 identified, obtained, or shared under this sec- ‘‘(E) Firearms sales records. ‘‘(B) the costs of the action together with rea- tion. ‘‘(F) Tax return records. sonable attorney fees as determined by the ‘‘(B) LACK OF GOOD FAITH.—For purposes of ‘‘(G) Educational records. court. the exemption from liability under subpara- ‘‘(H) Medical records. ‘‘(2) VENUE.—An action to enforce liability graph (A), a lack of good faith includes any act ‘‘(5) NOTIFICATION OF NON-CYBER THREAT IN- created under this subsection may be brought in or omission taken with intent to injure, defraud, FORMATION.—If a department or agency of the the district court of the United States in— Federal Government receiving information pur- or otherwise endanger any individual, govern- ‘‘(A) the district in which the complainant re- suant to subsection (b)(1) determines that such ment entity, private entity, or utility. sides; information is not cyber threat information, ‘‘(5) RELATIONSHIP TO OTHER LAWS REQUIRING ‘‘(B) the district in which the principal place such department or agency shall notify the enti- THE DISCLOSURE OF INFORMATION.—The submis- of business of the complainant is located; ty or provider sharing such information pursu- sion of information under this subsection to the ‘‘(C) the district in which the department or Federal Government shall not satisfy or affect— ant to subsection (b)(1). ‘‘(6) RETENTION AND USE OF CYBER THREAT IN- agency of the Federal Government that dis- ‘‘(A) any requirement under any other provi- FORMATION.—No department or agency of the closed the information is located; or sion of law for a person or entity to provide in- Federal Government shall retain or use informa- ‘‘(D) the District of Columbia. formation to the Federal Government; or tion shared pursuant to subsection (b)(1) for ‘‘(3) STATUTE OF LIMITATIONS.—No action ‘‘(B) the applicability of other provisions of any use other than a use permitted under sub- shall lie under this subsection unless such ac- law, including section 552 of title 5, United section (c)(1). tion is commenced not later than two years after States Code (commonly known as the ‘Freedom ‘‘(7) PRIVACY AND CIVIL LIBERTIES.— the date of the violation of subsection (b)(3)(D) of Information Act’), with respect to information ‘‘(A) POLICIES AND PROCEDURES.—The Direc- or subsection (c) that is the basis for the action. required to be provided to the Federal Govern- tor of National Intelligence, in consultation ‘‘(4) EXCLUSIVE CAUSE OF ACTION.—A cause of ment under such other provision of law. with the Secretary of Homeland Security and action under this subsection shall be the exclu- ‘‘(6) RULE OF CONSTRUCTION.—Nothing in this the Attorney General, shall establish and peri- sive means available to a complainant seeking a subsection shall be construed to provide new au- odically review policies and procedures gov- remedy for a violation of subsection (b)(3)(D) or thority to— erning the receipt, retention, use, and disclosure subsection (c). ‘‘(A) a cybersecurity provider to use a cyberse- of non-publicly available cyber threat informa- ‘‘(e) REPORTS ON INFORMATION SHARING.— curity system to identify or obtain cyber threat tion shared with the Federal Government in ac- ‘‘(1) INSPECTOR GENERAL REPORT.—The In- information from a system or network other cordance with subsection (b)(1). Such policies spector General of the Intelligence Community, than a system or network owned or operated by and procedures shall, consistent with the need in consultation with the Inspector General of a protected entity for which such cybersecurity to protect systems and networks from cyber the Department of Justice, the Inspector General provider is providing goods or services for cyber- threats and mitigate cyber threats in a timely of the Department of Defense, and the Privacy security purposes; or manner— and Civil Liberties Oversight Board, shall annu- ‘‘(B) a self-protected entity to use a cybersecu- ‘‘(i) minimize the impact on privacy and civil ally submit to the congressional intelligence rity system to identify or obtain cyber threat in- liberties; committees a report containing a review of the formation from a system or network other than ‘‘(ii) reasonably limit the receipt, retention, use of information shared with the Federal Gov- a system or network owned or operated by such use, and disclosure of cyber threat information ernment under this section, including— self-protected entity. associated with specific persons that is not nec- ‘‘(A) a review of the use by the Federal Gov- ‘‘(c) FEDERAL GOVERNMENT USE OF INFORMA- essary to protect systems or networks from cyber ernment of such information for a purpose other TION.— threats or mitigate cyber threats in a timely than a cybersecurity purpose; ‘‘(1) LIMITATION.—The Federal Government manner; ‘‘(B) a review of the type of information may use cyber threat information shared with ‘‘(iii) include requirements to safeguard non- shared with the Federal Government under this the Federal Government in accordance with publicly available cyber threat information that section; subsection (b)— may be used to identify specific persons from ‘‘(C) a review of the actions taken by the Fed- ‘‘(A) for cybersecurity purposes; unauthorized access or acquisition; ‘‘(B) for the investigation and prosecution of ‘‘(iv) protect the confidentiality of cyber eral Government based on such information; cybersecurity crimes; threat information associated with specific per- ‘‘(D) appropriate metrics to determine the im- ‘‘(C) for the protection of individuals from the sons to the greatest extent practicable; and pact of the sharing of such information with the danger of death or serious bodily harm and the ‘‘(v) not delay or impede the flow of cyber Federal Government on privacy and civil lib- investigation and prosecution of crimes involv- threat information necessary to defend against erties, if any; ing such danger of death or serious bodily harm; or mitigate a cyber threat. ‘‘(E) a list of the departments or agencies re- or ‘‘(B) SUBMISSION TO CONGRESS.—The Director ceiving such information; ‘‘(D) for the protection of minors from child of National Intelligence shall, consistent with ‘‘(F) a review of the sharing of such informa- pornography, any risk of sexual exploitation, the need to protect sources and methods, submit tion within the Federal Government to identify and serious threats to the physical safety of mi- to Congress the policies and procedures required inappropriate stovepiping of shared informa- nors, including kidnapping and trafficking and under subparagraph (A) and any updates to tion; and the investigation and prosecution of crimes in- such policies and procedures. ‘‘(G) any recommendations of the Inspector ‘‘(C) IMPLEMENTATION.—The head of each de- volving child pornography, any risk of sexual General for improvements or modifications to partment or agency of the Federal Government exploitation, and serious threats to the physical the authorities under this section. receiving cyber threat information shared with safety of minors, including kidnapping and traf- ‘‘(2) PRIVACY AND CIVIL LIBERTIES OFFICERS the Federal Government under subsection (b)(1) ficking, and any crime referred to in section REPORT.—The Civil Liberties Protection Officer shall— of the Office of the Director of National Intel- 2258A(a)(2) of title 18, United States Code. ‘‘(i) implement the policies and procedures es- FFIRMATIVE SEARCH RESTRICTION.—The ligence and the Chief Privacy and Civil Lib- ‘‘(2) A tablished under subparagraph (A); and Federal Government may not affirmatively erties Officer of the Department of Justice, in ‘‘(ii) promptly notify the Director of National consultation with the Privacy and Civil Lib- search cyber threat information shared with the Intelligence, the Attorney General, and the con- Federal Government under subsection (b) for a erties Oversight Board, the Inspector General of gressional intelligence committees of any signifi- the Intelligence Community, and the senior pri- purpose other than a purpose referred to in cant violations of such policies and procedures. vacy and civil liberties officer of each depart- paragraph (1). ‘‘(D) OVERSIGHT.—The Director of National ment or agency of the Federal Government that ‘‘(3) ANTI-TASKING RESTRICTION.—Nothing in Intelligence, in consultation with the Attorney this section shall be construed to permit the General, the Secretary of Homeland Security, receives cyber threat information shared with Federal Government to— and the Secretary of Defense, shall establish a the Federal Government under this section, ‘‘(A) require a private-sector entity or utility program to monitor and oversee compliance with shall annually and jointly submit to Congress a to share information with the Federal Govern- the policies and procedures established under report assessing the privacy and civil liberties ment; or subparagraph (A). impact of the activities conducted by the Fed- ‘‘(B) condition the sharing of cyber threat in- ‘‘(d) FEDERAL GOVERNMENT LIABILITY FOR eral Government under this section. Such report telligence with a private-sector entity or utility VIOLATIONS OF RESTRICTIONS ON THE DISCLO- shall include any recommendations the Civil on the provision of cyber threat information to SURE, USE, AND PROTECTION OF VOLUNTARILY Liberties Protection Officer and Chief Privacy the Federal Government. SHARED INFORMATION.— and Civil Liberties Officer consider appropriate ‘‘(4) PROTECTION OF SENSITIVE PERSONAL DOC- ‘‘(1) IN GENERAL.—If a department or agency to minimize or mitigate the privacy and civil lib- UMENTS.—The Federal Government may not use of the Federal Government intentionally or will- erties impact of the sharing of cyber threat in- the following information, containing informa- fully violates subsection (b)(3)(D) or subsection formation under this section. tion that identifies a person, shared with the (c) with respect to the disclosure, use, or protec- ‘‘(3) FORM.—Each report required under para- Federal Government in accordance with sub- tion of voluntarily shared cyber threat informa- graph (1) or (2) shall be submitted in unclassi- section (b) unless such information is used in tion shared under this section, the United States fied form, but may include a classified annex. accordance with the policies and procedures es- shall be liable to a person adversely affected by ‘‘(f) FEDERAL PREEMPTION.—This section su- tablished under paragraph (7): such violation in an amount equal to the sum persedes any statute of a State or political sub- ‘‘(A) Library circulation records. of— division of a State that restricts or otherwise ex- ‘‘(B) Library patron lists. ‘‘(A) the actual damages sustained by the per- pressly regulates an activity authorized under ‘‘(C) Book sales records. son as a result of the violation or $1,000, which- subsection (b). ‘‘(D) Book customer lists. ever is greater; and ‘‘(g) SAVINGS CLAUSES.—

VerDate Mar 15 2010 03:14 Apr 18, 2013 Jkt 029060 PO 00000 Frm 00030 Fmt 7634 Sfmt 6333 E:\CR\FM\A17AP7.010 H17APPT1 jbell on DSK7SPTVN1PROD with HOUSE April 17, 2013 CONGRESSIONAL RECORD — HOUSE H2099

‘‘(1) EXISTING AUTHORITIES.—Nothing in this ‘‘(iv) efforts to gain unauthorized access to a ‘‘(9) CYBERSECURITY SYSTEM.— section shall be construed to limit any other au- system or network of a government or private ‘‘(A) IN GENERAL.—The term ‘cybersecurity thority to use a cybersecurity system or to iden- entity or utility, including to gain such unau- system’ means a system designed or employed to tify, obtain, or share cyber threat intelligence or thorized access for the purpose of exfiltrating ensure the integrity, confidentiality, or avail- cyber threat information. information stored on, processed on, or ability of, or safeguard, a system or network, in- ‘‘(2) LIMITATION ON MILITARY AND INTEL- transiting a system or network of a government cluding protecting a system or network from— LIGENCE COMMUNITY INVOLVEMENT IN PRIVATE or private entity or utility. ‘‘(i) a vulnerability of a system or network; AND PUBLIC SECTOR CYBERSECURITY EFFORTS.— ‘‘(B) EXCLUSION.—Such term does not include ‘‘(ii) a threat to the integrity, confidentiality, Nothing in this section shall be construed to information pertaining to efforts to gain unau- or availability of a system or network or any in- provide additional authority to, or modify an thorized access to a system or network of a gov- formation stored on, processed on, or transiting existing authority of, the Department of Defense ernment or private entity or utility that solely such a system or network; or the National Security Agency or any other involve violations of consumer terms of service ‘‘(iii) efforts to deny access to or degrade, dis- element of the intelligence community to con- or consumer licensing agreements and do not rupt, or destroy a system or network; or ‘‘(iv) efforts to gain unauthorized access to a trol, modify, require, or otherwise direct the cy- otherwise constitute unauthorized access. system or network, including to gain such un- bersecurity efforts of a private-sector entity or a ‘‘(5) CYBER THREAT INTELLIGENCE.— authorized access for the purpose of exfiltrating component of the Federal Government or a ‘‘(A) IN GENERAL.—The term ‘cyber threat in- State, local, or tribal government. telligence’ means intelligence in the possession information stored on, processed on, or ‘‘(3) INFORMATION SHARING RELATIONSHIPS.— of an element of the intelligence community di- transiting a system or network. ‘‘(B) EXCLUSION.—Such term does not include Nothing in this section shall be construed to— rectly pertaining to— a system designed or employed to protect a sys- ‘‘(A) limit or modify an existing information ‘‘(i) a vulnerability of a system or network of tem or network from efforts to gain unauthor- sharing relationship; a government or private entity or utility; ized access to such system or network that solely ‘‘(B) prohibit a new information sharing rela- ‘‘(ii) a threat to the integrity, confidentiality, tionship; involve violations of consumer terms of service or availability of a system or network of a gov- ‘‘(C) require a new information sharing rela- or consumer licensing agreements and do not ernment or private entity or utility or any infor- tionship between the Federal Government and a otherwise constitute unauthorized access. mation stored on, processed on, or transiting private-sector entity or utility; ‘‘(10) INTEGRITY.—The term ‘integrity’ means ‘‘(D) modify the authority of a department or such a system or network; guarding against improper information modi- ‘‘(iii) efforts to deny access to or degrade, dis- agency of the Federal Government to protect fication or destruction, including ensuring in- rupt, or destroy a system or network of a gov- sources and methods and the national security formation nonrepudiation and authenticity. of the United States; or ernment or private entity or utility; or ‘‘(11) PROTECTED ENTITY.—The term ‘protected ‘‘(E) preclude the Federal Government from ‘‘(iv) efforts to gain unauthorized access to a entity’ means an entity, other than an indi- requiring an entity to report significant cyber system or network of a government or private vidual, that contracts with a cybersecurity pro- incidents if authorized or required to do so entity or utility, including to gain such unau- vider for goods or services to be used for cyberse- under another provision of law. thorized access for the purpose of exfiltrating curity purposes. ‘‘(4) LIMITATION ON FEDERAL GOVERNMENT USE information stored on, processed on, or ‘‘(12) SELF-PROTECTED ENTITY.—The term OF CYBERSECURITY SYSTEMS.—Nothing in this transiting a system or network of a government ‘self-protected entity’ means an entity, other section shall be construed to provide additional or private entity or utility. than an individual, that provides goods or serv- authority to, or modify an existing authority of, ‘‘(B) EXCLUSION.—Such term does not include ices for cybersecurity purposes to itself. any entity to use a cybersecurity system owned intelligence pertaining to efforts to gain unau- ‘‘(13) UTILITY.—The term ‘utility’ means an or controlled by the Federal Government on a thorized access to a system or network of a gov- entity providing essential services (other than private-sector system or network to protect such ernment or private entity or utility that solely law enforcement or regulatory services), includ- private-sector system or network. involve violations of consumer terms of service ing electricity, natural gas, propane, tele- ‘‘(5) NO LIABILITY FOR NON-PARTICIPATION.— or consumer licensing agreements and do not communications, transportation, water, or Nothing in this section shall be construed to otherwise constitute unauthorized access. wastewater services.’’. subject a protected entity, self-protected entity, ‘‘(6) CYBERSECURITY CRIME.—The term ‘cyber- (b) PROCEDURES AND GUIDELINES.—The Direc- cyber security provider, or an officer, employee, security crime’ means— tor of National Intelligence shall— or agent of a protected entity, self-protected en- ‘‘(A) a crime under a Federal or State law (1) not later than 60 days after the date of the tity, or cybersecurity provider, to liability for that involves— enactment of this Act, establish procedures choosing not to engage in the voluntary activi- ‘‘(i) efforts to deny access to or degrade, dis- under paragraph (1) of section 1104(a) of the ties authorized under this section. rupt, or destroy a system or network; National Security Act of 1947, as added by sub- ‘‘(6) USE AND RETENTION OF INFORMATION.— ‘‘(ii) efforts to gain unauthorized access to a section (a) of this section, and issue guidelines Nothing in this section shall be construed to au- system or network; or under paragraph (3) of such section 1104(a); thorize, or to modify any existing authority of, ‘‘(iii) efforts to exfiltrate information from a (2) in establishing such procedures and a department or agency of the Federal Govern- system or network without authorization; or issuing such guidelines, consult with the Sec- ment to retain or use information shared pursu- ‘‘(B) the violation of a provision of Federal retary of Homeland Security to ensure that such ant to subsection (b)(1) for any use other than law relating to computer crimes, including a vio- procedures and such guidelines permit the own- a use permitted under subsection (c)(1). lation of any provision of title 18, United States ers and operators of critical infrastructure to re- ‘‘(h) DEFINITIONS.—In this section: Code, created or amended by the Computer ceive all appropriate cyber threat intelligence ‘‘(1) AVAILABILITY.—The term ‘availability’ Fraud and Abuse Act of 1986 (Public Law 99– (as defined in section 1104(h)(5) of such Act, as means ensuring timely and reliable access to 474). added by subsection (a)) in the possession of the and use of information. ‘‘(7) CYBERSECURITY PROVIDER.—The term ‘cy- Federal Government; and ‘‘(2) CERTIFIED ENTITY.—The term ‘certified bersecurity provider’ means a non-Federal enti- (3) following the establishment of such proce- entity’ means a protected entity, self-protected ty that provides goods or services intended to be dures and the issuance of such guidelines, expe- entity, or cybersecurity provider that— used for cybersecurity purposes. ‘‘(A) possesses or is eligible to obtain a secu- ditiously distribute such procedures and such ‘‘(8) CYBERSECURITY PURPOSE.— rity clearance, as determined by the Director of guidelines to appropriate departments and agen- ‘‘(A) IN GENERAL.—The term ‘cybersecurity cies of the Federal Government, private-sector National Intelligence; and purpose’ means the purpose of ensuring the in- ‘‘(B) is able to demonstrate to the Director of entities, and utilities (as defined in section tegrity, confidentiality, or availability of, or National Intelligence that such provider or such 1104(h)(13) of such Act, as added by subsection safeguarding, a system or network, including entity can appropriately protect classified cyber (a)). protecting a system or network from— threat intelligence. (c) PRIVACY AND CIVIL LIBERTIES POLICIES ‘‘(i) a vulnerability of a system or network; ‘‘(3) CONFIDENTIALITY.—The term ‘confiden- AND PROCEDURES.—Not later than 60 days after tiality’ means preserving authorized restrictions ‘‘(ii) a threat to the integrity, confidentiality, the date of the enactment of this Act, the Direc- on access and disclosure, including means for or availability of a system or network or any in- tor of National Intelligence, in consultation protecting personal privacy and proprietary in- formation stored on, processed on, or transiting with the Secretary of Homeland Security and formation. such a system or network; the Attorney General, shall establish the policies ‘‘(4) CYBER THREAT INFORMATION.— ‘‘(iii) efforts to deny access to or degrade, dis- and procedures required under section ‘‘(A) IN GENERAL.—The term ‘cyber threat in- rupt, or destroy a system or network; or 1104(c)(7)(A) of the National Security Act of formation’ means information directly per- ‘‘(iv) efforts to gain unauthorized access to a 1947, as added by subsection (a) of this section. taining to— system or network, including to gain such un- (d) INITIAL REPORTS.—The first reports re- ‘‘(i) a vulnerability of a system or network of authorized access for the purpose of exfiltrating quired to be submitted under paragraphs (1) and a government or private entity or utility; information stored on, processed on, or (2) of subsection (e) of section 1104 of the Na- ‘‘(ii) a threat to the integrity, confidentiality, transiting a system or network. tional Security Act of 1947, as added by sub- or availability of a system or network of a gov- ‘‘(B) EXCLUSION.—Such term does not include section (a) of this section, shall be submitted not ernment or private entity or utility or any infor- the purpose of protecting a system or network later than 1 year after the date of the enactment mation stored on, processed on, or transiting from efforts to gain unauthorized access to such of this Act. such a system or network; system or network that solely involve violations (e) TABLE OF CONTENTS AMENDMENT.—The ‘‘(iii) efforts to deny access to or degrade, dis- of consumer terms of service or consumer licens- table of contents in the first section of the Na- rupt, or destroy a system or network of a gov- ing agreements and do not otherwise constitute tional Security Act of 1947 is amended by adding ernment or private entity or utility; or unauthorized access. at the end the following new item:

VerDate Mar 15 2010 03:14 Apr 18, 2013 Jkt 029060 PO 00000 Frm 00031 Fmt 7634 Sfmt 6333 E:\CR\FM\A17AP7.010 H17APPT1 jbell on DSK7SPTVN1PROD with HOUSE H2100 CONGRESSIONAL RECORD — HOUSE April 17, 2013 ‘‘Sec. 1104. Cyber threat intelligence and in- I yield back the balance of my time. In this particular instance, I believe formation sharing.’’. Mr. ROGERS of Michigan. I yield the concerns raised over the potential SEC. 3. SUNSET. back the balance of my time. unintentional consequences from Effective on the date that is 5 years after the The CHAIR. The question is on the vagueness are real, valid, and ought to date of the enactment of this Act— amendment offered by the gentleman be addressed. I also believe it’s a false (1) section 1104 of the National Security Act of from Michigan (Mr. ROGERS). 1947, as added by section 2(a) of this Act, is re- choice that we must somehow choose pealed; and The question was taken; and the between effective cybersecurity initia- (2) the table of contents in the first section of Chair announced that the ayes ap- tives on the one hand and preserving the National Security Act of 1947, as amended peared to have it. the sacred civil liberties and privacy by section 2(d) of this Act, is amended by strik- Mr. ROGERS of Michigan. Madam rights we hold so dear as a Nation on ing the item relating to section 1104, as added by Chair, I demand a recorded vote. the other. In many cases, defining or such section 2(d). The CHAIR. Pursuant to clause 6 of limiting the scope of authority would The CHAIR. No amendment to that rule XVIII, further proceedings on the go a long way toward addressing the amendment in the nature of a sub- amendment offered by the gentleman privacy concerns that have been raised stitute shall be in order except those from Michigan will be postponed. with respect to this legislation. printed in House Report 113–41. Each AMENDMENT NO. 2 OFFERED BY MR. CONNOLLY To be clear, I want to recognize that such amendment may be offered only The CHAIR. It is now in order to con- the sponsors of CISPA have already en- in the order printed in the report, by a sider amendment No. 2 printed in gaged in good faith efforts to incor- Member designated in the report, shall House Report 113–41. porate and address outstanding con- be considered as read, shall be debat- Mr. CONNOLLY. Madam Chair- cerns with respect to the legislation able for the time specified in the report woman, I have an amendment at the that were held by the administration equally divided and controlled by the desk. and other stakeholders, and I think proponent and an opponent, shall not The CHAIR. The Clerk will designate that needs to be recognized. be subject to amendment, and shall not the amendment. On that note, I am pleased that my be subject to a demand for division of The text of the amendment is as fol- amendment that was made in order the question. lows: represents a straightforward improve- AMENDMENT NO. 1 OFFERED BY MR. ROGERS OF Page 2, line 15, strike ‘‘and’’. ment, I hope, to CISPA that’s con- MICHIGAN Page 2, line 18, strike the period and insert sistent with the sponsor’s stated com- The CHAIR. It is now in order to con- ‘‘; and’’. mitment to enhancing cybersecurity, sider amendment No. 1 printed in Page 2, after line 18, insert the following: safeguarding privacy rights and civil House Report 113–41. ‘‘(D) used, retained, or further disclosed by liberties, and ensuring oversight of ac- Mr. ROGERS of Michigan. Madam a certified entity for cybersecurity pur- tivity. The amendment simply estab- poses.’’. Chair, I have an amendment at the lishes that, with respect to CISPA’s re- desk. The CHAIR. Pursuant to House Reso- quirements, the DNI establish proce- The CHAIR. The Clerk will designate lution 164, the gentleman from Virginia dures to govern the sharing of classi- the amendment. (Mr. CONNOLLY) and a Member opposed fied cyber threat intelligence—that The text of the amendment is as fol- each will control 5 minutes. this classified cyber threat intelligence lows: The Chair recognizes the gentleman may only be used, retained, or further Page 12, beginning line 15, strike ‘‘unless from Virginia. such information is used in accordance with disclosed by a certified entity for cy- Mr. CONNOLLY. Madam Chair- bersecurity purposes. the policies and procedures established under woman, this amendment represents a paragraph (7)’’. As noted by the ACLU in its state- commonsense improvement to H.R. 624, The CHAIR. Pursuant to House Reso- ment of support for the amendment, which I support, that simply narrows it’s consistent with similar restrictions lution 164, the gentleman from Michi- the scope of the authorization for the gan (Mr. ROGERS) and a Member op- limiting the scope of other information intelligence community to share clas- sharing activities addressed in other posed each will control 5 minutes. sified—I stress, classified—cyber threat The Chair recognizes the gentleman parts of the bill. The straightforward intelligence with private sector enti- from Michigan. enhancement will be one of many need- Mr. ROGERS of Michigan. I offer this ties and utilities. ed improvements to the bill that will amendment to ensure that library As my colleagues are aware, the ad- ensure it is a targeted, well-defined bill records, firearm sales records, medical ministration and some leading voices that directly—and only—strengthens records, and tax returns are not in- from the civil liberties and privacy our national cybersecurity. cluded in any information voluntarily rights communities have raised serious With that, I reserve the balance of shared with the government under concerns with CISPA as reported out of my time. CISPA. Though the underlying bill the Permanent Select Committee on Mr. ROGERS of Michigan. Madam would not permit this information un- Intelligence. These concerns revolve Chair, while I do not oppose the amend- less it was cyber threat information, I around the fact that many provisions ment, I ask unanimous consent to will support this amendment, as it is a of CISPA are perhaps perceived as claim the time in opposition. clarification amendment that settles overly vague, or outright silent, with The CHAIR. Without objection, the some Members’ concerns and reflects respect to limiting the scope of infor- gentleman is recognized for 5 minutes. an amendment that was passed last mation sharing and mitigating the risk Mr. ROGERS of Michigan. Madam year overwhelmingly. of unintended consequences. Chair, I do not oppose this amendment, With that, Madam Chair, I urge this For example, section 2 of CISPA, ti- which clarifies that classified intel- body’s support of this clarification tled ‘‘Cyber Threat Intelligence and In- ligence shared by the government with amendment, and I reserve the balance formation Sharing,’’ is silent on what a certified cybersecurity entity may of my time. specific purposes classified cyber only be used, retained, or further dis- Mr. RUPPERSBERGER. Madam threat intelligence may be used, re- closed for cybersecurity purposes. The Chair, I rise to claim the time in oppo- tained, or further disclosed by a cer- amendment is consistent with lan- sition, even though I am not opposed. tified entity. As reported, section 2 guage that is already in the bill requir- The CHAIR. Without objection, the only requires that the DNI’s procedures ing the DNI, the Director of National gentleman from Maryland is recog- governing the sharing of classified Intelligence, to ensure that such classi- nized for 5 minutes. cyber threat intelligence between the fied information is carefully protected. There was no objection. intelligence community and private I appreciate the gentleman’s working Mr. RUPPERSBERGER. I support sector entities be ‘‘consistent with the with us and the ACLU to find an Chairman ROGERS’ amendment to need to protect the national security of amendment that we could all agree on. make a technical change to correct our the United States’’ and used by cer- I do not oppose this further clarifica- personal records provision and retain tified entities ‘‘in a manner which pro- tion and would urge support by this the privacy protections that we had in tects cyber threat intelligence from body of the amendment. our bill upon the introduction. unauthorized disclosure.’’ I reserve the balance of my time.

VerDate Mar 15 2010 03:14 Apr 18, 2013 Jkt 029060 PO 00000 Frm 00032 Fmt 7634 Sfmt 0634 E:\CR\FM\A17AP7.010 H17APPT1 jbell on DSK7SPTVN1PROD with HOUSE April 17, 2013 CONGRESSIONAL RECORD — HOUSE H2101 Mr. CONNOLLY. I would inquire of Mr. ROGERS of Michigan. Madam function. They facilitate nearly every the Chair how much time is remaining. Chair, I demand a recorded vote. aspect of our daily lives. These net- The CHAIR. The gentleman from Vir- The CHAIR. Pursuant to clause 6 of works must be protected as best and ginia has 2 minutes remaining. rule XVIII, further proceedings on the responsibly as possible. Mr. CONNOLLY. Madam Chair- amendment offered by the gentleman I urge my colleagues to support both woman, I yield 1 minute to the distin- from Virginia will be postponed. my amendment and final passage of guished ranking member of the com- AMENDMENT NO. 3 OFFERED BY MR. SCHNEIDER this critically important bill. mittee, the gentleman from Maryland The CHAIR. It is now in order to con- I reserve the balance of my time. (Mr. RUPPERSBERGER). sider amendment No. 3 printed in Mr. ROGERS of Michigan. Madam Chairman, while I do not oppose the b 1540 House Report 113–41. Mr. SCHNEIDER. Madam Chairman, amendment, I ask unanimous consent Mr. RUPPERSBERGER. I thank the I have an amendment at the desk. to control the time in opposition. gentleman for yielding. The CHAIR. The Clerk will designate The CHAIR. Without objection, the This amendment increases the pri- the amendment. gentleman is recognized for 5 minutes. vacy and civil liberties protections in The text of the amendment is as fol- There was no objection. our bill; therefore, I urge a ‘‘yes’’ on lows: Mr. ROGERS of Michigan. Madam Congressman CONNOLLY’s amendment. Page 3, beginning on line 2, strike ‘‘em- Chairman, I will support the clarifica- Mr. ROGERS of Michigan. I continue ployee or officer’’ and insert ‘‘employee, tion in this amendment. to reserve the balance of my time. independent contractor, or officer’’. The amendment clarifies that inde- Mr. CONNOLLY. Madam Chair- The CHAIR. Pursuant to House Reso- pendent contractors are eligible to re- woman, I yield 1 minute to my distin- lution 164, the gentleman from Illinois ceive security clearances to handle guished colleague and our friend from (Mr. SCHNEIDER) and a Member opposed cyber threat intelligence and cyber Georgia (Mr. JOHNSON). each will control 5 minutes. threat information shared under the Mr. JOHNSON of Georgia. Madam The Chair recognizes the gentleman bill, an important clarification amend- Chair, I rise in support of this amend- from Illinois. ment. ment. Mr. SCHNEIDER. Every day, U.S. I appreciate the gentleman’s work I would also argue that, in addition Web sites, databases, and operating and effort in offering this amendment; to it being vague, it’s also overbroad in networks are threatened by foreign And because the bill was not intended that it includes investigations for child governments, criminal organizations, to exclude independent contractors, I pornography and child abductions and and other groups trying to hack into will support this important clarifica- computer crimes. This means that our systems and wreak havoc. tion and would reserve the balance of under CISPA, the NSA could share Daily we read about infiltrations of my time. data with law enforcement to inves- the networks of our banks, newspapers, Mr. SCHNEIDER. I yield such time tigate computer crimes, which is so and even Federal agencies putting sen- as he may consume to the gentleman broad and includes even lying about sitive information at risk. These cyber from California (Mr. SCHIFF). your age on your Facebook page. Are attacks are real, and they can have Mr. SCHIFF. I thank the gentleman these really cyber threats that this bill devastating consequences: billions of for yielding, and I rise in opposition to claims to fix? We must defend against dollars a year in stolen intellectual the overall measure. cyber attacks while protecting the lib- property and the potential to shut There are three concerns that have erties and privacy of Americans. down our power grids and financial sys- been raised by the administration Mr. ROGERS of Michigan. Madam tems. The Cyber Intelligence Sharing about this bill that I share. Chair, I yield myself such time as I and Protection Act gives the private The first is that it does not include a may consume to clarify that this sector the necessary tools to protect provision requiring the private sector doesn’t call for investigations of those itself and its customers against these to make reasonable efforts to remove crimes based on this material, but only cyber attacks. personal information before they share protection of the individuals that Currently, the intelligence commu- it with each other or before they share may—and I want to stress ‘‘may,’’ be- nity has the ability to detect cyber it with the government. This is a bed- cause, again, the PII, the personal threats, but Federal law prohibits the rock necessity for those who are con- identifying information, is stripped sharing of this information with the cerned about the privacy of Americans clean. But in some rare, rare cases, you very companies whose firewalls are who may be implicated in this cyber might find that you have located the under attack. By sharing this informa- sharing. child who has been subjugated to child tion, private companies can actually Second, it’s very important that a ci- pornography. In those cases, you don’t prevent these attacks. vilian agency, like the Department of want to throw that away. There are The amendment I’m offering makes a Homeland Security, be the main in- parents out there begging for us to find small, clarifying change to the under- take—really, the sole intake—for this this child. It’s very rare, it’s excep- lying bill, simply allowing independent domestic data. tional, doesn’t happen often, but in contractors to be eligible for security There was one form of amendment of- that very rare case—and, remember, clearances to perform the critical work fered in Rules to try to address this there’s no personally identifiable infor- of handling cyber threat intelligence. problem yesterday, yet another form of mation. It would allow for the protec- This clarification will allow compa- that amendment that was ultimately tion, not investigation. nies—in particular, small and medium- adopted by Rules, and yet a third form I reserve the balance of my time. sized businesses without the resources of that amendment that was adopted Mr. CONNOLLY. Madam Chair- to employ full-time experts—to hire here this morning. None of us know ex- woman, I just want to thank the distin- the most capable individuals and orga- actly what it does because it has been guished chairman and the distin- nizations to analyze network informa- a moving object. But it is very unclear guished ranking member of the com- tion, coordinate with the Federal Gov- whether this amendment would make a mittee for their leadership and for ernment, and protect ordinary Ameri- civilian agency, such as DHS, the sole their cooperation, and I yield back the cans. intake for this domestic data. It should balance of my time. We cannot allow ourselves to be in a not be a military agency. We shouldn’t Mr. ROGERS of Michigan. Madam situation where the Federal Govern- have the private sector interacting di- Chair, I yield back the balance of my ment has available the information to rectly with a military agency when it time. prevent or mitigate a cyber attack, but comes to domestic data that may in- The CHAIR. The question is on the companies remain defenseless because volve the privacy of the American peo- amendment offered by the gentleman there was no legal framework to share ple. from Virginia (Mr. CONNOLLY). that critical information. Finally, the immunity provisions are The question was taken; and the The networks at risk power our very broad and need to be reined in so Chair announced that the ayes ap- homes, our small businesses, and are as to encourage the private sector to peared to have it. what allow our banking systems to take reasonable steps to make sure it

VerDate Mar 15 2010 03:14 Apr 18, 2013 Jkt 029060 PO 00000 Frm 00033 Fmt 7634 Sfmt 0634 E:\CR\FM\K17AP7.050 H17APPT1 jbell on DSK7SPTVN1PROD with HOUSE H2102 CONGRESSIONAL RECORD — HOUSE April 17, 2013 does not compromise privacy interests sixth of our economy. Keep the govern- more utilities to receive the protec- when it is not necessary to do so to ment out of it. tions built into our bill. In doing so, it protect cybersecurity. That’s what we decided to do. We also makes the language consistent Those three issues still must be ad- came to a very sensible place that pro- with the preemption provision in the dressed. tects that PII, that personal identi- bill. I want to compliment the chairman fying information, and allows the gov- If not amended, this legislation could and the ranking member for the work ernment to stay out of regulating the subject utility districts to additional they have done. They have made a very Internet. requirements if they share threat in- good-faith effort to make progress on I think that’s the right prudent formation, effectively creating a deter- many of these issues and in fact have course. I think most Americans are rent to participation—precisely what made progress, but the bill still falls with us. Certainly the broad specter of we want to avoid. We know that myr- short and I must urge a ‘‘no’’ vote. industries who have joined this, from iad threats are arrayed against the net- Mr. SCHNEIDER. Madam Chairman, the high-tech industry to the financial works that run our critical infrastruc- may I inquire as to how much time I services to manufacturing, have said, ture, and we must ensure that the util- have remaining. This is the right way to go. You stay ities, which are the front lines in the The CHAIR. The gentleman from Illi- out of our business. We’ll share with cybersecurity fight, are properly pro- nois has 2 minutes remaining. you when we’re victims of a crime. tected. I have long advocated for minimum Mr. SCHNEIDER. I yield such time With that, I reserve the balance of standards for utilities, but absent such as he may consume to the ranking my time. standards, I believe that we have to member. Mr. SCHNEIDER. Madam Chairman, make sure that as many utilities as Mr. RUPPERSBERGER. Madam I just want to thank the ranking mem- possible have access to the best pos- Chair, our bill now enables companies ber and the chairman for the way you sible information to defend their net- have approached this in a bipartisan ef- and the government to have the option works and are able to share informa- fort, and I yield back the balance of my to hire independent contractors to han- tion about the attacks that they expe- dle cyber threat information. It helps time. rience. bring talented people into our cyberse- Mr. ROGERS of Michigan. I yield This is an important bill overall. I curity workforce; it provides jobs; it is back the balance of my time. really do want to applaud, again, good for our economy; and it is good The CHAIR. The question is on the Chairman ROGERS and Ranking Mem- for our national security. Therefore, I amendment offered by the gentleman ber RUPPERSBERGER for their out- urge a ‘‘yes’’ vote on this amendment. from Illinois (Mr. SCHNEIDER). standing work on the underlying bill. I also want to acknowledge Congress- The amendment was agreed to. Obviously, the challenges of the man SCHNEIDER for his involvement in AMENDMENT NO. 4 OFFERED BY MR. LANGEVIN threats that we face in cyberspace are this issue. The CHAIR. It is now in order to con- growing exponentially every day. It Mr. SCHNEIDER. I reserve the bal- sider amendment No. 4 printed in seems like there’s not a week that goes ance of my time. House Report 113–41. by that you don’t hear of a new major Mr. ROGERS of Michigan. I yield Mr. LANGEVIN. Madam Chair, I rise attack on the critical infrastructure myself such time as I may consume. to offer an amendment, No. 35, listed as or, in particular, our banking system I just want to address my friend from No. 4 in the rule. or major corporations with intellectual California, who is a thoughtful member The CHAIR. The Clerk will designate property theft, and obviously we have of the intelligence community. the amendment. got to take action and do so now. Fail- This is a position that much has been The text of the amendment is as fol- ure to do so would be a great abdica- debated about: Should the government lows: tion of our responsibility. regulate into the private sector their Page 8, line 16, strike ‘‘a State, local, or I’m disappointed the bill didn’t pass use of the Internet? I argue that is a tribal law or regulation’’ and insert ‘‘a law last year. I know how hard the chair- dangerous place to go. They will have or regulation of a State, political subdivision man and ranking member worked on to promulgate rules; they will have to of a State, or a tribe’’. this legislation, but clearly our adver- set what reasonable standards are; The CHAIR. Pursuant to House Reso- saries, or enemies, have not taken a hi- they will have to determine what the lution 164, the gentleman from Rhode atus. They are actively engaged in private sector does on the Internet. Island (Mr. LANGEVIN) and a Member cyber attacks or threats of intellectual That’s government in the Internet. One opposed each will control 5 minutes. property or identity theft, and the list of the things that we decided to avoid The Chair recognizes the gentleman goes on and on. in this bill was not to make that man- from Rhode Island. The underlying bill is a major step forward in protecting our cyber net- date, the burden to make sure that no Mr. LANGEVIN. Madam Chair, I works, allowing classified information PII, personal identifying information, yield myself such time as I may con- to be shared with the private sector, al- is mandated in this bill; and it’s sume. lowing threat information to be shared stripped out at the place where the My amendment ensures that utility districts are not unnecessarily and un- back with the government to give burden should be: on the government. broader situation awareness, as well as To make sure it happens, we have four intentionally limited from protecting their own information and ultimately information sharing between both in different layers of oversight built in the private sector among companies. just to make sure what we say that will lead to a broader and more effec- tive information sharing structure, So, again, the underlying bill is a they’re supposed to do according to the major step forward. I believe this leading to better cybersecurity across law, they follow the law—four levels of amendment that I’m offering makes all critical infrastructure. Specifically, review. the bill even better for making sure the amendment replaces the word that broader utilities are included in b 1550 ‘‘local,’’ which is typically interpreted allowing for information sharing. We shouldn’t put the burden on the to mean city, town, and county by the I urge my colleagues to support this victims. We don’t do it if somebody courts. commonsense amendment and the un- sticks a gun in your face on the street Such a definition, I believe, could po- derlying legislation, and I reserve the or robs the bank or robs your home. tentially leave out special districts balance of my time. What’s the difference if they’re robbing that provide utility services, like the Mr. ROGERS of Michigan. Madam your Internet or stealing your blue- Salt River Project, the Central Arizona Chair, while I do not oppose the amend- prints that steals American jobs? The Project, the Metropolitan Water Dis- ment, I ask unanimous consent to con- difference? There is none. Theft is trict of Southern California, and other trol the time in opposition. theft. smaller special districts. The CHAIR. Without objection, the Let us not move to get the govern- My amendment, Madam Chair, which gentleman is recognized for 5 minutes. ment into regulating. Aspects of the is supported by the American Public Mr. ROGERS of Michigan. Madam Internet between private to private has Power Association, changes the bill to Chair, I yield myself such time as I been the explosion of growth in one- read, ‘‘political subdivision,’’ allowing may consume.

VerDate Mar 15 2010 03:14 Apr 18, 2013 Jkt 029060 PO 00000 Frm 00034 Fmt 7634 Sfmt 0634 E:\CR\FM\K17AP7.053 H17APPT1 jbell on DSK7SPTVN1PROD with HOUSE April 17, 2013 CONGRESSIONAL RECORD — HOUSE H2103 I want to thank the gentleman from With that, I urge my colleagues to intelligence community and cybersecu- Rhode Island (Mr. LANGEVIN), who has support the amendment, and I yield rity entities, and for other purposes, been a tremendous leader on cybersecu- back the balance of my time. with Mr. MARCHANT (Acting Chair) in rity efforts on the Intelligence Com- Mr. ROGERS of Michigan. I yield the chair. mittee. Much of our work there is clas- back the balance of my time. The Clerk read the title of the bill. sified and it goes unnoticed, and right- The CHAIR. The question is on the The Acting CHAIR. When the Com- ly so. I think it would be wrong for us amendment offered by the gentleman mittee of the Whole rose earlier today, not to commend in public your great from Rhode Island (Mr. LANGEVIN). a request for a recorded vote on amend- leadership and efforts and work with us The question was taken; and the ment No. 4 printed in House Report to try to make sure that this bill does Chair announced that the ayes ap- 113–41 offered by the gentleman from what we say we want it to do. It has peared to have it. Rhode Island (Mr. LANGEVIN) had been been a great privilege and pleasure to Mr. ROGERS of Michigan. Madam postponed. work with you throughout that proc- Chair, I demand a recorded vote. Pursuant to clause 6 of rule XVIII, ess, and without that leadership, we The CHAIR. Pursuant to clause 6 of proceedings will now resume on those wouldn’t be standing on the floor rule XVIII, further proceedings on the amendments printed in House Report today. I want to thank the gentleman amendment offered by the gentleman 113–41 on which further proceedings for that. from Rhode Island will be postponed. were postponed, in the following order: I will support the amendment, which b 1600 Amendment No. 1 by Mr. ROGERS of clarifies that entities located across Michigan. Mr. ROGERS of Michigan. Madam multiple localities are intended to be Amendment No. 2 by Mr. CONNOLLY covered by provisions in the bill ex- Chair, I move that the Committee do of Virginia. now rise. empting information shared under the Amendment No. 4 by Mr. LANGEVIN of The motion was agreed to. bill from certain disclosures otherwise Rhode Island. Accordingly, the Committee rose; required of public or quasi-public enti- The Chair will reduce to 2 minutes and the Speaker pro tempore (Mr. ties. The amendment replaces the term the minimum time for any electronic MARCHANT) having assumed the chair, ‘‘local’’ with ‘‘political subdivision.’’ vote after the first vote in this series. Because there is no intention to ex- Ms. ROS-LEHTINEN, Chair of the Com- clude such entities, this is intended as mittee of the Whole House on the state AMENDMENT NO. 1 OFFERED BY MR. ROGERS OF MICHIGAN a clarification, an important clarifica- of the Union, reported that that Com- tion, and I will gladly support the mittee, having had under consideration The Acting CHAIR. The unfinished amendment, and again thank the gen- the bill (H.R. 624) to provide for the business is the demand for a recorded tleman for his work on the totality of sharing of certain cyber threat intel- vote on the amendment offered by the both national security issues and cy- ligence and cyber threat information gentleman from Michigan (Mr. ROGERS) bersecurity. between the intelligence community on which further proceedings were I reserve the balance of my time. and cybersecurity entities, and for postponed and on which the ayes pre- Mr. LANGEVIN. Madam Chair, I other purposes, had come to no resolu- vailed by voice vote. yield such time as he may consume to tion thereon. The Clerk will redesignate the amendment. the ranking member of the Intelligence f Committee, the gentleman from Mary- The Clerk redesignated the amend- land (Mr. RUPPERSBERGER). RECESS ment. Mr. RUPPERSBERGER. I thank the The SPEAKER pro tempore. Pursu- RECORDED VOTE gentleman for yielding. ant to clause 12(a) of rule I, the Chair The Acting CHAIR. A recorded vote Madam Chair, first, I want to agree declares the House in recess subject to has been demanded. with our chairman, and I said it before, the call of the Chair. A recorded vote was ordered. that you have been one of the key play- Accordingly (at 4 o’clock and 1 The vote was taken by electronic de- ers in developing legislation to protect minute p.m.), the House stood in re- vice, and there were—ayes 418, noes 0, our country. From the beginning, when cess. not voting 14, as follows: those of us started working on this f [Roll No. 110] issue, probably 2006, you were there. AYES—418 You have a tremendous amount of ex- b 1630 pertise. You have been a great adviser Aderholt Bucshon Cook AFTER RECESS Alexander Burgess Cooper to all of us, and also not only the Intel- Amash Bustos Costa ligence Committee, but the Armed The recess having expired, the House Amodei Butterfield Cotton Services Committee, and I appreciate was called to order by the Speaker pro Andrews Calvert Courtney tempore (Mr. HARRIS) at 4 o’clock and Bachus Camp Cramer all your work. Barber Campbell Crawford I also support your amendment to in- 30 minutes p.m. Barletta Cantor Crenshaw clude political subdivisions within the f Barr Capito Crowley information, use, and protection re- Barrow (GA) Capps Cuellar Barton Capuano Culberson quirements in our bill. Your amend- CYBER INTELLIGENCE SHARING AND PROTECTION ACT Bass Ca´ rdenas Cummings ment ensures that utility districts are Beatty Carney Daines not unnecessarily and unintentionally The SPEAKER pro tempore. Pursu- Becerra Carson (IN) Davis (CA) ant to House Resolution 164 and rule Benishek Carter Davis, Danny limited from protecting their own in- Bentivolio Cartwright Davis, Rodney formation. XVIII, the Chair declares the House in Bera (CA) Cassidy DeFazio Therefore, I urge a ‘‘yes’’ vote on the Committee of the Whole House on Bilirakis Castor (FL) DeGette your amendment. the state of the Union for the further Bishop (GA) Castro (TX) Delaney Bishop (NY) Chabot DeLauro Mr. LANGEVIN. Madam Chair, be- consideration of the bill, H.R. 624. Bishop (UT) Chaffetz DelBene fore I close, I just wanted to thank, Will the gentleman from Texas (Mr. Black Chu Denham again, the chairman and the ranking MARCHANT) kindly take the chair. Blumenauer Cicilline Dent member for their comments, but, more Bonamici Clarke DeSantis b 1631 Bonner Clay DesJarlais importantly, their extraordinary col- Boustany Cleaver Deutch laborative work in trying to protect IN THE COMMITTEE OF THE WHOLE Brady (PA) Clyburn Diaz-Balart our Nation’s cybersecurity. The work Accordingly, the House resolved Brady (TX) Coble Dingell Braley (IA) Coffman Doggett that they did in putting this legisla- itself into the Committee of the Whole Bridenstine Cohen Doyle tion together, it is a real service to the House on the state of the Union for the Brooks (AL) Cole Duckworth country what you have done, and I am further consideration of the bill (H.R. Brooks (IN) Collins (GA) Duffy grateful to have played a part in it 624) to provide for the sharing of cer- Broun (GA) Collins (NY) Duncan (SC) Brown (FL) Conaway Duncan (TN) with you, and thank you for your tain cyber threat intelligence and Brownley (CA) Connolly Edwards friendship. cyber threat information between the Buchanan Conyers Ellison

VerDate Mar 15 2010 03:17 Apr 18, 2013 Jkt 029060 PO 00000 Frm 00035 Fmt 7634 Sfmt 0634 E:\CR\FM\K17AP7.057 H17APPT1 jbell on DSK7SPTVN1PROD with HOUSE H2104 CONGRESSIONAL RECORD — HOUSE April 17, 2013 Ellmers LaMalfa Price (NC) Weber (TX) Wilson (FL) Yoder Forbes LoBiondo Roby Engel Lamborn Quigley Webster (FL) Wilson (SC) Yoho Fortenberry Loebsack Roe (TN) Enyart Lance Radel Welch Wittman Young (AK) Foster Lofgren Rogers (AL) Eshoo Langevin Rahall Wenstrup Wolf Young (FL) Foxx Long Rogers (KY) Esty Lankford Rangel Westmoreland Womack Young (IN) Frankel (FL) Lowenthal Rogers (MI) Farenthold Larsen (WA) Reed Whitfield Woodall Franks (AZ) Lowey Rohrabacher Farr Larson (CT) Reichert Williams Yarmuth Frelinghuysen Lucas Rokita Fattah Latham Renacci Fudge Luetkemeyer Rooney Fincher Latta Ribble NOT VOTING—14 Gabbard Lujan Grisham Ros-Lehtinen Fitzpatrick Lee (CA) Rice (SC) Bachmann Kennedy Nugent Gallego (NM) Roskam Fleischmann Levin Richmond Blackburn Lynch Rush Garamendi Luja´ n, Ben Ray Ross Fleming Lewis Rigell Green, Gene Markey Shimkus Garcia (NM) Rothfus Flores Lipinski Roby Holding Miller, Gary Tsongas Gardner Lummis Roybal-Allard Forbes LoBiondo Roe (TN) Jackson Lee Moore Garrett Maffei Royce Fortenberry Loebsack Rogers (AL) Gerlach Maloney, Ruiz Foster Lofgren Rogers (KY) Gibbs Carolyn Runyan Foxx Long Rogers (MI) b 1656 Gibson Maloney, Sean Ruppersberger Frankel (FL) Lowenthal Rohrabacher Mrs. LOWEY and Mr. RANGEL Gingrey (GA) Marchant Ryan (OH) Franks (AZ) Lowey Rokita Gohmert Marino Ryan (WI) Frelinghuysen Lucas Rooney changed their vote from ‘‘no’’ to ‘‘aye.’’ Goodlatte Massie Salmon Fudge Luetkemeyer Ros-Lehtinen So the amendment was agreed to. Gosar Matheson Sa´ nchez, Linda Gabbard Lujan Grisham Roskam The result of the vote was announced Gowdy Matsui T. Gallego (NM) Ross as above recorded. Granger McCarthy (CA) Sanchez, Loretta Garamendi Luja´ n, Ben Ray Rothfus Graves (MO) McCarthy (NY) Sarbanes Garcia (NM) Roybal-Allard Stated for: Grayson McCaul Scalise Gardner Lummis Royce Mr. GENE GREEN of Texas. Mr. Chair, on Green, Al McClintock Schakowsky Garrett Maffei Ruiz rollcall No. 110, had I been present, I would Green, Gene McCollum Schiff Gerlach Maloney, Runyan have voted ‘‘aye.’’ Griffin (AR) McDermott Schneider Gibbs Carolyn Ruppersberger Griffith (VA) McGovern Schock Gibson Maloney, Sean Ryan (OH) AMENDMENT NO. 2 OFFERED BY MR. CONNOLLY Grijalva McHenry Schrader Gingrey (GA) Marchant Ryan (WI) The Acting CHAIR. The unfinished Grimm McIntyre Schwartz Gohmert Marino Salmon Guthrie McKeon Schweikert Goodlatte Massie Sa´ nchez, Linda business is the demand for a recorded Gutierrez McKinley Scott (VA) Gosar Matheson T. vote on the amendment offered by the Hahn McMorris Scott, Austin Gowdy Matsui Sanchez, Loretta gentleman from Virginia (Mr. CON- Hall Rodgers Scott, David Granger McCarthy (CA) Sarbanes NOLLY) on which further proceedings Hanabusa McNerney Sensenbrenner Graves (GA) McCarthy (NY) Scalise Hanna Meadows Serrano Graves (MO) McCaul Schakowsky were postponed and on which the ayes Harper Meehan Sessions Grayson McClintock Schiff prevailed by voice vote. Harris Meeks Sewell (AL) Green, Al McCollum Schneider The Clerk will redesignate the Hartzler Meng Shea-Porter Griffin (AR) McDermott Schock amendment. Hastings (FL) Messer Sherman Griffith (VA) McGovern Schrader Hastings (WA) Mica Shuster Grijalva McHenry Schwartz The Clerk redesignated the amend- Heck (NV) Michaud Simpson Grimm McIntyre Schweikert ment. Heck (WA) Miller (FL) Sinema McKeon Miller (MI) Guthrie Scott (VA) RECORDED VOTE Hensarling Sires Gutierrez McKinley Scott, Austin Herrera Beutler Miller, George Slaughter Hahn McMorris Scott, David The Acting CHAIR. A recorded vote Higgins Moore Smith (NE) Hall Rodgers Sensenbrenner has been demanded. Himes Moran Smith (NJ) Hanabusa McNerney Serrano A recorded vote was ordered. Hinojosa Mullin Smith (TX) Hanna Meadows Sessions Holt Mulvaney Smith (WA) Harper Meehan Sewell (AL) The Acting CHAIR. This will be a 2- Honda Murphy (FL) Southerland Harris Meeks Shea-Porter minute vote. Horsford Murphy (PA) Speier Hartzler Meng Sherman The vote was taken by electronic de- Hoyer Nadler Stewart Hastings (FL) Messer Shuster vice, and there were—ayes 418, noes 0, Hudson Napolitano Stivers Hastings (WA) Mica Simpson Huelskamp Neal Stockman Heck (NV) Michaud Sinema not voting 14, as follows: Huffman Negrete McLeod Stutzman Heck (WA) Miller (FL) Sires [Roll No. 111] Huizenga (MI) Neugebauer Swalwell (CA) Hensarling Miller (MI) Slaughter Hultgren Noem Takano Herrera Beutler Miller, George Smith (NE) AYES—418 Hunter Nolan Terry Higgins Moran Smith (NJ) Aderholt Camp Cuellar Hurt Nunes Thompson (CA) Himes Mullin Smith (TX) Alexander Campbell Culberson Israel Nunnelee Thompson (MS) Hinojosa Mulvaney Smith (WA) Amash Cantor Cummings Issa O’Rourke Thompson (PA) Holt Murphy (FL) Southerland Amodei Capito Daines Jeffries Olson Thornberry Honda Murphy (PA) Speier Andrews Capps Davis (CA) Jenkins Owens Tiberi Horsford Nadler Stewart Bachus Capuano Davis, Danny Johnson (GA) Palazzo Tierney Hoyer Napolitano Stivers Barber Ca´ rdenas Davis, Rodney Johnson (OH) Pallone Tipton Hudson Neal Stockman Barletta Carney DeFazio Johnson, E. B. Pascrell Titus Huelskamp Negrete McLeod Stutzman Barr Carson (IN) DeGette Johnson, Sam Pastor (AZ) Tonko Huffman Neugebauer Swalwell (CA) Barrow (GA) Carter Delaney Jones Paulsen Turner Huizenga (MI) Noem Takano Barton Cartwright DeLauro Jordan Payne Upton Hultgren Nolan Terry Bass Cassidy DelBene Joyce Pearce Valadao Hunter Nunes Thompson (CA) Beatty Castor (FL) Denham Kaptur Pelosi Van Hollen Hurt Nunnelee Thompson (MS) Becerra Castro (TX) Dent Keating Perlmutter Vargas Israel O’Rourke Thompson (PA) Benishek Chabot DeSantis Kelly (IL) Perry Veasey Issa Olson Thornberry Bentivolio Chaffetz DesJarlais Kelly (PA) Peters (CA) Vela Jeffries Owens Tiberi Bera (CA) Chu Deutch Kildee Peters (MI) Vela´ zquez Jenkins Palazzo Tierney Bilirakis Cicilline Diaz-Balart Kilmer Peterson Visclosky Johnson (GA) Pallone Tipton Bishop (GA) Clarke Dingell Kind Petri Wagner Johnson (OH) Pascrell Titus Bishop (NY) Clay Doggett King (IA) Pingree (ME) Walberg Johnson, E. B. Pastor (AZ) Tonko Black Cleaver Doyle King (NY) Pittenger Walden Johnson, Sam Paulsen Turner Blumenauer Clyburn Duckworth Kingston Pitts Walorski Jones Payne Upton Bonamici Coble Duffy Kinzinger (IL) Pocan Walz Jordan Pearce Valadao Bonner Coffman Duncan (SC) Kirkpatrick Poe (TX) Wasserman Joyce Pelosi Van Hollen Boustany Cohen Duncan (TN) Kline Polis Schultz Kaptur Perlmutter Vargas Brady (PA) Cole Edwards Kuster Pompeo Waters Keating Perry Veasey Brady (TX) Collins (GA) Ellison Labrador Posey Watt Kelly (IL) Peters (CA) Vela Braley (IA) Collins (NY) Ellmers LaMalfa Price (GA) Waxman Kelly (PA) Peters (MI) Vela´ zquez Bridenstine Conaway Engel Lamborn Price (NC) Weber (TX) Kildee Peterson Visclosky Brooks (AL) Connolly Enyart Lance Quigley Webster (FL) Kilmer Petri Wagner Brooks (IN) Conyers Eshoo Langevin Radel Welch Kind Pingree (ME) Walberg Broun (GA) Cook Esty Lankford Rahall Wenstrup King (IA) Pittenger Walden Brown (FL) Cooper Farenthold Larsen (WA) Rangel Westmoreland King (NY) Pitts Walorski Brownley (CA) Costa Farr Larson (CT) Reed Whitfield Kingston Pocan Walz Buchanan Cotton Fattah Latham Reichert Williams Kinzinger (IL) Poe (TX) Wasserman Bucshon Courtney Fincher Latta Renacci Wilson (FL) Kirkpatrick Polis Schultz Burgess Cramer Fitzpatrick Lee (CA) Ribble Wilson (SC) Kline Pompeo Waters Bustos Crawford Fleischmann Levin Rice (SC) Wittman Kuster Posey Watt Butterfield Crenshaw Fleming Lewis Richmond Wolf Labrador Price (GA) Waxman Calvert Crowley Flores Lipinski Rigell Womack

VerDate Mar 15 2010 03:17 Apr 18, 2013 Jkt 029060 PO 00000 Frm 00036 Fmt 7634 Sfmt 0634 E:\CR\FM\A17AP7.016 H17APPT1 jbell on DSK7SPTVN1PROD with HOUSE April 17, 2013 CONGRESSIONAL RECORD — HOUSE H2105 Woodall Yoho Young (IN) Harper McGovern Ryan (OH) b 1707 Yarmuth Young (AK) Harris McHenry Ryan (WI) Yoder Young (FL) Hartzler McIntyre Salmon So the amendment was agreed to. Hastings (FL) McKeon Sa´ nchez, Linda The result of the vote was announced NOT VOTING—14 Hastings (WA) McKinley T. as above recorded. Bachmann Jackson Lee Nugent Heck (NV) McMorris Sanchez, Loretta PERSONAL EXPLANATION Bishop (UT) Kennedy Rush Heck (WA) Rodgers Sarbanes Blackburn Lynch Shimkus Hensarling McNerney Scalise Mrs. BACHMANN. Mr. Chair, on April 17, Graves (GA) Markey Tsongas Herrera Beutler Meadows Schakowsky 2013, I was not able to vote on rollcall votes Holding Miller, Gary Higgins Meehan Schiff Himes Meeks Schneider 110, 111 and 112. At the time, I was per- forming my duties as a designee of the U.S. b 1701 Hinojosa Meng Schock Holt Messer Schrader House of Representatives attending the fu- So the amendment was agreed to. Honda Mica Schwartz neral of Baroness Margaret Thatcher in Lon- The result of the vote was announced Horsford Michaud Schweikert Hoyer Miller (FL) Scott (VA) don. Had I been present for the vote, I would as above recorded. Hudson Miller (MI) Scott, Austin have voted ‘‘aye’’ on all three votes. AMENDMENT NO. 4 OFFERED BY MR. LANGEVIN Huelskamp Miller, George Sensenbrenner Mr. SESSIONS. Mr. Chairman, I The Acting CHAIR. The unfinished Huffman Moore Serrano move that the Committee do now rise. Huizenga (MI) Moran Sessions The motion was agreed to. business is the demand for a recorded Hultgren Mulvaney Sewell (AL) vote on the amendment offered by the Hunter Murphy (FL) Shea-Porter Accordingly, the Committee rose; gentleman from Rhode Island (Mr. Hurt Murphy (PA) Sherman and the Speaker pro tempore (Mrs. Israel Nadler Shuster LANGEVIN) on which further pro- WAGNER) having assumed the chair, Napolitano Simpson Issa Mr. MARCHANT, Acting Chair of the ceedings were postponed and on which Jeffries Neal Sinema the ayes prevailed by voice vote. Jenkins Negrete McLeod Sires Committee of the Whole House on the The Clerk will redesignate the Johnson (GA) Neugebauer Slaughter state of the Union, reported that that Johnson (OH) Noem Smith (NE) Committee, having had under consider- amendment. Johnson, E. B. Nolan Smith (NJ) The Clerk redesignated the amend- Johnson, Sam Nunes Smith (TX) ation the bill (H.R. 624) to provide for ment. Jones Nunnelee Smith (WA) the sharing of certain cyber threat in- Jordan O’Rourke Southerland RECORDED VOTE telligence and cyber threat informa- Joyce Olson Speier tion between the intelligence commu- The Acting CHAIR. A recorded vote Kaptur Owens Stewart nity and cybersecurity entities, and for has been demanded. Keating Palazzo Stockman Kelly (IL) Pallone Stutzman other purposes, had come to no resolu- A recorded vote was ordered. Kelly (PA) Pascrell Swalwell (CA) tion thereon. The Acting CHAIR. This is a 2- Kildee Pastor (AZ) Takano minute vote. Kilmer Paulsen Terry f The vote was taken by electronic de- Kind Payne Thompson (CA) King (IA) Pearce Thompson (MS) b 1710 vice, and there were—ayes 411, noes 3, King (NY) Pelosi Thompson (PA) HOUR OF MEETING ON TOMORROW not voting 18, as follows: Kingston Perlmutter Thornberry [Roll No. 112] Kinzinger (IL) Perry Tiberi Mr. COLLINS of Georgia. Madam Kirkpatrick Peters (CA) Tierney Speaker, I ask unanimous consent that AYES—411 Kline Peters (MI) Tipton Kuster Peterson Titus when the House adjourns today, it ad- Aderholt Castor (FL) Duncan (TN) journ to meet at 10 a.m. tomorrow. Alexander Castro (TX) Edwards Labrador Petri Tonko Amodei Chabot Ellison LaMalfa Pingree (ME) Turner The SPEAKER pro tempore. Is there Andrews Chaffetz Ellmers Lamborn Pittenger Upton objection to the request of the gen- Bachus Chu Engel Lance Pitts Valadao Langevin Pocan Van Hollen tleman from Georgia? Barber Cicilline Enyart There was no objection. Barletta Clarke Eshoo Lankford Poe (TX) Vargas Barr Clay Esty Larsen (WA) Polis Veasey f Barrow (GA) Cleaver Farenthold Larson (CT) Pompeo Vela Barton Clyburn Farr Latham Posey Vela´ zquez APPOINTMENT AS MEMBER TO Bass Coble Fincher Latta Price (GA) Visclosky WORLD WAR I CENTENNIAL COM- Beatty Coffman Fitzpatrick Lee (CA) Price (NC) Wagner MISSION Becerra Cohen Fleischmann Levin Quigley Walberg Benishek Cole Fleming Lipinski Radel Walden The SPEAKER pro tempore. The Bentivolio Collins (GA) Flores LoBiondo Rahall Walorski Chair announces the Speaker’s ap- Bera (CA) Collins (NY) Forbes Loebsack Rangel Walz Bilirakis Conaway Fortenberry Lofgren Reed Wasserman pointment, pursuant to section 4(b) of Bishop (GA) Connolly Foster Long Reichert Schultz the World War I Centennial Commis- Bishop (NY) Conyers Foxx Lowenthal Renacci Waters sion Act (Public Law 112–272), and the Lowey Ribble Watt Bishop (UT) Cook Frankel (FL) order of the House of January 3, 2013, of Black Cooper Franks (AZ) Luetkemeyer Rice (SC) Waxman Blumenauer Costa Frelinghuysen Lujan Grisham Richmond Weber (TX) the following individual on the part of Bonamici Cotton Fudge (NM) Rigell Webster (FL) the House to the World War I Centen- Bonner Courtney Gabbard Luja´ n, Ben Ray Roby Welch (NM) Roe (TN) Wenstrup nial Commission: Boustany Cramer Gallego Colonel Thomas N. Moe, Retired, Brady (PA) Crawford Garamendi Lummis Rogers (AL) Westmoreland Brady (TX) Crenshaw Garcia Maffei Rogers (KY) Whitfield Lancaster, Ohio Maloney, Rogers (MI) Williams Braley (IA) Crowley Gardner f Bridenstine Cuellar Garrett Carolyn Rohrabacher Wilson (FL) Brooks (AL) Culberson Gerlach Maloney, Sean Rokita Wilson (SC) PERSONAL EXPLANATION Brooks (IN) Cummings Gibbs Marchant Rooney Wittman Broun (GA) Daines Gibson Marino Ros-Lehtinen Wolf Ms. JACKSON LEE. Madam Speaker, Brown (FL) Davis (CA) Gingrey (GA) Massie Roskam Womack I was unavoidably detained with meet- Brownley (CA) Davis, Danny Goodlatte Matheson Ross Woodall Matsui Rothfus Yarmuth ings in my office. Had I been present, I Buchanan Davis, Rodney Gosar would have voted ‘‘aye’’ on the Rogers Bucshon DeFazio Gowdy McCarthy (CA) Roybal-Allard Yoder Burgess DeGette Granger McCarthy (NY) Royce Yoho amendment, ‘‘aye’’ on the Connolly Bustos Delaney Graves (GA) McCaul Ruiz Young (AK) amendment, and ‘‘aye’’ on the Lan- McCollum Runyan Young (FL) Butterfield DeLauro Graves (MO) gevin amendment to the underlying Calvert DelBene Grayson McDermott Ruppersberger Young (IN) Camp Denham Green, Al legislation, H.R. 624. Campbell Dent Green, Gene NOES—3 f Cantor DeSantis Griffin (AR) Amash Gohmert McClintock Capito DesJarlais Griffith (VA) COMMEMORATING 100TH ANNIVER- Capps Deutch Grijalva NOT VOTING—18 SARY OF THE CONGRESSIONAL Capuano Diaz-Balart Grimm RESEARCH SERVICE Ca´ rdenas Dingell Guthrie Bachmann Lewis Nugent Carney Doggett Gutierrez Blackburn Lucas Rush (Mr. THOMPSON of Pennsylvania Carson (IN) Doyle Hahn Fattah Lynch Scott, David asked and was given permission to ad- Carter Duckworth Hall Holding Markey Shimkus Cartwright Duffy Hanabusa Jackson Lee Miller, Gary Stivers dress the House for 1 minute and to re- Cassidy Duncan (SC) Hanna Kennedy Mullin Tsongas vise and extend his remarks.)

VerDate Mar 15 2010 03:17 Apr 18, 2013 Jkt 029060 PO 00000 Frm 00037 Fmt 7634 Sfmt 0634 E:\CR\FM\A17AP7.018 H17APPT1 jbell on DSK7SPTVN1PROD with HOUSE H2106 CONGRESSIONAL RECORD — HOUSE April 17, 2013 Mr. THOMPSON of Pennsylvania. heavy. Our hearts are heavy for those Although its sponsors assure us that Madam Speaker, 100 years ago, Con- who lost their lives in Monday’s un- a person’s Internet data would be gress passed the 1914 Legislative, Exec- speakable act of violence, for those stripped of personal identification, this utive, and Judicial Appropriations Act, who remain in critical condition, for bill then allows this data to be used to which established a separate depart- the parents who lost their 8-year-old prosecute certain Federal crimes. Well, ment within the Library of Congress to son, and for the families whose loved how could they do it? It turns out the serve the legislative and resource needs ones never came home from the Boston Federal Government, having stumbled of the United States Congress. Marathon. upon this evidence, can then seek a The legislation authorized the Li- While our sorrow is great, so, too, is warrant to obtain that personally iden- brary of Congress to ‘‘employ com- our resolve. We’re committed to work- tifying information. petent persons to prepare such indexes, ing with law enforcement officers to That makes it the functional equiva- digests, and compilations of laws as ensure that those responsible are held lent of the ‘‘writs of assistance’’ used may be required for Congress and other accountable, and we are committed to by the English Crown in colonial times. official use.’’ stopping acts of terror on U.S. soil and It is antithetical to the Fourth Amend- In 1946, the Department was renamed abroad. ment, which requires that, before the the Legislative Reference Service, We will remain vigilant, demand an- government can invade your privacy, it which is today known as the Congres- swers, and seek justice, for there is must first present a court with reason- sional Research Service, or CRS. Over nothing we take more seriously than able cause to believe you have com- the years, CRS has served the Congress the protection of American life. And in mitted a crime. This bill effectively al- by providing comprehensive and reli- our sorrow, we will find gratitude for lows the government to search through able legislative research and analyses the firefighters, paramedics, police of- your personal records indiscriminantly that are timely, objective, and authori- ficers, and first responders who put and then use that information to form tative. their lives at risk to help save others. the basis of a prosecution. This year is the 100th anniversary of In the words of Ronald Reagan: Cybersecurity is an important na- the Congressional Research Service, I know in my heart that man is good, that tional security issue, but it does not and today I want to thank these re- what is right will always eventually tri- trump the Bill of Rights or the Amer- search professionals for the work they umph. And there’s purpose and worth to each ican freedoms that our Constitution do and the contributions they make to and every life. protects. the United States Congress and our So today let us come together as Federal legislative process. Americans—as moms and dads, broth- f f ers and sisters, husbands and wives— SAFE CLIMATE CAUCUS and continue to pray for those whose (Mr. JOHNSON of Georgia asked and SAFE CLIMATE CAUCUS lives were forever changed. was given permission to address the (Mr. WAXMAN asked and was given f permission to address the House for 1 House for 1 minute and to revise and minute and to revise and extend his re- SAFE CLIMATE CAUCUS extend his remarks.) marks.) (Mrs. CAPPS asked and was given Mr. JOHNSON of Georgia. Today, I Mr. WAXMAN. Madam Speaker, last permission to address the House for 1 rise to cite the fact that the American week, members of the Safe Climate minute.) people and Democrats and scientists Caucus challenged the Republicans who Mrs. CAPPS. Madam Speaker, earlier agree that climate change is a danger are on the Energy and Commerce Com- today, the Energy and Commerce Com- to us all, but where are the Repub- mittee to come to the floor and debate mittee passed, for the third time in 2 licans? A week ago, I joined my col- with us and talk about the problems of years, a bill to force approval of the leagues in the Safe Climate Caucus to climate change. We wrote them a let- Keystone XL pipeline. challenge the Republican members of ter, and we haven’t even gotten a I voted against the bill for many rea- the Energy and Commerce Committee reply. There seems to be a conspiracy sons, but chief among them is the fact to debate the Nation’s response to cli- of silence in the House of Representa- that it doubles down on a dead-end oil- mate change on the House floor. We re- tives about the dangers of climate based energy policy that is hurting our ceived no response. change, and it’s time for real debate on economy, hurting our environment and It is time for a real debate on the the House floor. our health. House floor about the dangers of cli- Every day, members of the Safe Cli- Burning fossil fuels is a primary mate change. We are already seeing the mate Caucus have come to this floor to cause of climate change, and we simply powerful forces and effects of nature. give speeches on topics relating to cli- can’t afford to continue down this de- We are witnessing the predictions of mate change, including the importance structive path. It makes far more sense our premier scientists come true, and of preparing communities to mitigate to focus on developing the clean, re- they are alarming. We’ve seen cata- the impacts of extreme weather events, newable energy technologies that we strophic storms, record heat waves, potential for clean energy tech- all know we’re going to need down the droughts, and wildfires. Top scientists nologies, and the threats of rising tem- road. Developing these technologies in the U.S. and around the world tell us peratures across the country. will create quality long-term jobs that that impacts like these will get even In contrast, we’re not aware of any can’t be shipped overseas. It’s good for worse as climate change continues. Republican Member who has spoken on business; it’s good for our planet; and There is no debate about the science of the House floor about the dangers of it’s good for our national security. climate change. climate change, and the committee of There’s no reason we can’t put aside Madam Speaker, it’s time for a de- jurisdiction is not even willing to hold our differences and take action to pro- bate on how to solve climate change. a hearing to hear what the scientists mote a clean energy future. It’s what f and experts have to say about the our constituents sent us here to do. Our window of opportunity is rapidly THE ‘‘GOLD STAR’’ FOR DAWSON issue. closing. The time to act is now. COUNTY HIGH SCHOOL JUNIOR I have a message to House Repub- ROTC licans: You can’t make climate change f (Mr. COLLINS of Georgia asked and go away by ignoring the problem. b 1720 was given permission to address the f CYBERSECURITY AND THE House for 1 minute and to revise and THE BOSTON TRAGEDY CONSTITUTION extend his remarks.) (Mrs. MCMORRIS RODGERS asked (Mr. MCCLINTOCK asked and was Mr. COLLINS of Georgia. Madam and was given permission to address given permission to address the House Speaker, I am pleased to report that the House for 1 minute and to revise for 1 minute.) the Dawson County High School Junior and extend her remarks.) Mr. MCCLINTOCK. Madam Speaker, ROTC recently earned ‘‘gold star’’ sta- Mrs. MCMORRIS RODGERS. Madam the House has been considering H.R. tus. This honor places the Dawson Speaker, today our hearts remain 624, the so-called CISPA bill. County High School Junior ROTC in

VerDate Mar 15 2010 03:17 Apr 18, 2013 Jkt 029060 PO 00000 Frm 00038 Fmt 7634 Sfmt 0634 E:\CR\FM\K17AP7.067 H17APPT1 jbell on DSK7SPTVN1PROD with HOUSE April 17, 2013 CONGRESSIONAL RECORD — HOUSE H2107 the top 10 percent of the Nation. This about the appropriate policy response I carved my pumpkin, and it was snowing status is a reflection of each cadet’s to the threat of climate change, but outside. Today, I dyed Easter eggs, and it’s hard work and the investment of the we’ve heard nothing from the Repub- snowing outside. Congratulations, Mr. Presi- parents, the instructors, and the com- licans. The House Republican leader- dent. You’ve solved global warming. munity in the Junior ROTC program. ship should schedule that debate right Now, that’s amusing. Climate change As a member of the Air Force Re- away. This problem is not going away. is a serious issue, but we must recog- serve, I have great admiration for the The longer we delay, the greater the nize that we do not have this planet all young people involved in Junior ROTC risks. to ourselves and that, when the Chi- in Georgia and throughout the United The Energy and Commerce Com- nese are increasing elevenfold their States. This important program in- mittee has refused to act or to even profits on the production of coal, when stills the values of citizenship, service, hear the latest science. Congressman they, in fact, have become the number and personal responsibility in the next WAXMAN and Congressman RUSH have one coal producer, when their equip- generation of leaders. sent over 20 letters requesting hearings ment is about 30 to 50 percent less effi- I anticipate great things from these with scientists and other experts about cient than ours, we cannot solve this young men and women in the future, important developments in climate problem without a global solution, and and I wish the Dawson County High science, but the Republicans have re- we must have the Chinese act. School Junior ROTC program contin- fused to hold any hearings on climate We’ve done our part in going down ued success. change. The American public is enti- this road to solve problems. We need f tled to an explanation for this dis- the Chinese to act as well. appointing record of inaction. THE 40TH ANNIVERSARY OF f Madam Speaker, we need to get seri- FEDEX COMMONSENSE BACKGROUND ous about tackling climate change. CHECKS ON GUN OWNERS (Mr. COHEN asked and was given per- That means having a debate about mission to address the House for 1 what actions should be taken. That de- (Mr. LARSON of Connecticut asked minute.) bate is long overdue, and my friends, and was given permission to address Mr. COHEN. I rise today to recognize time is running out. the House for 1 minute and to revise the 40th anniversary of the founding of f and extend his remarks.) FedEx, one of the world’s great compa- Mr. LARSON of Connecticut. I rise to nies. JOHN GRANVILLE commend JOE MANCHIN and PAT According to business lore, CEO Fred (Mr. HIGGINS asked and was given TOOMEY for coming up with a rational Smith originally introduced his idea permission to address the House for 1 approach that 92 percent of Americans for FedEx in a Yale economics paper minute.) all agree with in the need for universal that got him a C grade. Today, 40 years Mr. HIGGINS. Madam Speaker, I rise background checks as they relate to later, we can all appreciate the merit today to talk about a remarkable man our gun laws. of that C paper after the company from Buffalo, New York—John Gran- The bill was taken up today in the originally set up shop in 1973 near the ville. Senate, and the vote was 54–46. Every Memphis airport with 14 aircraft and John was a diplomat with the United fifth grader in America is astounded 186 packages set for delivery. That first States Agency for International Devel- that that bill was defeated. Only in the day, FedEx flew to 25 U.S. cities from opment, who was facilitating free elec- United States Senate, the other body, its home base in Memphis, which re- tions in the Sudan when, 5 years ago, could that take place—that a vote of mains its world headquarters. Today, he was assassinated in Khartoum. Four 54–46 would not pass. FedEx has grown to ship more than 9 of his killers were captured and con- So, disheartening as it is and in reel- million parcels daily across the globe. victed, but they escaped from prison. ing from the events that have taken FedEx and Fred Smith have also Two remain at large, and the State De- place in Boston on Patriots’ Day, chil- shown great generosity to the country, partment has issued a $5 million re- dren all across America cannot be reas- and Memphis is lucky and proud that ward for information leading to their sured by their parents tonight that it’s our home company. Fred Smith, a capture. Meanwhile, in February, the they are safe, but the NRA will sleep combat marine, who served two tours Sudanese Government pardoned the well this evening. Mission accom- of duty in Vietnam, served as the co- man who helped John Granville’s kill- plished. chair of the World War II Memorial ers escape. But there is another Chamber and an Committee to build a memorial here in Madam Speaker, John deserves bet- opportunity for the House of Rep- Washington. ter. He was a selfless and courageous resentatives to speak its will on the vi- It used to be said that what’s good man who dedicated his life to rep- olence that has been perpetrated across for General Motors is good for the Na- resenting the United States and in this country: in the commonsense tion, but now I think what’s good for helping those who needed it most. To- background checks that are needed FedEx is good for the Nation—abso- morrow, I will introduce a resolution here in this country. lutely, positively. calling for the Sudan to remain on the f I congratulate Fred Smith and FedEx State Sponsors of Terrorism list until on 40 years of great service, and I look the pardon is repealed and the escapees b 1730 forward to another 40 years of innova- are captured. I will also send a letter WAR ON COAL tion and service. demanding that President al-Bashir re- The SPEAKER pro tempore. Under f scind the pardon immediately. John Granville made western New the Speaker’s announced policy of Jan- SAFE CLIMATE CAUCUS York and our Nation proud. I will keep uary 3, 2013, the gentleman from Ken- (Mr. TONKO asked and was given fighting to see that justice is served tucky (Mr. BARR) is recognized for 60 permission to address the House for 1 and that his memory is honored. minutes as the designee of the major- ity leader. minute and to revise and extend his re- f marks.) GENERAL LEAVE Mr. TONKO. It is time for a real de- CLIMATE CHANGE NEEDS A Mr. BARR. Madam Speaker, I ask bate on climate change—right here on GLOBAL SOLUTION unanimous consent that all Members the House floor. The members of the (Mr. GRIFFITH of Virginia asked and may have 5 legislative days in which to Safe Climate Caucus come to the floor was given permission to address the revise and extend their remarks and in- to talk about this critical issue every House for 1 minute.) clude extraneous materials on the day that the House is in session, but Mr. GRIFFITH of Virginia. Ladies topic of my Special Order. where are our Republican colleagues? and gentlemen, I join you today to The SPEAKER pro tempore. Is there Last week, we challenged the Repub- share an amusing note that one of my objection to the request of the gen- lican members of the Energy and Com- constituents posted on Facebook re- tleman from Kentucky? merce Committee to a debate, a debate cently. He said: There was no objection.

VerDate Mar 15 2010 03:17 Apr 18, 2013 Jkt 029060 PO 00000 Frm 00039 Fmt 7634 Sfmt 0634 E:\CR\FM\K17AP7.069 H17APPT1 jbell on DSK7SPTVN1PROD with HOUSE H2108 CONGRESSIONAL RECORD — HOUSE April 17, 2013 Mr. BARR. Madam Speaker, this Na- And so before us we have a choice, 7,700 in 2012, and new and pending EPA tion was founded on a simple, but ma- and it’s a choice between two futures. regulations will cost 1.65 million jobs. jestic, idea; and that idea is that we The first is a future of energy freedom With 205 coal-fired generators shutting are endowed by our Creator with cer- and independence in which we continue down in the coming year due to strict- tain unalienable rights, that among to embrace the ideals of our Founding er environmental regulations, the these are life, liberty, and the pursuit Fathers, of Jefferson and Franklin, United States is expected to lose up to of happiness. where men follow their dreams, can 17,000 jobs. Think about these words from Jeffer- work hard and pursue happiness uncon- In my home State of Kentucky, this son in the Declaration of Independence strained by central planners in Wash- war on coal has been devastating to my for just a minute: the pursuit of happi- ington, D.C., where we can pursue an fellow Kentuckians. In 2012, direct em- ness—the idea that every human being open energy system and a diversity of ployment in Kentucky’s coal industry has a fundamental, natural right to fol- energy sources to create jobs and op- decreased by over 4,000 workers. low his or her dreams, to reach for the portunity and power a future of unlim- Mr. Speaker, this has a real impact stars, to work hard to achieve their ited growth and potential. on real lives. It’s easy to sit in Wash- God-given potential, all without undue The second is a future of energy scar- ington and issue regulations when you interference from the government. city, a future of energy dependency in don’t have to confront the human cost. What is the key to happiness? I be- which we abandon the traditions of the I want to yield time to some of my lieve it to be hard work—a relentless Founding Fathers, reject the American fellow colleagues in the House; but be- and unyielding desire on the part of the work ethic, and deprive Americans of fore I do, I want to tell a brief story individual to apply effort and improve their ability to pursue their dreams, by that I think tells the story of the war their lot in life. Hard work, after all, limiting the diversity of their energy on coal and why it matters to people has been an American tradition from choices to only those that Washington all around this country. It’s a story of our very founding. Benjamin Franklin politicians and not the American peo- a young coal miner that I met in my once said: ple decide are worthwhile and sustain- home State of Kentucky. His name is It is the working man who is the happy able. Chris Woods, and Chris commutes over man. It is the idle man who is the miserable In short, in the words of Benjamin man. an hour each way, both ways, to work Franklin, we can be the happy man. We and back home every day. He took me And so this story is the story of can pursue happiness, or we can be the in the coal mine, and he wanted to America. The work ethic defines who idle man. The choice is ours, and here’s show me his work. And it’s heroic work we are as a nation. It is in our DNA; why this is relevant today. We are on what these coal miners do. And he took unconstrained by excessive govern- the path toward a future of energy me underground and he showed me ment, the industry and creativity of scarcity rather than energy freedom. the American people have fueled the what he did. As we were coming out of We are on a path that replaces Ameri- most prosperous and productive nation the mine, and as I recognized that what cans’ right to work hard and pursue in the history of the world. he was doing was providing low-cost, So what gives Americans—or anyone happiness with a government-directed reliable electricity to the American else for that matter—the character to society in which politicians and bu- people, he looked at me and he said: pursue happiness? What animates our reaucrats restrict Americans’ freedom You know, ANDY, I don’t really know capacity to do work? In a word: energy. and limit their choices. And the best much about politics. And, frankly, I Quite literally, the classic, scientific example of this is the Obama adminis- don’t care much about politics; but if definition of energy is the ability to do tration’s war on coal. you can save my job, I’m for you. work. And Americans’ ability to per- What is the impact of this great, And the thing about Chris Woods was form work, to work hard and to pursue abundant natural resource? In 2012, he wasn’t thinking about himself. His happiness over the years has been sup- coal was responsible for 37 percent of one paycheck takes care of his wife, ported by an abundant and affordable electricity generated in the United two children, and both sets of parents. States, more than any other source of supply of domestic American-produced b 1740 energy. Energy has been the indispen- electricity. Given current consumption rates, the United States has more than This matters to people. And for every sable ingredient in Americans’ ability 1 to pursue happiness. 230 years remaining in coal reserves. one coal mining job lost, there are 3 ⁄2 Think about it: the story of this Coal is mined in 25 U.S. States and is additional jobs that are dependent on country has been the story of Amer- responsible for over 760,000 U.S. jobs. the coal industry. ican energy—coal, oil, natural gas. My home State, Kentucky, has pro- And so, Mr. Speaker, I look forward Abundant, reliable, affordable energy duced energy for centuries. And most to having a discussion tonight about has always been essential to a growing importantly, we have produced coal. the future of coal in America, about national economy. It built the rail- And our coal industry that has been the choices we have as a country to roads and conquered the West. It built by the hard work of my fellow pursue our happiness, to work hard, to spawned the industrial revolution and Kentuckians powers America. Ken- fulfill and embrace the Founding Fa- won two world wars. It revolutionized tucky was the third largest coal pro- thers’ vision that we should shoot for communications and fostered innova- ducer in the United States during 2011, the stars, that we should have energy tion from Henry Ford to the Wright and coal mining was by far the greatest diversity and energy freedom, and we brothers, Apollo and Neil Armstrong. source of energy production in the should reject the path we’re on, a path It propelled us into the Information Commonwealth. In 2011, coal mines em- of energy scarcity and dependence. Age and the knowledge-based economy. ployed more than 19,000 individuals With that, Mr. Speaker, I’d like to Energy always has been and always through the year, and mining directly yield to the gentlelady from Missouri, will be the key to Americans’ ability to contributed approximately $4 billion to ANN WAGNER. work hard and pursue happiness. the Commonwealth’s economy. Mrs. WAGNER. I thank the gen- It is no surprise then that the coun- What has the war on coal brought to tleman from Kentucky for yielding and tries with the best human health and our country and to Kentucky? Domes- for hosting this Special Order on the the most material wealth on this plan- tic coal decreased by 4.6 percent just importance of America’s coal industry. et are the countries with the highest last year. In 2012, U.S. coal consump- Mr. Speaker, I rise to discuss the im- levels of energy consumption. The tion for electric power declined by 11.5 portance of coal in Missouri. There is most salient difference between na- percent. Within the past year, 226 coal no denying that coal has played a vital tions in the developed world and na- electricity-generating units have been role in providing an abundant source of tions in the lesser-developed world is shut down. In 2012, Kentucky’s overall power to plants that generate elec- that nations in the developed world coal production decreased by 16.3 per- tricity for families and for businesses produce and consume the most energy, cent, reaching its lowest level of pro- across this country. whereas nations in the lesser-developed duction since 1965. In Missouri, coal-fired electricity is parts of the world produce and con- And this has an impact on real peo- responsible for 81 percent of the State’s sume the least. ple. U.S. coal-mining jobs dropped by electric supply, and largely contributed

VerDate Mar 15 2010 03:17 Apr 18, 2013 Jkt 029060 PO 00000 Frm 00040 Fmt 7634 Sfmt 0634 E:\CR\FM\K17AP7.071 H17APPT1 jbell on DSK7SPTVN1PROD with HOUSE April 17, 2013 CONGRESSIONAL RECORD — HOUSE H2109 to Missouri’s low electricity rate of 7 Performance Standards rule will deny And guess what? cents per kilowatt hour in 2011, com- economic and environmental benefits He and his administration have made pared with the national average of 10 of new low-emissions coal power plants it very clear, despite their comments cents per kilowatt hour for that very in favor of plants that rely on commer- that they support all of the above in same year. cially unproven technology in order to energy policy to produce electricity, Additionally, Missouri was sixth in chase unrealistic and marginal envi- they’ve made it very clear that they do the country in coal consumption, with ronmental standards. not support the use of coal. 46 million tons of coal used for elec- On top of all of this, President The gentleman from Kentucky men- tricity in 2011, of which Ameren Mis- Obama’s nominee to head the EPA dur- tioned earlier that over 205 coal-burn- souri’s Meramec plant in the Second ing his second term only promises to ing plants have closed in this country Congressional District consumed 31⁄2 bring the same kind of policies that in recent years. And this President’s million tons. have shut down factories and bogged EPA recently came out with a rule pro- Ameren Missouri, based out of St. down companies with increased regu- posal relating to greenhouse gas emis- Louis, is the State’s largest electric latory red tape during his first term. sions, and that when they finalize that utility and provides electric service to Gina McCarthy has headed the EPA’s rule—they were supposed to have final- approximately 1.2 million customers Office on Air Quality since 2009, and ized it on April 13 and they did not do across central and eastern Missouri, in- was instrumental in the creation of it—but when they finalize it, it will be cluding the Greater St. Louis area. these regulations that have attacked impossible to build a new coal-powered In addition to the consumption of the coal industry. plant in America because the tech- coal, the Greater St. Louis area is also I applaud Senator ROY BLUNT’s lead- nology is not available to meet the a critical player in the procurement of ership in placing a hold on her nomina- emissions standards required by EPA. coal for our Nation’s energy needs, tion, and hope that my other Senate Now, let’s think about that for a mo- with companies like Arch Coal, Pea- colleagues will also take a hard look at ment. We would be the only country in body Coal and Patriot Coal her previous agenda when considering the world in which you would not be headquartered in St. Louis and drawing her legitimacy for the position, with able to build a coal-powered plant to employees from Missouri’s Second Con- such an important part of our domestic produce electricity. And we know that gressional District. These companies energy production and economic activ- in China, they’re building more and are among some of the country’s and ity at stake. The coal industry just more every day, every week, every the world’s largest coal providers. simply cannot handle four more years month. The same thing in India. And All of this helps in keeping energy of the same regulatory overburden by even in , where they closed costs low for families and for busi- the EPA. down their nuclear power plants, What this all comes down to is con- nesses. More than half of American they’re building more coal-powered tinuing to provide reliable and afford- households devote more than 20 per- plants. able energy for the people of Missouri cent of their family budget to energy Now, what does that mean to Amer- and the United States of America. In- costs and, in this economy, we must do ica if we can not build a new coal-pow- creasing costs of doing business subse- everything we can in order to keep the ered plant? quently increases the price of energy costs of electricity down. My friend from Virginia was talking for households at a time when families Despite the reliance on coal in pro- about, in Virginia, just about a year are spending more and more of their viding for this country’s energy needs ago, they built one of the cleanest and contributing to low electricity budget on powering their homes. The amount that American house- burning coal-powered plants in Amer- prices, this administration has contin- holds devote from their family budget ica. ually made it more difficult for these to energy cost is more than double I was in Texarkana, Arkansas, in De- longstanding plants to operate, which from 10 years ago, and these regula- cember. They opened up another clean- ultimately threatens the industry for tions on coal have all played a signifi- burning plant in Arkansas. But under the future. cant role in that. these new regulations, you would not Existing power plants are already in Mr. BARR. I thank the gentlelady, be able to build any plant, regardless of the middle of meeting compliance with and appreciate her comments on the how clean it is. an EPA regulation aimed at reducing fact that certainly affordable elec- b 1750 uncontrolled greenhouse gas emissions tricity is part of this discussion. And Now the sad thing about this is that by 90 percent over 3 years. Now EPA is it’s particularly important to recognize we’re losing jobs because of these regu- also proposing to regulate greenhouse that the war on coal affects everybody, lations. But just as important, Amer- gases for new power plants that will re- not just coal miners, not just people in ica is becoming less competitive in the quire them to meet a natural gas the power industry, but seniors on global marketplace because it’s in- standard for air emissions by relying fixed income. on unproven technology utilizing car- Over half of American households de- creasing the cost of electricity, making bon capture and storage. vote more than 20 percent of their fam- it much more difficult for us to com- This standard was originally de- ily budget to energy costs, more than pete in the global marketplace. And signed for a completely different en- double 10 years ago, and so this mat- the sad thing about it is that this is ergy source and relies on technology ters to every middle class family in being done by regulators without any that has not yet been commercially America. public debate. tested, with the EPA itself estimating At this time I’d like to yield to my It’s hard to believe that a regulation that this New Source Performance colleague, the gentleman from Ken- administered by EPA will prohibit the Standards rule will add around 80 per- tucky, the chair of the Energy Sub- building of any coal-powered plant in cent to the cost of electricity for a new committee. America, once it’s final, from that day coal plant. Mr. WHITFIELD. I want to thank the forward, unless the technology is dra- The EPA has already missed their gentleman from Kentucky for hosting matically improved. And yet there’s no April 13 deadline to finalize the rule, this discussion about the importance of public debate about it. This is a deci- citing that they are still reviewing the coal, and for all those who are going to sion that should be made on the floor close to 2 million comments that have participate in this discussion this of the House of Representatives and on been offered on the proposal. Among evening. the floor of the United States Senate, these comments are submissions from When President Obama was seeking not by a group of regulators who deter- 221 Members of Congress, including 14 the office he now holds, he visited San mine that they want to put coal out of Democrats, who all have concerns with Francisco and he attended a meeting in business. the devastating impact that this rule San Francisco. And at that meeting he Now a few of our friends were talking will have on jobs and the economy. made the comment that if he was elect- earlier in the 1-minutes about climate As a new Member of Congress, I ed President, you could still build a change. America does not have to take would like to join my colleagues in op- coal plant in America, but he would a backseat to anyone on a clean envi- position of this rule. The New Source bankrupt the industry. ronment. In fact, our CO2 emissions in

VerDate Mar 15 2010 03:17 Apr 18, 2013 Jkt 029060 PO 00000 Frm 00041 Fmt 7634 Sfmt 0634 E:\CR\FM\K17AP7.073 H17APPT1 jbell on DSK7SPTVN1PROD with HOUSE H2110 CONGRESSIONAL RECORD — HOUSE April 17, 2013 America today are lower than they Finally, I’m here to talk about the go full-scale, but the technique would have been in 20 years, and our other reliability of our electrical grid. If we release the heat from the coal without emissions are lower than they have disadvantage ourselves as a Nation, as actually burning it. So there’s no car- been in many, many years because our we have been, and say no more coal bon emission. That has great potential. Clean Air Act and our Clean Water Act generation, no more coal-fired power Also, in another use of coal, the car- are working. But let’s not use these plants, we’re going to disadvantage bon could be used commercially for en- pieces of legislation to penalize the ourselves as an energy economy and hanced oil recovery. We hear about all American people and lose jobs and be the manufacturing jobs that come with of the oil sands and the oil shale in the less competitive in the global market- that. northern part of our country and even place. We’ve heard a lot about the different in West Virginia. There are tech- So I want to thank the gentleman for regulations that are out there that nologies that enable the use of carbon sponsoring this event. Let’s be mindful we’ve tried to battle back in the House to enhance that recovery so that we of the importance of coal and pro- and say, Unacceptable; you can’t regu- get more from the recovery. And I ducing electricity in America. late; you have to legislative, you have think that’s something that has a tre- Mr. BARR. I thank the gentleman. to let this body, the representatives of mendous future for us. And I think his final point was a good the people, decide who are going to We stand here today on a united one; that, ironically, the EPA’s overly make these decisions. We’ve already front. I look at my colleagues and I see restrictive policies are actually con- had 266 coal-fired power plants close. folks from States all across this coun- tributing to a negative global environ- I know we have the gentleman from try. We formed a Coal Caucus, of which ment. The crackdown on domestic en- Kentucky. We’ve got Virginia, West I’m the chair, to talk to our other ergy production is producing exports to Virginia. Permitting has been very, Members of Congress who don’t have countries with inferior electrical gen- very difficult. We’ve got regulators this passion and realistic view of the eration capabilities. We need to un- who are coming in and have yanked place that coal can play in our energy leash the American free enterprise sys- back one major permit retroactively. future. tem. The American free enterprise sys- After the 10 years of going through all I want to thank all of my colleagues tem is what will solve problems in util- the permitting, all of the reissuing, all here for fighting the good fight. We ity generation and energy production. of the capital investment, the EPA have a lot of miners and their families, So I thank the gentleman, and I look comes in and grabs back on that per- other business folks, jobs, manufactur- forward to continuing to work with mit. The court said, No, you can’t do ers, and elderly folks who understand him on this important topic. that. And so we have an overreaching I now would like to recognize the what it means to try to have avail- EPA that is willing to overreach into gentlelady from West Virginia. ability of cheaper energy resources. Mrs. CAPITO. I would like to thank the legal area until the courts say, No We’ve got a whole lot of America be- the gentleman from Kentucky for more. hind us. This is the reason the oppor- hosting us today to talk about coal. As Now we’ve worked in the House to tunity to talk about these things to- he mentioned, I am from the great try to stop this war on coal. We’ve night, I think, sends a powerful mes- State of West Virginia, one of the larg- passed a lot of things. We did pass the sage across the Congress, across to the est coal-producing States in our Na- Stop the War on Coal Act last Sep- Senate, across to the President that tion, and, historically, some of the tember. Unfortunately, the Senate did really an all-of-the-above energy plan largest coal-producing areas of our Na- not act on this. It’s sort of a bit of a re- does include coal, must include coal, tion. peating theme for us in the House. and we’re going to fight like heck to As we know, coal is a huge part of But the administration is seeking to make sure it does. the economy in West Virginia. But we turn us away from coal and keep the Mr. BARR. I thank the gentlelady. also know that energy is a jobs econ- war on coal and drive up energy prices. I would like to recognize another omy. When you’re generating energy in People around the world are buying Member from the great State of West any capacity, you’re generating jobs. West Virginia coal. Our exports in the Virginia and yield some time to the We have over 7.6 percent unemploy- Nation almost doubled since 2006, and gentleman. This is not a partisan issue. ment across the country, and yet we in West Virginia we exported more It is an American issue. And I am ap- have a President who wants to pick than $5 billion of West Virginia coal. preciative of the gentleman’s attending winners and losers on the energy front. Now we all know it’s going to China be- this session tonight. Coal has been one of the President’s fa- cause they have an insatiable demand, Mr. RAHALL. Thank you, Mr. BARR. vorite losers, as we have seen and right? Guess where else it’s going? Eu- I appreciate very much your giving heard from our colleagues. rope, the Netherlands, Italy, Germany. this Special Order for a discussion of But there are three reasons I’m These are countries that are going to America’s most plentiful, most eco- standing here today. The first reason use our cheaper resource to power nomic, efficient domestic energy re- I’m here is to stand up for the jobs of themselves into a burgeoning economy, source we have, that being coal. and we’re going to disadvantage our- tens of thousands of West Virginians, b 1800 whether that’s a coal miner, as you selves here with our own natural re- mentioned, transportation, shop owner, sources. I also come from the great State of electrician, fuel supplier, and all the So the rest of the world wants Amer- West Virginia, a State that is proud of different jobs that are connected with ican coal. its heritage of mining coal—proud of getting to and burning our Nation’s Myself and my colleagues here today its coal miners, number one, those in- most abundant resource. And I’m very can’t for the life of us see why we don’t dividuals who go beneath the bowels of concerned about it. We lost 1,200 jobs in have a President and an administration the Earth to extract the energy that the last quarter of 2012 in West Vir- that believes that coal has a great fu- has fueled the industrial revolution in ginia alone. ture in our energy mix. He always says this country. They are brave, coura- Secondly, I’m here to stand up to the he’s for all of the above, but we all geous individuals. Every one of us is families and those who are on fixed in- know standing here it’s ‘‘all of the concerned every day about their safety, comes. As the gentleman from Ken- above, except.’’ number one, their health, and their re- tucky brought up, when you think I always try to end everything on a tirement benefits for themselves and about the largest part for a senior who bit of a positive note. And there’s some their families. Yes, coal is a valuable lives on a fixed income, the most dif- great technological advances with coal. natural resource, but our number one ficult thing for them is the fluctuation This is why I think we’ve got to keep natural resource is the coal miner, in their power bill, whether it’s heating coal active and in the mix and viable as himself or herself. So we thank them or air conditioning. And when you our energy resource because the future for what they do. They are courageous start chipping away at $50 or $100 a for coal is very good. One of the discov- individuals. month, you’re going to find our seniors eries was at Ohio State University, My district is both surface and deep and those who live on fixed incomes where they were able to do a labora- mined. We can do both in a very envi- really suffering. tory experiment. We don’t know if it’ll ronmentally sane manner, a manner

VerDate Mar 15 2010 03:17 Apr 18, 2013 Jkt 029060 PO 00000 Frm 00042 Fmt 7634 Sfmt 0634 E:\CR\FM\K17AP7.075 H17APPT1 jbell on DSK7SPTVN1PROD with HOUSE April 17, 2013 CONGRESSIONAL RECORD — HOUSE H2111 which produces jobs for our people, pro- hope that many more of my colleagues Now, according to the National Eco- duces energy for our country, and at that may not be with us on the floor nomic Research Associates, it is esti- the same time does restore our envi- this evening will come forth and ex- mated that compliance costs for these ronment and make it a beautiful place press their support for coal as a valu- EPA regulations on the electric sector in which to work. That’s why we in able domestic source of energy. will average $15 billion to $16 billion West Virginia pride ourselves on our I thank the gentleman for yielding. per year. Who pays for that? Who’s clean environment, our productive Mr. BARR. I thank the gentleman going to pay for the extra cost to our workforce, and our high worker morale from West Virginia. I thank him for his electric industry, $15 billion to $16 bil- because we can do all-of-the-above at comments. I thank him for, in par- lion? I’ll tell you who: it’s the families the same time. And we are for all-of- ticular, his sentiments about the he- in my district who are living from pay- the-above as far as our energy re- roic work of these men and women who check to paycheck and who are strug- sources as long as all-of-the-above go to work every day in our coal mines. gling to put food on the table. When means our domestic production of re- I just cannot thank them enough for they see their electric bill go up every sources for energy in this country. their contributions to our society month because of the EPA coming here Coal literally keeps the lights on. every day for providing us with afford- from Washington, D.C., imposing these Many a county commission in my dis- able and reliable electricity. regulations on our electric industry, trict, during the downturns in the coal With that, I would like to yield to that’s who ends up paying, and it’s market, has had to lay off law enforce- the gentlelady from Missouri. wrong. Mrs. HARTZLER. I thank the gen- ment personnel, has had to really trim It also is costing jobs. The same tleman. I really appreciate you holding the lighting of their public streets group estimated that these regulations this special time, where we can show when coal resources are down, when are going to cost half a million jobs our support for the coal industry, as revenues and our coal severance taxes just next year. Now, we have too much well as condemn the Obama adminis- are down to our local county units of unemployment in this country already. tration’s current war on coal, because government. Why would the government adminis- So coal is important. It has been, it that’s what it is. In Missouri, coal is our preferred tration from this President be pushing is, and it always will be a mainstay of source of energy for electrical genera- regulations that’s going to kick out our economy in West Virginia. Our tion due to its abundance and its low half a million more people from being quality of life—indeed, the quality of cost. Coal provides over 81 percent of able to work? Just in Missouri alone, life in America—and our economic vi- Missouri’s electric-power generation, the cost is expected to be $500 per tality have long been fueled by coal, and Missouri ranks 11th in the Nation household in higher electricity bills. and it’s something that the American in energy affordability. So that means It’s wrong. people cannot turn their backs on. Yet the people of Missouri have more I want to just point out two of these too many, I’m afraid, fail to recognize money that they can spend on other regulations that are driving this cost the contributions that coal has made things for their family. and impacting them—and several of my to our past, and certainly they under- It also attracts businesses to our colleagues have mentioned several of estimate the role that coal can and State. We want to keep it that way. We them already. But these two I wanted should play in our future. love coal in Missouri, and we appre- to bring to your attention. Through decades of investment, coal ciate the role that it plays in having The New Source Performance Stand- has changed for the better. It is not our affordable, safe energy in our country. ards for new coal units are establishing grandfathers’ coal. It is a cleaner, more I wanted to show this picture to you new guidelines that control carbon di- efficient fuel than ever before. And and my colleagues here because a lot of oxide emissions from any newly con- with the right kind of investments and people think in Missouri that we don’t structed coal and natural gas power know-how and the technologies that have coal mines. But I want to tell plants. This proposal requires new coal are coming online—some of which have you, in the Fourth District of Missouri, units to meet a standard so low that it already been talked about this after- we have a coal mine. This is a picture. effectively is going to ban new coal noon—its use continues to improve and My husband and I had the opportunity plants. My friend and colleague from modernize. to go there and I snapped a few pic- Kentucky did a very good job of illus- Our Nation must embrace an energy tures, and let me tell you we are so trating this. I wanted to reiterate, strategy that encompasses a broad proud of it. These hardworking people though, the quote from our President range of fuel choices, including domes- here are doing a great job in getting about this administration. He admitted tic coal, if we are ever to have any coal out of the ground and taking it to in 2008 that his goal was to bankrupt hope of completely freeing ourselves our local power plants. new coal-fired power plants. Now, that from our overdependence on foreign This coal mine is providing great jobs is wrong. Here’s what he said: fuels. This means that this Nation in my district. These are high-paying, If somebody wants to build a coal-powered must acknowledge the simple fact that skilled jobs. I know some of the people plant, they can. It’s just that it will bank- coal has been and for the foreseeable that work here, and they appreciate rupt them because they’re going to be future it must be part of a comprehen- this opportunity. This mine is also charged a huge sum for all that greenhouse sive national energy strategy that will bringing in property taxes to our local gas that’s being emitted. enable us to grow our economy, remain schools, and it’s helping the economy Now, it’s frustrating to me that the strong militarily, and help to influence of the entire county, this region of the Obama administration, our President, environmental and economic chal- district. Plus, it is powering two of our would target an industry that is pro- lenges around the globe. local power plants nearby. So this is viding clean, affordable energy for our So coal is a critical element for en- very exciting for us. We want to see country, providing jobs in my district suring affordable, abundant, and reli- this continue rather than having the and all across this country, and keep- able energy that fuels the opportuni- current administration, through the ing that electricity bill at home low for ties and the way of life that we cherish EPA, try to rein us in and to force us our families, but he is. here in the United States of America. to rely on more expensive, untested en- The second regulation that he is So as a Representative of coal mining ergy sources in our country. talking about is going to impact what’s communities and generations of coal You know, President Obama and the called coal ash and try to make it a mining families, I will continue the EPA are pushing this over-prescriptive, hazardous waste. Now, this is some- good fight in the Congress for the fu- regulatory agenda without adequate thing that is not hazardous. It is going ture of coal and for the health and safe- cost-benefit analysis, workable to increase the cost of cement. Now, we ty of America’s coal miners. And as the timelines, and input from the industry. need cement. We’re building new high- gentleman from Kentucky has said, it Both of the proposed and current regu- ways. We need it in building new is a bipartisan issue. I wish there were lations being promoted by the EPA are homes. We need it for our businesses more from my side of the aisle here having sweeping negative impacts on that are building. Why would we do this evening, but perhaps they will sub- coal-fueled electricity generation in this? It’s going to increase the cost for mit comments for the RECORD. I do this country. that.

VerDate Mar 15 2010 03:17 Apr 18, 2013 Jkt 029060 PO 00000 Frm 00043 Fmt 7634 Sfmt 0634 E:\CR\FM\K17AP7.077 H17APPT1 jbell on DSK7SPTVN1PROD with HOUSE H2112 CONGRESSIONAL RECORD — HOUSE April 17, 2013 b 1810 ducing community. The Sauls were in the third-largest State in terms of coal We have in Missouri five cement the coal mining business, they had produced by the underground mining plants that provide 12,000 jobs. Yet if Eagle Coal. My friend John Stilley has method, and first in terms of total coal this continues to go through we’re Amerikohl. I have friends over in the extracted by longwall mining tech- going to see an increase in cement Kittanning area, Rosebud. nology. We win with coal, we put peo- cost. But I went to CONSOL, and I went ple to work with coal, we lower our en- So here, gentleman, we have two ex- down to the Bailey Mine. I went down ergy costs with coal, we win the battle amples of regulations coming out of 700 feet underground to see this hor- in the world economy because our cost Washington here that are increasing rible, horrible product that the Presi- of energy is lower, which allows us to the cost for our families at home and dent absolutely hates and wants to pay higher wages to all those folks out that are killing jobs and increasing our eliminate. And while I was there, I was there right now who are struggling, electricity costs. It’s wrong, and I will trying to figure out: Where is it so bad? hardworking American taxpayers. continue to stand against it. And I ap- I watched as they did the longwall Why in the world would we take from preciate all my colleagues as we stand mining, how it shaved the coal off the them right now low-cost energy and together tonight against this and we wall. It’s being drenched all the time condemn it because it doesn’t meet make a stand for low-cost, reliable en- with a fine mist, and then there’s vacu- this President’s standards? ergy, and that is coal. I commend you ums taking all the coal dust out. It’s time for us to fight back and for having this, and I encourage all my I sat as far away from the machine as fight back hard, not as Republicans, colleagues to join us in this very im- you having a conversation with some- not as Democrats, but as Americans. portant effort. body. And the guy who I was talking to So, Mr. BARR, I thank you so much for Mr. BARR. I appreciate the gentle- said: You know, Mike, I’ve done this what you’re doing. lady, and I appreciate her stand for the for 40 years. When I first started, I had Mr. BARR. I thank the gentleman. I coal industry. Just one of those rules to do it on my hands and knees. I laid think his comments about the rail- that she was referring to, the Utility on my back and I used a pick. And the roads reminds me of a quick story MACT rule, the EPA estimates it to reason I did that was because I was about my district in Estill County, cost $10 billion per year, but other married and my wife and I had some Kentucky, a little town called Ra- independent annual cost estimates dreams. We wanted to buy a house, we venna. This community was built on range from $70 billion to $200 billion, wanted to raise a family, wanted to the railroads, and those railroads car- well above the EPA estimate. It is no educate those kids, and we wanted to ried the coal out of Perry County and wonder that within the past year, 226 live our life. And I did it through coal Harlan County and Bell County and all coal electricity-generating units have mining. those counties in southeast Kentucky. shut down. But, you know, the way it is now, This community in my congressional With that, I would like to recognize this is incredible. And I stood in a district was built on the railroads. the gentleman from Pennsylvania. room that was at least 10 to 12 feet Today, furloughed railroaders, their Mr. KELLY of Pennsylvania. I thank high and about 30 feet wide and families are without jobs, without a the gentleman, and thank you for hold- watched the coal miner, a machine, paycheck, and this is because of the ing this this evening, because it’s real- shave the face of the coal off the wall war on coal. One of the furloughed rail- ly important that we understand ex- and then extract it. roaders told me that just a few years actly what’s going on with coal. Now, it doesn’t make sense to me or ago 120 trains would come through When America was looking for en- to anybody else as a commonsense per- their community full of coal. Now ergy, they went to coal. Coal has al- son. What in the world are you trying barely 50 come through every month. ways been there for us. It is abundant, to do, Mr. President? In Erie, Pennsyl- So this has a real impact for real peo- it is accessible, it is affordable, and it vania—that’s where GE Transportation ple, middle class Americans losing is truly American. And this is the part is, they build locomotives. Now, the lo- their jobs. The war on coal is hurting I don’t get. You just heard Mrs. comotives haul trains and those trains the American people. Unemployment is HARTZLER talk about the President’s haul coal. And there’s been a 20 percent higher than the national average in Es- statement, and also Mr. WHITFIELD. reduction in coal. till County, Kentucky, because of this That’s one campaign promise he kept. So do you know what that did to GE? President’s war on coal. So I thank the He said, If you want to produce elec- They don’t have to build as many loco- gentleman. tricity using coal, you can do it, but motives. We have 3,000 locomotives sit- I would now like to recognize the we’ll bankrupt you. Now, this makes ting idle. Why? In a country that’s gentleman from Indiana to talk about absolutely no sense to anybody who looking for jobs, why is this President coal in Indiana. understands what America needs right eliminating jobs? Mr. BUCSHON. Mr. Speaker, I rise now, and it’s jobs. Now, look, it doesn’t make any sense, today in strong support of our coal in- In Pennsylvania, 40 percent of Penn- it just doesn’t make any sense. And as dustry and the men and women who sylvania’s electricity is produced using we go forward, I would like this Presi- work in the industry. coal. In addition to keeping electricity dent to look at energy, all the above. I grew up in a small town in Illinois, affordable, the coal industry contrib- What would make us great as a coun- 1,400 people, Kincaid, Illinois, where utes more than $7 billion annually to try? Energy independence. That’s what my dad was a United Mine worker for the Commonwealth’s economy. It’s we need—low cost energy. And we have 36 years. All of my friends’ parents about jobs, jobs, jobs. it right here, right now. worked in the coal mine. Coal created This is a President who just doesn’t When coal wins, America wins, and good, middle class jobs for those who get it. He talks about all the above when America wins, we all win. This lived in my hometown. when it comes to energy, but he forgets isn’t a Republican initiative or a Dem- I’ve been down in these mines in my all that’s below. He turns his back on ocrat initiative. As you said earlier, hometown when I was a kid, and re- coal and looks to renewables that are this is about America and America’s cently in my district now in south- very expensive and make no sense to strategy and America’s answer to en- western Indiana. I’ve met the proud, the average American. And the hard- ergy independence. Coal is a big part of hardworking coal miners, and I’ve seen working American people who produce it and has to continue to be a big part the impact their hard work has on the this coal are miners. We’ve not only of that. local economy. shut down their mines, we’ve shut So I thank you for what you’re doing. In 2010, Indiana mined around 36 mil- down their power plants, and we’re ru- We’ll keep fighting for coal, we’re not lion tons of coal and consumed nearly ining their communities. We’re abso- going to give up, we’re not going home. 65 million tons. Currently, Indiana has lutely ruining communities right now. Mr. RAHALL spoke very eloquently more energy underground in the form Now, I couldn’t understand what was about it. But all these folks from all of coal reserves than the entire United so horrible about this product, because these coal-producing areas—you know, States does in oil and gas reserves. I heard the President describe it many Pennsylvania is the fourth-leading Indiana’s demonstrated coal reserve times, and I grew up in a coal pro- coal-producing State in the country, base of over 17 billion short tons is

VerDate Mar 15 2010 03:17 Apr 18, 2013 Jkt 029060 PO 00000 Frm 00044 Fmt 7634 Sfmt 0634 E:\CR\FM\K17AP7.079 H17APPT1 jbell on DSK7SPTVN1PROD with HOUSE April 17, 2013 CONGRESSIONAL RECORD — HOUSE H2113 enough to maintain the current level of United States. You know, I see the BUCSHON), who talked about his home- production in Indiana for 500 years. electric cars going down the street; and town of Kincaid, Illinois, and talked The reserve base for the entire Illinois I’m not opposed to electric cars, but about the importance growing up of Basin, which includes Indiana coal, is they ought to say ‘‘powered by coal’’ coal mining in that community. over 130 billion tons, enough to meet on them in terms of understanding I represent Kincaid, Illinois, right the entire U.S. coal demands for the where the source of the power is to now in the 13th Congressional District next 100 years. Eighty-eight percent of power these electric cars. of Illinois, and just over 20 years ago, all electricity generated in Indiana is Coal keeps energy costs low. It helps these miners lost their jobs because of from coal. And I’m proud to say that keep American businesses competitive, deliberations and the eventual stroke all of that coal production is in my dis- and it allows middle Americans to keep of a pen here in Washington, D.C. It be- trict. more of their hard-earned dollars dur- came cheaper to import coal from the This natural resource is vital to our ing these challenging economic times. western United States to burn at the State’s energy industry and supports In Montana, we are seeing firsthand power plant across the street from this over 3,300 direct mining jobs and ap- the critical role that coal plays in the coal mine where these miners worked proximately 12,000 indirect mining energy sector. In my home State, it is than it was to dig it out from under- jobs. Twenty-seven percent of Indiana’s creating hundreds of jobs, fostering im- ground, ship it on an electronic con- GDP is from manufacturing dependent portant relationships with our Indian veyor belt across the street, and burn on coal-fired electrical generation. reservations, being a leader in coal pro- it. Over 1,200 miners that day lost their Mr. Speaker, we cannot deny that duction for our country and leading the job. coal is vitally important to Indiana’s way for coal exports. Those were Congressman BUCSHON’s economy, as well as our Nation’s. De- I support this industry because it en- friends. Those were my friends’ par- spite the immense impact coal has on ables more young Montanans to put ents. It hit our local economy harder our economy, onerous Federal regula- their training and education to work than anything we had seen. Our local tions can often be an obstacle for this and to stay at home with their job in- economy has since recovered, but we industry. stead of exporting our talent to other cannot forget that these deliberations I’m pleased to say that the adminis- places so Grandma and Grandpa have in this great body have an impact on tration actually recently responded to to fly to see the grandkids versus vis- all of America’s families. And these a request by myself and our two Indi- iting them next door. coal miners of 20 years ago are no dif- ana Senators to give a permit to a You see, in my home State of Mon- ferent than the coal mining families of company creating 100 jobs in my area, tana, we boast the largest coal reserve today, and we need to make sure we but this is unusual. The coal industry in the Nation. The Powder River Basin, think of them every single time we see under this administration should not which spans across southern Montana this war on coal, that we stand to- have to navigate the overaggressive and northern Wyoming, contains near- gether, Mr. BARR, and fight. and ideological regulatory climate ly 3.4 billion tons of coal reserves. Thank you. coming out of the EPA. I recently met with representatives Mr. BARR. I thank the gentleman. from Arch Coal, a company that is b 1820 I would now like to yield to the gen- ready to invest millions of dollars into tleman from Pennsylvania. The Mine Safety and Health Admin- developing the Otter Creek mine in Mr. ROTHFUS. I thank the gen- istration, or MSHA, recently proposed southeastern Montana. tleman from Kentucky, and I rise outlandish rules that are nearly impos- Developing these resources creates today in solidarity with the middle sible to follow. As has been previously jobs, injects millions of dollars into the class workers and families who call stated, they can’t be followed. There’s economy. It helps lower energy costs, western Pennsylvania home. no technology that will meet these and, importantly, it creates tax reve- standards. These proposed rules are of- nues for our schools. President Obama’s war on coal is a tentimes, as I just stated, impossible to Cloud Peak Energy recently signed threat to their livelihood and to our meet, and they fail to examine the an agreement with the Crow Tribe to communities. From the mine and science. open up access to more than 1.4 billion power plant workers who have received I was a heart surgeon in my previous tons of coal on the northern Powder pink slips because of misguided regula- career, and I can tell you I didn’t prac- River Basin, which would help inject tions, to the middle class moms who tice medicine based on ideology or millions of dollars into the Crow res- are trying to pay monthly utility bills, anecdote. I practiced based on sci- ervation’s economy. I met with Chair- to the restaurants and barbershops and entific fact. Many of the regulations do man Old Coyote of the Crow Tribe. He other small businesses concerned about not have the backing of science. said they have a vision of becoming fi- costs, President Obama’s onerous regu- Madam Speaker, we need a sound en- nancially independent on the reserva- lations will negatively impact our ergy policy that supports our Nation’s tion because of these coal opportuni- communities. coal industry to lower the cost of elec- ties. Coal is an essential part of our econ- tricity, create jobs, and make our busi- These are exciting opportunities, but omy and infrastructure. It is an abun- nesses more competitive internation- the industry is under attack. Fringe dant, affordable, and reliable source of ally. environmental groups continue to pres- energy that powers our streetlights, I’m proud to stand here today to sup- sure the administration and others to schools, and factories. Coal-fired power port coal in Indiana and across Amer- slow production and slow economic de- plants generate 40 percent of elec- ica, and I thank the gentleman from velopment. This must change. tricity in Pennsylvania and 37 percent Kentucky for holding this Special As Montana’s Congressman, I’m com- around the country. Electricity derived Order. mitted to working for commonsense re- from coal is more affordable for fami- Mr. BARR. I thank the gentleman. forms that ensure that our natural re- lies and businesses. I would now recognize the gentleman sources like coal can be developed re- The coal industry employs more than from Montana. sponsibly. 41,000 hardworking women and men across Mr. DAINES. I want to thank the With that, I thank the rest of my col- our commonwealth. Unfortunately, these work- gentleman from Kentucky this evening leagues here tonight for helping do the ers, their families, and their communities are for this opportunity to talk about coal. same. the ones who will suffer as a result of the I stand with my colleagues to show Mr. BARR. I thank the gentleman. EPA’s unreasonable regulations and President support for an all-of-the-above energy I now yield to the gentleman from Il- Obama’s war on coal. strategy. Montana possesses an abun- linois. These burdensome regulations have forced dance of hydropower, oil, sun, wind, Mr. RODNEY DAVIS of Illinois. I’d the electric generating industry to shutter coal- natural gas, and coal. And coal is a like to thank the gentleman from Ken- fired power plants and lay off workers. Six of very important piece of that equation. tucky for doing this Special Order to- these coal-fired power plants in our common- Coal provides the fuel for roughly 40 night, and it’s an honor for me to also wealth—including several in Western Pennsyl- percent of the electricity used in the follow my colleague from Indiana (Mr. vania—have been marked for closure since

VerDate Mar 15 2010 03:17 Apr 18, 2013 Jkt 029060 PO 00000 Frm 00045 Fmt 7634 Sfmt 9920 E:\CR\FM\K17AP7.080 H17APPT1 jbell on DSK7SPTVN1PROD with HOUSE H2114 CONGRESSIONAL RECORD — HOUSE April 17, 2013 the beginning of last year. The power com- ing these resources working at home IMMIGRATION REFORM pany placed part of the blame on the burden- for Americans with American energy. The SPEAKER pro tempore. Under some cost of federal environmental regulation. Mr. BARR. I thank the gentlelady. the Speaker’s announced policy of Jan- The resulting slowdown in demand and I appreciate all of my colleagues here uary 3, 2013, the gentleman from Cali- surge in costly regulation have forced coal this evening talking about and high- fornia (Mr. VARGAS) is recognized for 60 mines to shut down or reduce production. Last lighting the importance of the future minutes as the designee of the minor- summer, the head of a Western PA coal com- of energy freedom in this country and ity leader. pany attributed the idling of some of its mines independence. Mr. VARGAS. Thank you very much, to the escalating costs and uncertainty caused I would like to yield the balance of Madam Speaker. I appreciate it. by EPA regulations. our time to the gentleman from Cali- I would first like to say and take a Layoffs caused by shuttering of power fornia. moment to remember the victims of plants and idling of coal mines—and job Mr. LAMALFA I appreciate my col- the Boston attack. Certainly, my pray- losses in related industries—devastate middle- league from Kentucky having this con- ers and the prayers of all of us here go class workers, their families, and their commu- versation tonight and allowing me to to the families and everyone affected. nities. speak on it. I had the great opportunity to go to It is too easy for unelected federal elites in Being from California, we don’t have Harvard Law School and to graduate Washington to write regulations without an un- a lot of coal in California, and we don’t from that school and spend 3 years derstanding of the human costs of their ac- really use a lot of it either. But what I there. I ran the marathon once. Usu- tions. would like to point out is we have a ally, when you finish the marathon, That is why I am working with my col- very similar plight in that many of our it’s a great celebration. It’s an incred- leagues to pass the REINS Act. The REINS industries have been devastated by out- ible time. The people there are so Act will provide a check and balance on the of-control regulations by Federal Gov- friendly, so nice, and everyone is ex- Obama Administration by requiring that any ernment: our timber industry, mining, cited. So what this horrible tragedy regulation with an annual economic impact of our ability to trap more water for our has done is unbelievable, and our pray- $100 million or more be subject to the ap- water supply. Agriculture is also being ers go out to each and every one af- proval of the House and Senate. Last week, I affected by overreaching regulations. fected. voted in favor of the REINS Act in the House Also, coal is very important for our I also rise today in recognition of the Judiciary Committee. The Act was approved entire Nation, and it does have an ef- need for our great Nation to address and now moves to the full House for consider- fect on California, too. What I’m say- immigration reform. Tomorrow, many ation. ing here is that, with 42 percent of our evangelical churches are scheduled to Middle-class moms and dads, coal miners, Nation’s grid being powered by coal come to the Capitol to pray for just seniors, and those on fixed incomes deserve and a mandate coming down from the and merciful immigration reform. I the support of all of my colleagues in the EPA and the President’s very aggres- want to welcome them here. I think it House and Senate on a pro-growth agenda. I sive remarks saying that coal is a is about time that we listened to some call on both chambers to pass the REINS Act thing of the past, we’re going to put of the voices of these pastors, to some as a good first step towards sensible regula- our country in great peril by dev- of the voices of their congregations. I tion that helps grow all parts of our economy. astating this industry for our elec- welcome them here, and I’m very, very There is a war on coal in this coun- tricity grid. For all the many jobs that excited about their presence here at try, and it needs to stop. It’s time to are all over the eastern part of this the Capitol tomorrow. I know that keep the lights on in America. It’s time country and part of the West, we’re they will be praying for us. I know that to relight America, and we need to do really going to hurt ourselves in this they will be here to open up our hearts that here in this House and stop this country with this type of policy. and to listen to what immigration re- war on coal. b 1830 form can do for us, which is to set us With that, I thank the gentleman on a path of not only more justice but In California, we’ve seen the effects, from Kentucky. a more merciful path, so I am very ex- for example, in that we have a self-in- Mr. BARR. I thank the gentleman. cited about tomorrow. I would now like to yield to the gen- flicted mandate that makes it where I want to put this in the context of tlelady from Wyoming. California can no longer use coal, and what has been happening in the United Mrs. LUMMIS. I thank the gen- we’ve devolved down to only 8 percent States because of our immigration tleman for yielding and hosting this as part of our grid—and getting lower. laws, and I’d like read an excerpt from Special Order. So we’re going to be seeing higher and The New York Times. This is entitled, Wyoming is the largest coal-pro- higher energy costs in our State. Why ‘‘Immigration Status of Army Spouses ducing State in the Nation. It has been would we want to do this to the rest of Often Leads to Snags’’: since 1986. The 10 largest coal mines in our Nation here? California’s energy Lieutenant Kenneth Tenebro enlisted in the United States are in the State of costs are 14 cents per kilowatt while the Armed Forces after the September 11 ter- Wyoming. And we’re having trouble ex- the Nation’s average is about 10 cents. rorist attacks, signing up even before he be- porting our coal. Even if Americans That’s why we see an exodus of busi- came an American citizen. He served one don’t want to use it and would dis- ness from the State of California and tour of duty in Iraq, dodging roadside bombs advantage themselves in comparison to their moving to other States. If we do . . . but throughout that . . . mission, he other countries, we’d like to send it this type of thing in this country, this harbored a fear he did not share with anyone overseas to people who want it. mandate, we’re going to see a bigger in the military. Lieutenant Tenebro worried Who wants it? I’ll show you. exodus to places like China, where they that his wife, Wilma, back home in New York with their infant daughter, would be China, India, and even wants don’t have near our environmental reg- deported. Wilma, who like her husband was our coal. Yet here’s the United States, ulations. Indeed, China’s smoke plume born in the Philippines, is an undocumented this little dot. This is all the United comes over in the jet stream and af- immigrant. States wants. It’s silly, given this tre- fects California. We’re going backwards ‘‘That was our fear all the time,’’ he said. mendous resource the United States with this type of mandate, with this When he called home, ‘‘She often cried about has that produces jobs and revenue and type of policy. it,’’ he said. ‘‘Like, hey, what’s going to hap- electricity that keeps our manufac- So, for many reasons, I think it’s key pen? Where will I leave my daughter?’’ turing competitive, to have to send it that we support the coal industry in It goes on and explains: to those other countries. They want it America—for our economy and for our Like Lieutenant Tenebro, many soldiers, because they want what we have. They electricity grid. For those who want to anticipating rebuke and possibly damage to want inexpensive, affordable, abundant be agitators against coal, then they their careers, do not reveal to others in the energy so their people can manufac- should be the first ones to sit in the military their family ties to immigrants here illegally. ture. dark, in the cold, from not having elec- Mrs. Tenebro is snagged on a statute, noto- We need to protect these jobs in man- tricity on the grid. rious among immigration lawyers, that ufacturing. We need to protect the af- Mr. BARR. Madam Speaker, I yield makes it virtually impossible for her to be- fordability and the reliability by keep- back the balance of my time. come a legal resident without first leaving

VerDate Mar 15 2010 03:17 Apr 18, 2013 Jkt 029060 PO 00000 Frm 00046 Fmt 7634 Sfmt 0634 E:\CR\FM\A17AP7.021 H17APPT1 jbell on DSK7SPTVN1PROD with HOUSE April 17, 2013 CONGRESSIONAL RECORD — HOUSE H2115 the United States and staying away for 10 documented. I am afraid that they’re going So let’s review, then, a little bit of years. to pull us over and they’re going to deport the immigration laws in our Nation. So our current law requires that the her. Then what am I supposed to do? How am The Naturalization Act of 1790 stated wife of this brave American soldier I going to take care of myself and my kids? that Congress adopted the uniform rule leave the country for 10 years before This is a very unjust law. This law so that any free white person could her status can be legalized. There are has to be changed. How can it be that apply for citizenship after 2 years of very few things that I can think of that we can allow this? One of our brave sol- residency. So if you were here, if you are less just than that law, and that diers is called by his Nation to fight. lived here for 2 years, you could be- law must be changed. He fights and he’s injured. He comes come a resident. I want to thank the Senators, the home, and his loving wife takes care of Then there were minor changes, and Group of Eight—I don’t like the word him, and his fear is that his wife is in 1882, we had the Chinese Exclusion ‘‘gang’’ because I’m from California, going to be deported. We have to Act of 1882. It was the first Federal im- and there it has a very negative con- change this law. We have to change migration law that suspended Chinese notation. I don’t think of the Senators this law because it’s unjust. immigration for 10 years and barred as gangs or as anything other than I would like to take a moment to re- Chinese in the U.S. from becoming citi- good guys over there, so I want to view what our immigration law is, be- zens. A terrible law that, of course, we thank the Group of Eight that has cause a lot of people say, Well, you changed. Why? Because it was malum come forward with these proposals, be- know, these people broke the law. They prohibitum. It was a dumb law. It was cause I think these proposals are very, broke the law. Maybe they should be an immoral law. We changed it, and we very important. deported. Maybe the soldier’s wife should’ve changed it. Thank God we You might think that Wilma and should be deported. She broke the law. changed it. Lieutenant Tenebro are unique, but I would say this: let’s take a look at Then in 1892 we opened up Ellis Is- they’re not. In fact, we’ve heard testi- the law because the law is very inter- land. No one ever talks about Cali- mony here, interestingly. A brave ma- esting. I’m an attorney, and I can tell fornia, by the way. We had Angel Is- rine said something in such stark you this, that the law usually is di- land located in San Francisco. Not as terms that I’ll never forget it. He came vided in a very special way, and that is: many people went through Angel Is- and told his story, and he said this: malum in se and malum prohibitum. land. In fact, between 1892 and 1953, in I’ve been through two tours of duty in Iraq, b 1840 we had over 12 million im- and I’m going back to Afghanistan. I’m not migrants that were processed in that afraid of dying, ‘‘because that’s what soldiers So what is malum in se? Malum in se facility. Angel Island had nowhere near do.’’ is this. Malum in se means the thing is that. I thought that was really stark. He’s wrong or bad in itself. It’s malum in What was the law then? The law said not afraid of dying in fighting for our itself. Malum in se. So, for example, this: first-and second-class passengers, country, but what he said he was afraid murder, murder is illegal because it’s those on ships, were not required to un- of was that his wife might be deported. malum in se. It’s always wrong. It’s dergo inspections at Ellis Island unless It was the exact same thing as Lieuten- bad. It’s wrong to murder and it’s ille- they were sick or had legal problems. ant Tenebro. His fear was not that he gal to murder, so that’s malum in se. So, in other words, you showed up; would be killed in action. His fear was So what is malum prohibitum? come on in. That’s the law. That was that his wife would be deported. He Malum prohibitum is it’s bad or wrong the law. You showed up; come on in. said, What will I do then with my two or illegal because it’s prohibited, not You’re in first-class, second-class on a children? What will happen with my because it’s wrong or immoral in itself. ship, yup, come on through. No prob- two children if they deport my wife? So the act itself is not wrong; it’s sim- lem. He told the story that he met his ply illegal because we make it illegal. Third-class passengers had to under- wife at church. I understand from him A good example is the speed limit. You go a medical and legal inspection. If in she’s a beautiful young lady. They fell could be traveling 56 miles an hour in good health and papers in order, the in love, they got married, and they a 55-mile-an-hour zone. Now you’ve process took 3 to 5 hours, and then began to have children. The next thing broken the law, but have you done they were citizens. That was the law. he thinks about is—well, he gets de- something immoral? Have you done That was the law. So it’s very inter- ployed to fight for his country, and something wrong? Well, you broke the esting when people say, Well, we did it he’s proud to do it, but his fear is that law, but you know what? You didn’t the right way. My ancestors did it the his wife and his kids will be separated, endanger anybody. And, in fact, your right way. that the family will be broken. car is built to go safely at 56 miles an They came here. There was basically He did a very interesting thing that hour. The road, we call them in Cali- no law. All you had to do was walk in. I’ve heard a couple of soldiers do now. fornia freeways, the freeway was built It was very interesting. He has covered his wife’s car with ‘‘Go, to do 70, so you’re actually obeying Then there were minor changes. But Marines. My husband is a marine in common sense. So it’s illegal only be- in 1986, we had a major change—the Iraq.’’ He says he has blanketed his car cause it’s malum prohibitum, because Immigration Reform and Control Act with that, suspecting that they won’t we created the law, not because it’s of 1986. It is also known as the Simp- pull her over for a minor traffic issue wrong in itself. And, in fact, we often son-Mazzoli Act. And what this law because, if they do pull her over, the change the law because we say that’s a did, it set a ceiling of 540,000 immi- police will find out that she does not silly law. It doesn’t make sense to grants a year. It also required employ- have a driver’s license because she’s travel 55 miles an hour on a freeway, so ers to attest to their employees’ immi- not a citizen. So his fear is that they’re we change the law to 70. Although I gration status, that they were here le- going to deport her. What will become drove through Texas, and I see that gally, and made it illegal to knowingly then of their kids? they have 75. They think it’s safe at 75, hire or recruit unauthorized immi- Again, he’s not unique. We also met which is great. I’m sure it is. And so grants. It legalized certain seasonal ag- here—and he testified over in the Sen- they changed the law. Why they’d ricultural immigrants, and it legalized ate—a gentleman who was an Army change the law, because there’s noth- illegal immigrants who entered the soldier. He was in the Army. He went ing wrong or immoral about it. It’s United States before January 1, 1982, to Iraq, and unfortunately, he was in- simply malum prohibitum, so they and had resided here in the United jured. He then came home, and thank changed the law. That’s what we have States continuously. God for his loving wife, who has taken to do with our immigration laws. And who signed the law? Ronald care of him, and his children. He has When a person comes here to work, Reagan. Ronald Reagan signed the law. the opportunity then to live with when a wife like Wilma lives here with It’s very interesting because I’m a Cali- them, but they live in fear. He says: her husband, she’s not violating any fornian. Ronald Reagan, even though I’m captured here. I am a prisoner of my type of moral law. She’s violating he is from Illinois originally, we claim country. I’m afraid to go anywhere because I malum prohibitum, a law that we made him as one of our own. We’re very can’t drive. My wife drives, but my wife’s un- that we can change. proud of Ronald Reagan in California,

VerDate Mar 15 2010 03:17 Apr 18, 2013 Jkt 029060 PO 00000 Frm 00047 Fmt 7634 Sfmt 0634 E:\CR\FM\K17AP7.084 H17APPT1 jbell on DSK7SPTVN1PROD with HOUSE H2116 CONGRESSIONAL RECORD — HOUSE April 17, 2013 and even as a Democrat, I’m very The truth is there are numerous biblical me.’’ (Matthew 25:35–36). Jesus clearly man- proud of Ronald Reagan. I’ve always reasons for advocating for immigration re- dates that we are to treat the immigrant and liked Ronald Reagan. I thought he was form. Indeed, our Judeo-Christian history as the alien as we would treat Jesus himself. Other New Testament readings after Jesus a good man, and I think he set a great people is built on immigration, and Jesus, who himself is the new covenant with us, continue to emphasize the just and humane example. He certainly set a great ex- calls us to be compassionate to all. treatment of our immigrant brothers and ample when it came to immigration. He goes on and says: sisters. First, we read that we, though per- He looked at the humanity of the im- haps not actual immigrants, are called to see migrants here, and I’ll read a couple of Early in Genesis, we find God’s exhortation ourselves as people who have no home here to Abraham: ‘‘Leave your country, your peo- quotes from him a little later on, but on Earth, that our destination is beyond this ple, and your father’s household and go to world: ‘‘But our citizenship is in heaven, and he signed it, and it was something he the land I will show you.’’ never regretted. He never regretted. from it we also await a Savior’’ (Phillipians That’s from Genesis 12:1. 3:20) and ‘‘Beloved, I urge you as aliens and Just the opposite. He said, I regretted He goes on and says: sojourners to keep away from worldly desires raising taxes in California and a bunch God makes a promise to Abraham to make that wage war against the soul.’’ (1 Peter of other bills that he signed when he him a great nation. It is a promise of a bet- 2:11). was still a fairly young Governor, but ter life, a better future. And second, we are called to be just and he never regretted this. Just the oppo- fair in our treatment of immigrants. ‘‘Con- Again, a quote from the Bible: site; it was something that he was tribute to the needs of the holy ones. Exer- proud of. ‘‘I will make of you a great nation, and I cise hospitality.’’ (Romans 12:13). ‘‘Let mu- will bless you; I will make your name great, So what now? Where do we go from tual love continue. Do not neglect hospi- so that you will be a blessing.’’ tality, for through it some have unknow- here? I think what we should do is we Genesis 12:2–3. ingly entertained angels.’’ (Hebrews 13:1–2). should remember the people that are He goes on and says: coming tomorrow, the evangelical pas- This is God’s calling his people to immi- tors and churches, and thank them for gration as their pathway to greatness, and In sum, as people of Judeo-Christian herit- we of Christian and Jewish faith cannot deny age, and as people of faith, we cannot escape coming and opening our hearts. I want that our roots are built on immigration, on or get around Jesus’ call to exercise hospi- to read a few letters from both Catho- God’s call to us to be migrants. tality towards our immigrant brothers and lic priests, pastors and a rabbi, and see And once we arrive at our destination, we sisters. Jesus’ call to love one another as He what they think about immigration be- cannot rest there, but we must remember loves us requires that we not simply do the cause it has been very interesting. I do what it was to be immigrants, to be aliens. least or the minimum just to get by, for that watch here some of the speeches that God instructs us, His people, ‘‘to love those is not how He has loved us. Jesus has loved are given, and I have to say that who are aliens for you, yourselves, were us to the maximum. So, also, we are called aliens in Egypt’’ (Deuteronomy 10:19) and to they’re very negative about immi- to go above and beyond what could be ex- treat strangers by providing a place of rest, pected in order to love others. In this coun- grants. You hear about all the terrible food, and hospitality: ‘‘Let some water be try, this would imply granting full citizen- things, the parade of horribles that brought that you may bathe your feet and ship to our undocumented brothers and sis- some people come up here and talk then rest yourselves under the tree. Now ters. Less than this would be creating a level about day after day after day, and that you have come close to your servant, of society that is devalued as persons, and you’d think that most immigrants are let me bring you a little food that you may this would be in direct violation of every- terrible. It would be as if I came up refresh yourselves.’’ (Genesis 18:4–5) thing that Jesus teaches. To be a person of here and talked about some of the ter- b 1850 value in this democratic country is to be a rible things that some mothers do, and person with a voice, a person with a vote. Scripture is clear on the treatment of This is the democratic foundation of our say, Well, mothers are terrible. We the immigrant. We read this time and country. should get rid of mothers. That’s ridic- again in passages like the following: He goes on and ends like this: ulous. ‘‘When an alien lives with you in your The reality is most immigrants are Thank you for reading this letter to fellow land, do not mistreat him. The alien living leaders in Congress. I, together with my pa- very hardworking people. They come with you must be treated as one of your na- rishioners of Dolores Mission, and with 26 here for a better life. They work hard. tive-born.’’ other multi-faith congregations of Los Ange- I want to read a few letters from pas- I’m going to read that again: les, and 1 million families in 150 cities of this tors and priests and a rabbi that talks country which make up PICO, am praying ‘‘When an alien lives with you in your for your good discernment as you propose to to this and puts it into the context of land, do not mistreat him. The alien living enact an immigration reform which is just Scriptures because I think it is very with you must be treated as one of your na- and humane, rooted in our faith and biblical important. Obviously they are here to- tive-born. Love him as yourself, for you were values. morrow because they read the Scrip- aliens in Egypt. I am the Lord your God.’’ Gratefully and faithfully yours, tures, they believe in the Scriptures, (Leviticus 19:33–34) Father Reverend Scott Santarosa, S.J., So- and that’s why they’re here tomorrow; Then Father goes on and quotes from ciety of Jesus, Pastor. and I want to put this debate within Deuteronomy: I want to thank Father Santarosa. I that context because I think that we ‘‘Cursed is the man who withholds justice want to let him know that tomorrow are a very fair and merciful people. I from the alien, the fatherless or the widow.’’ he will have help here. He will have think we are a God-fearing people. I He then quotes Exodus 23:9: plenty of help from the evangelical think we need to put this immigration ‘‘Do not mistreat the alien or oppress him, ministers and pastors that will be here debate within the context of our faith for you were aliens in Egypt. Do not oppress tomorrow on hand to open up the communities, and so I’m going to read an alien; you yourselves know what it feels hearts and the minds of those that are this letter. to be aliens, because you were aliens in not yet convinced that we have to have The first letter is from Father Scott Egypt.’’ a humane, a just, and a merciful immi- Santarosa. He’s the pastor at Dolores Father Santarosa goes on and says: gration reform package. And I thank Mission Catholic Church in Los Ange- Jesus himself is an immigrant, as very him. les, California. He’s a Jesuit. He ad- early in His life He and His parents, Mary The second letter that I’d like to dresses this letter to me and it reads and Joseph, are forced to flee to Egypt for read is from Father Sean Carroll. Fa- like this: His safety. We must understand that His her- ther Sean Carroll is the executive di- Dear Congressman Vargas, itage as a Jewish person and as an immi- rector at the Kino Border Initiative for grant informed His teachings on how we are I applaud your enthusiastic support of Nogales, Arizona, and Nogales, Sonora, comprehensive immigration reform that in- called to treat the other, in particular the most vulnerable among us. Jesus goes so far Mexico. He also addresses the letter to cludes a pathway to citizenship. I believe me and says this: you are correct in stating, as you did before as to say that how we treat the least among the House of Representatives last week, that us, namely, the immigrant, is how we treat Dear Congressman Vargas: immigration reform is one of the most press- him: ‘‘For I was hungry and you gave me Since 2009 I have been working with de- ing moral issues of our time. something to eat. I was thirsty and you gave ported migrant men, women and children me something to drink. I was a stranger, and along the U.S./Mexico border. These past 4 He says it’s ‘‘one of our most pressing you invited me in. I needed clothes and you years I have witnessed firsthand their moral issues of our time.’’ clothed me. I was sick and you looked after brokenness in body and spirit when they are He goes on and says: me. I was in prison and you came to visit deported due to days and weeks in detention

VerDate Mar 15 2010 04:23 Apr 18, 2013 Jkt 029060 PO 00000 Frm 00048 Fmt 7634 Sfmt 0634 E:\CR\FM\K17AP7.086 H17APPT1 jbell on DSK7SPTVN1PROD with HOUSE April 17, 2013 CONGRESSIONAL RECORD — HOUSE H2117 and forced separation from their spouses and excited about college. We’re very ex- an evangelizing preacher here, and in children. I have held the hand of the mother cited for her. She started off with a my evangelization I have brought in separated from her children in Chicago, and great tempo and we thought wow, this people who are undocumented. And listened to the father deported away from his is going to be a great story. She’s a they’re wonderful. They come, they two children in North Dakota. I have been present with the mother so far apart from lovely young person. She was telling pray. They make my church a better her children in New York and with the son her story and we were all excited to lis- place. Some of them have married, he seeking to be reunited with his mother in ten and hear what was going on in her mentioned two people, in fact, who Central California. life. And then she stopped for a mo- were in the Navy, the people in his con- He goes on and says: ment, sort of an awkward cadence, and gregation. He says, I’ve changed. I was I know God calls us not to oppress the started crying. She said, Of course, my wrong about them. widow, the orphan and the stranger (Exodus parents have just been deported. She So I thank the evangelical churches, 22:21–22 and Deuteronomy 27:19) and yet I said she didn’t know what to do be- most of whom now are ardent sup- have been a witness to how we essentially cause her parents had been deported. porters of immigration reform, a com- make widows out of women migrants when It really was a shocking moment to prehensive immigration reform that’s we deport them away from their husbands in me to listen to her because she’s an just, that’s merciful, that leads to citi- the United States. I am also keenly aware of American citizen, she was born here, zenship so people are not second-class how we turn U.S. citizen children into or- but her parents are undocumented im- citizens. I want to thank them. phans by repatriating their migrant parents migrants. Right at the moment of Tomorrow, I know that they’re going to Mexico and placing their sons and daugh- to have an opportunity to mix among ters in foster care. And I see the ways we re- great accomplishment, the moment of ject the stranger in our midst, the person great pride for her, and I’m certain for us Congress Members and senators. seeking a better life for themselves and their her parents, her parents are pulled And I hope that we have an open heart families, the one who in the Gospel of Mat- away, not because they’re terrible, not to receive them and to receive their thew (25:35–40) reflects the presence of Jesus because they have done anything words because I think they’re here on a himself. wrong other than try to provide a bet- good mission. What would happen if we accepted God’s ter life for themselves and for their I would like to read a letter from invitation to remember the moments that daughter, but because they’re undocu- Mark Potter. He is the Provincial As- we were in exile (Exodus 22:21), the times sistant for the Social Ministries at the when we felt like strangers, and to recall mented. The good thing is that we have a California Province, Society of Jesus, how God has led us through those experi- the Jesuits. And it reads like this: ences to new life? My memory of God’s ac- chance to do something about this. We tion in my own struggles and challenges have a chance to pass immigration re- In the Hebrew scriptures the story of Israel compels me in gratitude to put this Word of form that’s merciful, that lives up to is a story of a people on the move, called by God to migrate and to become strangers in God into practice in the here and now, to the values that we hold dearly in this support a path to citizenship for our undocu- strange lands, motivated by God’s promise of country. And so I’m very excited about something better—a better life, a better fu- mented sisters and brothers, to reunify fam- this reform. I’m very excited about to- ily members separated due to mixed immi- ture: ‘‘The Lord said to Abram: ‘Go forth gration status, and to provide some ways for morrow, frankly. I have to be honest from your land, your relatives, and from people that come to work in the United and say I’ve always been in favor of im- your father’s house to a land that I will show States with dignity and with their human migration reform. I thought that Presi- you.’ ’’ This is how the people of Abraham rights respected. dent Reagan got it right, that we wound up in Egypt, where they were forced Jesus quotes the book of Isaiah (61:1–2) should have a humane policy towards into captivity. The Egypt experience of being enslaved because they were immi- when He opens the scroll and says, ‘‘The immigrants. I think he was following Spirit of the Lord is upon me, because He has grants became for Israel the touchstone of certainly the Good Book. I appreciate God’s command to treat aliens with hospi- anointed me to bring good news to the poor. Ronald Reagan, and I appreciate all He has sent me to proclaim release to the tality. captives and recovery of sight to the blind, those that felt like him previously. And they certainly have. And I thank to let the oppressed go free, to proclaim the I’ve always thought that we should the Jewish community. I know a num- year of the Lord’s favor. Today, this scrip- have immigration reform that makes ber of rabbis in San Diego, and they are ture has been fulfilled in your hearing.’’ sense. But not everyone was always the first people to defend immigrants (Luke 4:16–19; 21). I firmly believe that God convinced of this. In fact, a few years in such a strong way. And I thank the has given us the gift of His Spirit, the same ago, I had a conversation with a pastor Jewish community. That faith commu- Spirit that Jesus breathed on His friends in San Diego who was pretty sour on when he rose from the dead (John 20:19–22). It nity is one that has always had the im- the notion that we should give an op- migrant at heart. I thank you from the is a spirit that empowers us to make the portunity for the people that came promise and command of the word, God’s bottom of my heart. word, a reality, by working for comprehen- here without documents to stay. We It goes on with a quote from Deuter- sive immigration reform. got into a heated but loving discussion. onomy: I do love the pastor. He’s a great guy. b 1900 ‘‘So you, too, should love the resident But we got into somewhat a heated dis- alien, for that is what you were in the land He concludes by saying this: cussion. I said, I don’t see how this of Egypt.’’ Care and hospitality for the Please count on my prayers for you and tracks the Bible. I know the Bible pret- stranger became a hallmark of Jewish eth- the other Members of Congress, as you follow ty well. I studied to be a priest myself ics, law, and culture, famously invoked doz- God’s word on this issue of great importance for 5 years. So I certainly read the ens of times throughout the Hebrew scrip- for us as a country and as a people of faith. Good Book and am humbled by what’s ture as the particular concern for the Sincerely yours in Christ, ‘‘widow, the orphan, and stranger in your Reverend Sean Carroll, Society of Jesus in there. I said, I challenge you to go midst.’’ Living according to these values be- Executive Director through there and find a place that came for Israel a sign of fidelity to God’s Kino Border Initiative criticizes the immigrant, that criti- laws. Violating this concern for the widow, Nogales, Arizona, and Nogales, Sonora, cizes the stranger. Because it’s just the the orphan, and the alien became reasons for Mexico. opposite. God’s judgment against his people. Thank you, Father Carroll. I appre- Anyway, we got into a theological Exodus 22:20–22: ciate that very much. discussion. And we remain friends. I ‘‘You shall not oppress or afflict a resident alien, for you were once aliens residing in Father Carroll very poignantly says met him again recently and he told me the land of Egypt. You shall not wrong any that our policy today makes orphans that he was praying for me and for the widow or orphan. If ever you wrong them and out of children of migrants. rest of us in Congress to pass a very they cry out to me, I will surely listen to Recently, I had the opportunity in comprehensive, just, merciful reform their cry.’’ San Diego to listen to a young lady package. And I said, Pastor, I remem- Leviticus 19:33–34: who is very accomplished in her short ber our conversation. He says, Yes, so ‘‘When an alien resides with you in your life. I believe she’s 17 years old. She’s do I. He said, I was wrong. I said, What land, do not mistreat such a one. You shall treat the alien who resides with you no dif- very excited about going to college happened? He said, I want to say it was ferently than the natives born among you; next year. She attends the Preuss simply the Bible. I read it. But the re- you shall love the alien as yourself; for you School. It’s a magnet school at UCSD. ality is my congregation has changed. too were once aliens in the land of Egypt. I, She has very, very good grades and is We evangelize. That’s our mission. I’m the Lord, am your God.’’

VerDate Mar 15 2010 03:17 Apr 18, 2013 Jkt 029060 PO 00000 Frm 00049 Fmt 7634 Sfmt 0634 E:\CR\FM\K17AP7.089 H17APPT1 jbell on DSK7SPTVN1PROD with HOUSE H2118 CONGRESSIONAL RECORD — HOUSE April 17, 2013 Deuteronomy 27:19: the myriad of organizations that have might address the need to improve the port’s ‘‘Cursed be anyone who deprives the resi- worked within our city to support immi- infrastructure. It can address human and dent alien, the orphan, or the widow of jus- grants and refugees over many decades. Over civil rights implications and enforcement tice! And all the people shall answer, the years, in the spirit of good faith, we have mechanisms. It can advocate for a broad and ‘Amen.’ ’’ urged our City Council members to take a inclusive pathway to citizenship without He goes on and quotes a number of stand with immigrant and refugee commu- burdensome obstacles. passages from the Bible. And then he nities who live and work in the city of San As representative organizations and coali- concludes his letter by stating this: Diego. tions, we urge you to adopt a resolution that As the conundrum of our broken immigra- supports a reasonable and comprehensive ap- The most literal reference to care for the tion system has affected all of us in profound proach to immigration reform. stranger is found in the famous story of the ways, many times over the years the City Final Judgment in Matthew 25, where Jesus It’s signed, Sincerely Rabbi Laurie Council of San Diego has been at the fore- Coskey, Educational Doctorate, Execu- instructs His followers about how they will front of human rights issues that affect the ultimately be judged by how they treated people living and working here. We come to tive Director, Interfaith Committee for the most vulnerable: ‘‘The King shall say to you now, recognizing the importance of your Worker Justice; Pedro Rios, Chair- those on His right, ‘Come, you who are voice. person, Director of the San Diego Im- blessed by my Father. Inherit the kingdom Today, we stand at a unique moment in migrant Rights Consortium and the prepared for you from the foundation of the history, where the Federal Government has American Friends Service Committee. world. For I was hungry and you gave me recognized that the immigration laws and food, I was thirsty and you gave me drink, a I want to thank Rabbi Laurie Coskey policies are no longer of benefit, and that for this letter. I also want to thank stranger and you welcomed me, naked and they are stretching to craft a new com- you clothed me, ill and you cared for me, in prehensive immigration policy that we pray Pedro Rios for coauthoring this letter. prison and you visited me.’ ’’ (Matthew 25: will be generous, humane, and trans- I have to say that one of the reasons 34–37) formational for those who live and work that I’m up here reading these letters Tomorrow we will have, again, the here. is that there are a lot of people that opportunity, and I hope that we all As the leaders of the largest border city in want to be heard out in the Nation take the opportunity to meet with the the United States, we passionately urge you about this issue of immigration. From pastors that are going to be here, the to take a leadership stand by passing a bi- this podium, day after day after day, evangelical churches. partisan resolution in support of reasonable they’ve only been hearing the negative immigration policy reform. voices, the parade of horribles, the in- b 1910 In parenthesis, they did, they did ex- stances when immigrants have failed I would like to quote a pastor who actly that. They did it unanimously. or have even committed horrible wrote very eloquently. He is a doctor, And I thank the San Diego City Coun- crimes, and some have. But unfortu- Pastor Dr. Richard Land, outgoing cil—every member, the Democrats and nately, it has been somewhat of a less president of the Southern Baptist Con- the Republicans. Thank you. Thank than veiled attack on all immigrants, vention’s Ethics and Religious Liberty you deeply for that. especially those that came to this Commission and executive editor of They go on and say: country for no other reason but to bet- The Christian Post. He writes: Because of the prominence of San Diego, ter their lives and to work very hard so Southern Baptists have gotten to know im- your bipartisan resolution can serve as an their children could have a better life. migrants as brothers and sisters in Christ. It example and as a model to the Federal legis- That’s the American Dream. That’s the lators that the benefit of such policy change has put a human face on this. American Dream for all of us, for our He also pointed out that Southern demands bipartisan collaboration and agree- ment in order to pass sweeping immigration children, that we can have a better life. Baptist churches now include several policy reform. To put it simply, by working I want to read now from President hundred thousand Hispanics as a result together quickly, you may teach the Con- Ronald Reagan. Again, many of us are of their evangelization efforts. An His- gress what bipartisan collaboration can ac- very proud of Ronald Reagan. I will panic pastor told Reverend Land that tually accomplish. give Illinois their due, he was from he estimates that as many as 40 per- They did exactly that. They acted to- there originally, but the reality is he’s cent of those Southern Baptist His- gether; they acted swiftly; they acted a Californian. If you look at the statue panics probably do not have legal sta- unanimously; they acted compas- here in Statuary Hall, he’s here as a tus in this country. sionately. I hope we do the same. Californian. So I’m very proud of him. So I am very excited about tomor- They go on and say: As a Democrat, I’ve always been very row. I know that Dr. Pastor Richard Additionally, your action will encourage proud of him. I say that, and some of Land and others are praying for us. immigrant and refugee community members my Democrat friends, they get a little They’re very excited about coming and and their supporters by demonstrating that nervous about that. The reality is I’m speaking to us and opening up our their city representatives understand and very proud of him. I didn’t agree with hearts and our minds and making sure support the call for reforming immigration everything, obviously, but I agreed that we do the right thing, which I’m laws. We all recognize that in recent years the with his humanity. sure we will do—I’m hoping we will do. I think we will see that in some of The last letter that I’m going to read failure of Congress to reform immigration these quotes. I think what made is a letter that was actually written by laws has led to great hardships for too many people who live in fear. In San Diego, we Reagan a great person and a great Rabbi Laurie Coskey, executive direc- have witnessed the devastating impact of the President was that he didn’t stick to tor of the Interfaith Committee for broken immigration system. Families have some of the tired dogma of others. In- Worker Justice, and Pedro Rios, chair- been torn apart in immigration raids; immi- stead, he led us forward as a great person of the San Diego Immigrant grant workers are silent in the face of abu- President. I quote him: Rights Consortium and director of the sive labor practices; distrust has generated American Friends Service Committee. fear for immigrants, who otherwise con- Unless the United States makes a more tribute to the social fabric of our commu- sensible and efficient system for admitting The letter is addressed to the San legal migrants who come to take advantage Diego Council, which just last week nities; and the current immigration laws have led to an unbalanced focus on enforce- of work opportunities, no reasonable level of unanimously approved a resolution in ment. enforcement is likely to be enough to resolve support of comprehensive immigration To be sure, the city of San Diego would not this illegal immigration problem. reform. be America’s finest city without numerous How true he was. How true he is still. I would note that the San Diego City ways that immigrant and refugee commu- I also agree with former President Council is made up pretty equally of nities contribute economically, culturally, Reagan when he said the following, re- Democrats and Republicans, and here and socially, from the agriculture fields in ferring to the Immigration Reform and northern San Diego County to the tech in- they put aside partisanship and they Control Act, again, the Simpson-Maz- strongly passed a resolution in support dustries, and adding to the cultural vibrancy that make San Diego an attraction to people zoli Act of 1986: of comprehensive immigration reform. around the world. We have consistently supported a legaliza- So this is the letter that Rabbi Laurie As a border city, San Diego is uniquely po- tion program which is both generous to the Coskey and Mr. Pedro Rios wrote: sitioned to address immigration issues and alien and fair to the countless thousands of Dear San Diego City Council, we are writ- to offer insight into what reasonable immi- people throughout the world who seek le- ing to you today representing ourselves and gration reform might look like. A resolution gally to come to America.

VerDate Mar 15 2010 03:17 Apr 18, 2013 Jkt 029060 PO 00000 Frm 00050 Fmt 7634 Sfmt 0634 E:\CR\FM\K17AP7.091 H17APPT1 jbell on DSK7SPTVN1PROD with HOUSE April 17, 2013 CONGRESSIONAL RECORD — HOUSE H2119 You know what? Ronald Reagan was of Evangelicals; Stephan Bauman, ters that are going to come tomorrow generous. I hope that each and every President and CEO of the World Relief; to pray for us, to pray that we open up one of us can have that spirit of gen- David Beckmann, President of Bread our hearts, pray that we will see the erosity, that magnanimous spirit that for the World; Noel Castellanos, CEO of immigrant as the stranger in Matthew he had. Christian Community Development As- 25, that we will treat them in a way I’m going to quote him again and sociation—I could go on and on and on that is humane and that cherishes our continue with his quote: because this thing goes on for pages. values as Americans. The legalization provisions in this act will My trustee staff gave me pages and Madam Speaker, I thank you very go far to improve the lives of a class of indi- pages and pages of leaders in the evan- much for the opportunity today to viduals who now must hide in the shadows gelical churches that have signed on to speak. I think this is a very important without access to many of the benefits of a this, so I won’t go on and read all the issue, an issue that I have great faith free and open society. Very soon many of these men and women will be able to step names. in God that will be resolved according into the sunlight, and ultimately, if they But I will say this. I believe we will to our best values; and our best values choose, they may become Americans. come to an agreement on immigration. are those of mercy. I do believe that. I honestly believe I thank you very much, and I yield b 1920 that. I do believe that the prayers that back the balance of my time. I thank Ronald Reagan because I the faith communities are directing to- f think he was very generous. It’s very wards us, and especially towards the interesting how many Republicans are immigrants, are going to be heard. I CURRENT EVENTS IN REVIEW running away from his legacy on this, believe that. I believe it deeply that The SPEAKER pro tempore (Mrs. his legacy of generosity. You shouldn’t this time we won’t fail, that this time WALORSKI). Under the Speaker’s an- be running away from it; you should be will be different, that this time, in nounced policy of January 3, 2013, the running towards it; you should be run- fact, we will pass a law that is just, a Chair recognizes the gentleman from ning to it. You will be like him if you law that treats immigrants as we’re Texas (Mr. GOHMERT) for 30 minutes. have that spirit that he had, the spirit supposed to treat them, as it says in Mr. GOHMERT. Madam Speaker, we of a generous soul. this Good Book. As our values as know that there is so much going on I know I have a few minutes left Americans, I think that we will have a after the tragedy in Boston where not here, and I thank the Speaker very just, a merciful immigration law, and just Boston was attacked, but the much for the opportunity that they’ve I’m very excited about it. United States was attacked by acts of given me here. Normally I don’t speak I wanted to end with a story of a sheer evil, perpetrators who did not this long, but I thought it was impor- young woman that came and testified care about innocent people and inno- tant to come and hear another voice, in California last year. I spoke about it cent lives. They thought it better to not just the voice that condemns the in California and I want to speak about try to kill, maim, and destroy. What immigrant, a voice that says there’s it here, because it’s one of those in- sick, twisted, evil human being or millions and millions and millions of credible tragedies in life, and I called human beings would do that? Americans out there, in fact, a great it, ‘‘Two Days in Mexicali.’’ And, un- But we saw 9/11/2001 vividly clear. majority now, that want comprehen- fortunately, for many of us Califor- There actually are people who are so sive immigration reform that’s just, nians, when we think about 2 days in radical, so mean, so evil, so twisted that matches up with our values of a Mexicali or 2 days in Tijuana, it’s nor- that they actually believe they could generous people. mally not the 2 days that I’m going to make for themselves a way to paradise This is a statement of citizenship speak about here. by killing innocent people, killing chil- from the evangelical churches. This is Instead, this was a young lady. This dren not even old enough to have really the evangelical statement of principles was a young lady who was born in done anything wrong, and that is what for immigration reform. Mexicali. Her mother was a prostitute they obviously felt would make their Our national immigration laws have cre- and a drug addict. They lived in Los great mark in the world. I can’t help ated a moral, economic, and political crisis Angeles. The mother had been born and but strongly believe with all my heart in America. Initiatives to remedy this crisis raised there. She went to Mexicali and that, unless they repent and find grace, have led to polarization and name calling, in then had a child in Mexicali. which opponents have misrepresented each they are in for a very rude awakening other’s position as open borders and amnesty She abandoned the child there, and in the next life. versus deportations of millions. This false this child’s grandmother went and It is my hope, as well, that the indi- choice has led to an unacceptable political found her, brought her back to Los An- vidual or individuals who are respon- stalemate at the Federal level at a tragic geles. And the grandmother was, I sus- sible will be held to account with the cost of human life, at tragic human cost. pect, a very Christian, devout woman, death penalty that will be imple- As evangelical Christian leaders, and raised this child in a beautiful mented behind closed doors, without they say: way, because for 13 years she developed cameras present, without an oppor- We call for a bipartisan solution on immi- into a very successful student and a tunity for them to yet insult or hurt gration that respects the God-given dignity very nice person. anyone else. They’ve done enough. of every person, protects the unity of the im- We got to meet her because she was, mediate family, respects the rule of law, I guess, 19 years old. She had turned 19, b 1930 guarantees secure national borders, ensures and she had not known that she was an We’ll await to see who it is that ends fairness to taxpayers, establishes a path to- undocumented person because that up being responsible. Perhaps there’s ward legal status and/or citizenship for those never came up. So, instead, she lived an announcement tonight, perhaps not. who qualify and those who wish to become permanent residents. We urge our Nation’s her life thinking she was an American I am glad that even though there was leaders to work together with the American citizen. Then she applied for college. a person of interest, that the investiga- people to pass immigration reform that em- And at that point, we hadn’t changed tors did not rush to judgment on that, bodies these key principles and that will the law yet as they had in Texas to that they continue to explore every make our Nation proud. allow an undocumented person to get possible clue, every possible video and There’s heads of the evangelical im- in-State tuition or to get any kind of photograph, thoroughly doing a good migration table, and it’s very, very financial aid; so even though her moth- job it certainly appears in law enforce- lengthy. In fact, I’m not going to go er was a prostitute and a drug addict ment so that when the evil culprits are through and read it. I was tempted to who abandoned this little girl, this lit- apprehended and they go to trial and do that because day after day I heard a tle girl grew up to be a wonderful per- their attorneys are trying to raise a few people come in here and you’d son, and then the law oppressed her by reasonable doubt with a jury, that the think that everyone in the United not allowing her to continue. investigation will have been so thor- States was against immigration re- We have a chance to change that for ough and there will not have been an form. In fact, just the opposite. her and for so many other people. And inappropriate rush to judgment such I could read that Leith Anderson, I hope we listen to the pastors tomor- that a fair trial is had, due process is President of the National Association row, our evangelical brothers and sis- had, and then making sure that it is,

VerDate Mar 15 2010 03:17 Apr 18, 2013 Jkt 029060 PO 00000 Frm 00051 Fmt 7634 Sfmt 0634 E:\CR\FM\K17AP7.093 H17APPT1 jbell on DSK7SPTVN1PROD with HOUSE H2120 CONGRESSIONAL RECORD — HOUSE April 17, 2013 indeed, the perpetrator or perpetrators formed in 1918, we have had two major someone would get in an airplane and and then carry out a death penalty. I wars fought on our own soil that have fly it toward an American ship and hope that is the justice that ends up kept this country just in turmoil, and crash their plane into the ship, trying being carried out. we have had to spend most of our re- to sink the ship, and kill as many as In the meantime, we had a gun bill sources not on such nice clothes and possible was foreign to Americans. We that was voted down, as I understand, good things for individuals, but in de- couldn’t believe there was such a thing 54–46 in the Senate. It did not pass. It fending our country because we never as kamikaze pilots. Who would do such did not have enough votes. But with all had two oceans protecting us the way a thing? Who would have that little re- of our hearts having poured out and you have in the United States. gard for life and such hatred for other continuing to have prayers and sym- I was able to point something out to life that you would do all you could, in- pathy and empathy for the people in President Bush some years back when cluding giving up your own life, just to Sandy Hook, in Newtown, we still had he was President and I was a freshman kill as many people as you possibly a bill that was being brought to the here. I said, Look, for most of this Na- could who just want to live free? That Senate floor that all of the people who tion’s history, as the young Soviet col- was foreign during World War II. It was supported the bill, as I heard, had basi- lege student told me when I was a col- strange. We couldn’t believe it. I re- cally admitted that bill would not have lege student, you have had two oceans member being taught about that in saved a single one of the precious, dear protecting your country, the United public schools while growing up. The little children that were so violently States. He was exactly right. For most teachers thought it was so strange, and gunned down in their schoolroom. It of our history, two oceans have pro- we thought it was strange. would not have saved the heroic admin- tected the United States. Now we’ve seen that same type of istrator, a teacher, those who were try- I remember having conversations in mentality that was told to Thomas Jef- ing to protect the children. the eighties and nineties, as we would ferson when he went to negotiate with It just seems that if people in Wash- see violence in other places, whether it the Barbary pirates. In essence, he ington or other parts of the world, New was Beirut or the terrible atrocities in- couldn’t understand why these radical York City or wherever, are going to flicted on Israelis on their own soil, the Muslims, the Barbary pirates, would be manipulate and use such a tragic situa- constant bombings and people being attacking American ships. As Jefferson tion, such sympathetic victims, they blown up just as occurred at the ter- and the other diplomats explained, ought to at least, for goodness’ sake, at rible and evil event in Boston. We’ve never attacked your ships. We’ve least put forward a bill that if it had People have actually said the thing never attacked you. We’re not any been implemented would have ensured about America is if somebody were to threat to you. Why would you attack that at least one of the children or decide to be a suicide bomber in Amer- American ships? adults killed at Sandy Hook would not ica, they’d have to cross either the At- It was explained, In our religion, we have been killed. lantic or the Pacific, and they’d have believe that, if you die killing infidels, Otherwise, let’s put together laws such a cooling-down time, that even which you Americans are and since you and let’s have this administration fi- though they might be whipped up into don’t believe what we do, then we go to nally enforcing laws that both together a rage before they left to fly to Amer- paradise. will reduce violence. Pushing forward a ica, all of the hours of sitting quietly Jefferson thought that so strange. He bill that would not save any of the on a plane or days on a ship would be was so well read, so intelligent that he lives lost there or in Colorado is just enough to cause them to pause; and couldn’t believe it. He got his own copy inappropriate and manipulative, and when they got to America, they would of the Koran, in English translation, the victims deserve better. think, Nah, I really didn’t want to blow and read it. He could not believe there I still completely understand the myself up after all. That seemed to was a religion that anybody believed families of the victims, their hearts, work pretty well. was teaching that you would go to par- the struggle, the difficulty. I under- But then the radicalization of Mus- adise by killing innocent people. That stand, but let’s not manipulate them lims got to the point where they were just seemed so strange. for an individual political agenda. actually able to radicalize people who I am extremely grateful that most Now, I was on C–SPAN this morning could cross an ocean, who could come Muslims don’t believe that. They don’t with the host, Greta Brawner, a terrific into America; and as the 9/11 hijackers, believe they should get themselves a host, as is Susan Swain. I’ve enjoyed they could come in here and unthink- ticket to paradise by killing innocent being on with both of them. But we ably live in America, enjoy our lib- people. They believe in reason and in were talking about border security and erties, our freedoms, enjoy the com- talking and in trying to work things a bill that the so-called ‘‘Gang of pany of neighbors, share food with out. They don’t want to be ruled and Eight’’ is putting forward. They’re their neighbors, have neighbors invite reigned over by radical Islamists ei- great people in the ‘‘Gang of Eight,’’ them over and share food, share things ther. Amazingly, I’ve had people ap- and I know they mean well. They want such as if they need a cup of flour or proach me, the last in DFW airport, good for this country. whatever it is, share and see the way who have come up and indicated: I’m also reminded of a line that I was Americans share and are such a friend- Aren’t you in Congress? told back in the in the ly country. They were able to live here. Yes. summer of 1973 when I got close to a And too many of them were here on I’m from Egypt. Soviet college student and we had a visas, and the visas expired. The last was getting ice cream there free exchange of ideas. He never put at DFW. He said, Aren’t you in Con- down his country at all. Despite that, b 1940 gress? he was ordered not to talk to me any- Since neither Republican nor Demo- Yes. more after we became good friends be- cratic administration was effectively He said, You’re helping the wrong cause that’s what happens in a country enforcing visas when they expired, people. where the government becomes too these 9/11, hate-filled hijackers were He had family still in Egypt, and he powerful: you can’t even choose your able to keep on the mask that they en- said, You’re helping the wrong people. friends any more. joyed America, enjoyed the liberties, You’re helping the radicals. You’re At one point we were sitting alone while all the time looking for the op- helping the Muslim Brotherhood. We visiting, and he tugged on my shirt and portunity to kill themselves in a man- don’t want the Muslim Brotherhood he said, We don’t have material this ner that would most effectively kill running Egypt. We want freedom in good for our individual citizens. We the greatest number of innocent people Egypt. That’s what we thought we were wish we did, but we recognize you have they could in America. It’s unthink- going to get, and then your govern- so much more and better things for able for American citizens. ment helps the wrong people. You help your citizens in the United States than The only thing closely akin that the radicals. You help the Muslim we do here in the Soviet Union. He came to mind after 9/11 was when some Brotherhood. Quit doing that. Please, said, But you’ve got to understand that were talking about, Well, you know tell others in Washington to quit doing here in the Soviet Union, since we were what, in World War II, the idea that that. Quit helping the radicals.

VerDate Mar 15 2010 03:17 Apr 18, 2013 Jkt 029060 PO 00000 Frm 00052 Fmt 7634 Sfmt 0634 E:\CR\FM\K17AP7.096 H17APPT1 jbell on DSK7SPTVN1PROD with HOUSE April 17, 2013 CONGRESSIONAL RECORD — HOUSE H2121 I was surprised. That was not the One of them was on television over a I mentioned this morning on C–SPAN first time, but it was the most recent year ago, telling the Afghanistan peo- that we have been aware that not ev- time that someone turned out who was ple on the most watched television sta- eryone that wants to come into this from Egypt, a Muslim. They want to tion, If you do not fully support the country wants to come for jobs. We live in peace. They don’t want radicals Taliban, then you have one chance, and know that. Most of the Hispanics are ruining their lives, and they think it’s that is to come apologize to us and, fantastic people. They want to work wrong for radical Muslim Brotherhood under sharia law, beg our forgiveness hard. They believe in God. They’re de- members to persecute, kill, inflict pain and ask for our protection. Then you voted to family. And that is a bit of a and suffering on Coptic Christians and will fall under our protection, and you generalization, but it’s my hope that Jews. They don’t think that’s appro- will not be killed. They explained to that Hispanic culture coming into this priate. They may not agree with them, the nation of Afghanistan—the leader country will help bring a resurgence but they want to live in peace. Yet this that this administration let out of con- and make us the strong country we administration continues to help the finement and who is now back leading once were when it came to family val- wrong people. the Taliban against us—that everyone ues and an acknowledgement that ‘‘In After I met the young man from in the world knows that the Americans God We Trust,’’ as is our national Egypt at DFW, I find out we’re sending have been defeated, and so their Presi- motto. tear gas to Egypt in order to help the dent is pulling everyone out. They’re Or as Ben Franklin said during the radicals in the Muslim Brotherhood use running away; they’re scared; they’re Constitutional Convention: it against people like Coptic Chris- cowards; they’re afraid of us. So once I’ve lived, sir, a long time, and the longer tians, like Jewish residents in Egypt, the cowardly Americans finish running I live the more convincing proofs I see of this like moderate Muslims who disagree away from us, in 2014, we, the Taliban, truth: God governs in the affairs of men. with the kind of radicalism that is will be back in charge. And as Franklin said: being forced on them in Egypt. Then b 1950 If a sparrow cannot fall to the ground we find out this week that this admin- without His notice, is it possible an empire istration is sending more tanks to be And so you’ve got a choice. You ei- could rise without His aid? We’ve been as- used to crush those who just want free- ther come back, apologize, pledge devo- sured in the sacred writing, that unless the dom in Egypt. They’re moderate Mus- tion to us, ask forgiveness and protec- Lord build the House, they labor in vain that lims. They want to have freedom. They tion, and under sharia law, we’ll pro- build it. I firmly believe that. don’t want radicals running their coun- tect you. Otherwise, life may not last So I welcome people. And I’ve met try. long once the Americans are gone. Christian friends that I just fell in love Just like our allies, the Northern Al- The message has been going around with in West Africa. And one of them, liance—the moderate Muslims in Af- the world. In Egypt when we turned— an elderly black West African, wonder- ghanistan who fought—many gave this administration, at least—turned ful, wonderful man, a heart as big as their lives. They lost friends and fam- its back on our ally, Mubarak. When all outdoors, but he said, please tell ily in fighting the Taliban on our be- Qadhafi had blood on his hands since others in Washington to quit getting half, and now this administration has 2003, he had been an important ally of weaker because if America grows weak, figuratively thrown them under the this country, giving us more informa- yes, we know where we go when we die, bus, and it’s trying to buy friendship tion about terrorists because it was in but if America grows weak, we have no and peace—literally buy it with his interest to keep terrorists at bay, chance of peace. We have no chance of money—with the Taliban. That’s not giving us more information about ter- a good life in this world. So please stop how you deal with the Taliban. The rorism at times than any other coun- getting weaker. It looks like you’re Northern Alliance knew how to deal tries were able to give us; and that was getting weaker. with them. We helped them with some repaid by this administration—helped He started off by saying, We were ex- arms. We embedded less than 500 Spe- bomb Qadhafi and his troops, and sup- cited when you elected your first black cial Operations people in intelligence, port the radicals. Back at the time, President, but please urge him to quit and within 3 or 4 months, the Northern some of us here on the floor were ex- getting weaker in America. We need Alliance had defeated the Taliban. plaining, we don’t know who all’s in- you to be strong. Then as I learned in my first meeting volved in the revolution, but we know And I mentioned this morning that with Northern Alliance leaders some there are al Qaeda elements of this rev- we even are aware that we’ve had al years ago, we told them, Give us back olution. Let’s stop. This is not a good Qaeda, we’ve had radical Islamists try the significant weapons we’ve given idea until we know whose side we to disguise themselves as Hispanics and you because we’re America. We will should be on. sneak across our southern border be- make sure you’re safe now. We’ll make But the world has seen this adminis- cause Americans have never been wor- sure Afghanistan is safe and peaceful tration turns against its allies and ried about our Hispanic friends being now. So they turned in the weapons. tries to buy off its enemies. So if this radical and wanting to kill innocent They trusted the United States, and administration were going to be con- people to go to paradise. That’s not now they find an administration that sistent, it would seem that the thing to part of the Hispanic culture. had previously been offering to buy ele- do, to expect for this administration to And I’ve been amazed since then that gant, first-class international offices in offer something, as the Clinton admin- the left wing always wants to try to Qatar, in the Middle East, to give the istration did to North Korea: hey, you distort, to create a story out of a twist- Taliban—who still wants to kill Ameri- know, we’ll build you a nuclear plant; ed—I have to choose my words wisely cans and destroy our way of life—inter- we’ll do something if you just promise because it’ll be interesting to see what national standing, classing them up in you won’t develop nuclear weapons. the twisted mind of the left does—but their efforts to kill Americans and de- Well, we saw how that worked. Mad- the ignorance was apparently only cou- stroy our way of life. eleine Albright and President Clinton pled by laziness by left wing media, so And what did the Northern Alliance worked out a heck of a deal. We helped they go nuts trying to paint me as a get for their loyalty for defeating the them get nuclear weapons because of bigot when obviously they are the big- Taliban initially before we allowed the naivete of that administration, and ots, and not only bigots but they’re them to re-surge? They got betrayed. now we’re faced with a very difficult lazy because if they had bothered to They have been betrayed. situation. even turn on their computer and use it It was reported that the administra- Also understand, if North Korea con- for something besides mean-spirited, tion was offering to release some of the tinues on this path and Iran is not twisted, distorted untruths, they could Taliban’s murdering thugs and buy stopped, that what North Korea has have found this story from the ‘‘Amer- them elegant offices in Qatar. No pre- Iran may have, and then no one in ican Thinker’’ back on August 2, 2010. conditions. Just sit down and talk with Israel will be safe at all. And Israel is In the story by Norah Petersen, it us, and we will buy you stuff, and we considered in their minds, in radical points out, it discusses that: will let your murdering thugs go from Islamist minds, the Little Satan, and In 2001, the brother of a Hezbollah military confinement. We’ve already done that. we’re the Great Satan. chief illegally entered the United States by

VerDate Mar 15 2010 03:17 Apr 18, 2013 Jkt 029060 PO 00000 Frm 00053 Fmt 7634 Sfmt 0634 E:\CR\FM\K17AP7.098 H17APPT1 jbell on DSK7SPTVN1PROD with HOUSE H2122 CONGRESSIONAL RECORD — HOUSE April 17, 2013 crossing the Mexican border. He then settled Transmittal No. 13-03, pursuant to the re- [Docket No.: FAA-2012-1098; Airspace Docket in Dearborn, Michigan, and raised money for porting requirements of Section 36(b)(1) of No.: 12-ACE-5] received April 9, 2013, pursu- Hezbollah. the Arms Export Control Act, as amended; to ant to 5 U.S.C. 801(a)(1)(A); to the Committee In 2002, illegal immigrants from Lebanon the Committee on Foreign Affairs. on Transportation and Infrastructure. who were thought to have ties to Hezbollah 1143. A letter from the Acting Assistant 1154. A letter from the Paralegal Spe- were smuggled into the United States via the Secretary, Legislative Affairs, Department cialist, Department of Transportation, trans- Mexican border, according to a congressional of State, transmitting extension of the waiv- mitting the Department’s final rule — Estab- report: er of Section 907 of the FREEDOM Support lishment of Class E Airspace; Beeville, TX ‘‘In December 2002, Salim Boughader Act, Pub. L. 107-511, with respect to assist- [Docket No.: FAA-2012-0821; Airspace Docket Mucharrafille, a cafe owner in Tijuana, Mex- ance to the Government of ; to the No.: 12-ASW-8] received April 9, 2013, pursu- ico, was arrested for illegally smuggling Committee on Foreign Affairs. ant to 5 U.S.C. 801(a)(1)(A); to the Committee more than 200 Lebanese illegally into the 1144. A letter from the Chairman, Federal on Transportation and Infrastructure. United States, including several believed to Deposit Insurance Corporation, transmitting 1155. A letter from the Paralegal Spe- have terrorist ties to Hezbollah.’’ the Corporation’s fiscal year 2012 annual re- cialist, Department of Transportation, trans- The congressional report also revealed that port prepared in accordance with Section 203 mitting the Department’s final rule — the FBI has confirmed that persons from al of the Notification and Federal Employee Amendment of Class E Airspace; Superior, Qaeda-linked nations have been known to Antidiscrimination and Retaliation Act of WI [Docket No.: FAA-2012-0656; Airspace disguise themselves as Hispanic immigrants: 2002 (No FEAR Act), Public Law 107-174; to Docket No.: 12-AGL-5] received April 9, 2013, ‘‘Federal Bureau of Investigation Director the Committee on Oversight and Govern- pursuant to 5 U.S.C. 801(a)(1)(A); to the Com- Robert Mueller has confirmed in testimony ment Reform. mittee on Transportation and Infrastruc- ‘that there are individuals from countries 1145. A letter from the Chairman, Federal ture. with known al Qaeda connections who are Mine Safety and Health Review Commission, 1156. A letter from the Paralegal Spe- changing their Islamic surnames to His- transmitting the Commission’s FY 2012 An- cialist, Department of Transportation, trans- panic-sounding names and obtaining false nual Report pursuant to Section 203, Title II mitting the Department’s final rule — Hispanic identities, learning to speak Span- of the Notification and Federal Anti-dis- Amendment of VOR Federal Airway V-233, ish, and pretending to be Hispanic immi- crimination and Retaliation (No FEAR) Act Springfield, IL [Docket No.: FAA-2013-0179; grants.’ ’’ of 2002; to the Committee on Oversight and Airspace Docket No.: 05-AGL-6] (RIN: 2120- Government Reform. AA66) received April 6, 2013, pursuant to 5 These are the kinds of things that 1146. A letter from the Chairman, National our enemies are doing to try to bring U.S.C. 801(a)(1)(A); to the Committee on Labor Relations Board, transmitting the Transportation and Infrastructure. down this Nation. I hope the adminis- Board’s FY 2012 Buy American Act report; to 1157. A letter from the Paralegal Spe- tration will wise up and do something the Committee on Oversight and Govern- cialist, Department of Transportation, trans- about it. ment Reform. mitting the Department’s final rule — Air- With that, Madam Speaker, I yield 1147. A letter from the Director, National worthiness Directives; General Electric Com- back the balance of my time. Science Foundation, transmitting the Foun- pany Turbofan Engines [Docket No.: FAA- dation’s annual report for FY 2012 prepared 2012-1288; Directorate Identifier 2012-NE-37- f in accordance with Title II of the Notifica- AD; Amendment 39-17403; AD 2013-06-06] (RIN: tion and Federal Employee Antidiscrimina- LEAVE OF ABSENCE 2120-AA64) received April 9, 2013, pursuant to tion and Retaliation Act of 2002 (No FEAR 5 U.S.C. 801(a)(1)(A); to the Committee on By unanimous consent, leave of ab- Act), Public Law 107-174; to the Committee Transportation and Infrastructure. sence was granted to: on Oversight and Government Reform. 1158. A letter from the Paralegal Spe- 1148. A letter from the Acting Assistant cialist, Department of Transportation, trans- Mr. SHIMKUS (at the request of Mr. Secretary, Legislative Affairs, Department mitting the Department’s final rule — Air- CANTOR) for today and April 18 on ac- of State, transmitting the Senate’s Resolu- worthiness Directives; Robinson Helicopter count of personal matters. tion of Advice and Consent to the Treaty Company Helicopters [Docket No.: FAA-2012- with Australia Concerning Defense Trade Co- f 1088; Directorate Identifier 2012-SW-005-AD; operation (Treaty Doc. 110-10) activities re- Amendment 39-17987; AD 2013-05-15] (RIN: port; to the Committee on Foreign Affairs. ADJOURNMENT 2120-AA64) received April 9, 2013, pursuant to 1149. A letter from the Paralegal Spe- 5 U.S.C. 801(a)(1)(A); to the Committee on Mr. GOHMERT. Madam Speaker, I cialist, Department of Transportation, trans- Transportation and Infrastructure. move that the House do now adjourn. mitting the Department’s final rule — Modi- 1159. A letter from the Paralegal Spe- The motion was agreed to; accord- fication of VOR Federal Airways V-68, V-76, cialist, Department of Transportation, trans- ingly (at 7 o’clock and 58 minutes V-194, and V548 in the Vicinity of , mitting the Department’s final rule — Air- TX [Docket No.: FAA-2013-0231; Airspace p.m.), under its previous order, the worthiness Directives; Hughes Helicopters, Docket No.: 13-ASW-7] (RIN: 2120-AA66) re- House adjourned until tomorrow, Inc., and McDonnell Douglas Helicopter Sys- ceived April 9, 2013, pursuant to 5 U.S.C. Thursday, April 18, 2013, at 10 a.m. tems (Type Certificate is currently held by 801(a)(1)(A); to the Committee on Transpor- MD Helicopters, Inc.) Helicopters [Docket f tation and Infrastructure. 1150. A letter from the Paralegal Spe- No.: FAA-2012-0890; Directorate Identifier EXECUTIVE COMMUNICATIONS, cialist, Department of Transportation, trans- 2011-SW-019-AD; Amendment 39-17388; AD ETC. mitting the Department’s final rule — 2013-05-16] (RIN: 2120-AA64) received April 9, Amendment of Class E Airspace; Middle- 2013, pursuant to 5 U.S.C. 801(a)(1)(A); to the Under clause 2 of rule XIV, executive Committee on Transportation and Infra- communications were taken from the town, OH [Docket No.: FAA-2012-0651; Air- space Docket No.: 12-AGL-7] received April 9, structure. Speaker’s table and referred as follows: 2013, pursuant to 5 U.S.C. 801(a)(1)(A); to the f 1139. A letter from the Under Secretary, Committee on Transportation and Infra- Department of Defense, transmitting the De- structure. PUBLIC BILLS AND RESOLUTIONS partment’s Evaluation of the TRICARE Pro- 1151. A letter from the Paralegal Spe- Under clause 2 of rule XII, public gram for Fiscal Year 2013, pursuant to 10 cialist, Department of Transportation, trans- bills and resolutions of the following U.S.C. 1073 note; to the Committee on Armed mitting the Department’s final rule — titles were introduced and severally re- Services. Amendment of Class E Airspace; West Union, 1140. A letter from the Under Secretary, IA [Docket No.: FAA-2011-1434; Airspace ferred, as follows: Department of Defense, transmitting a letter Docket No.: 11-ACE-27] received April 9, 2013, By Mr. COURTNEY (for himself, Mr. on the approved retirement of Lieutenant pursuant to 5 U.S.C. 801(a)(1)(A); to the Com- LARSON of Connecticut, Ms. General Daniel P. Bolger, United States mittee on Transportation and Infrastruc- DELAURO, Ms. PINGREE of Maine, and Army, and his advancement on the retired ture. Mr. SCHRADER): list in the grade of lieutenant general; to the 1152. A letter from the Paralegal Spe- H.R. 1590. A bill to amend the Specialty Committee on Armed Services. cialist, Department of Transportation, trans- Crops Competitiveness Act of 2004 to include 1141. A letter from the Acting Chairman, mitting the Department’s final rule — farmed shellfish as specialty crops; to the National Foundation on the Arts and the Hu- Amendment of Class E Airspace; Decorah, IA Committee on Agriculture. manities, transmitting the Federal Council [Docket No.: FAA-2011-1433; Airspace Docket By Mr. CARTER (for himself, Mr. BUR- on the Arts and the Humanities’ thirty-sev- No.: 11-ACE-26] received April 9, 2013, pursu- GESS, Ms. SPEIER, Mr. KING of New enth annual report on the Arts and Artifacts ant to 5 U.S.C. 801(a)(1)(A); to the Committee York, Mr. MCCAUL, and Mr. RANGEL): Indemnity Program for fiscal year 2012; to on Transportation and Infrastructure. H.R. 1591. A bill to amend the Public the Committee on Education and the Work- 1153. A letter from the Paralegal Spe- Health Service Act to provide for the estab- force. cialist, Department of Transportation, trans- lishment and maintenance of an undiagnosed 1142. A letter from the Director, Defense mitting the Department’s final rule — Estab- diseases network, and for other purposes; to Security Cooperation Agency, transmitting lishment of Class E Airspace; Tecumseh, NE the Committee on Energy and Commerce.

VerDate Mar 15 2010 03:17 Apr 18, 2013 Jkt 029060 PO 00000 Frm 00054 Fmt 7634 Sfmt 0634 E:\CR\FM\K17AP7.101 H17APPT1 jbell on DSK7SPTVN1PROD with HOUSE April 17, 2013 CONGRESSIONAL RECORD — HOUSE H2123

By Mr. MICA (for himself, Ms. WILSON SON of Indiana, Mr. CASTRO of Texas, H.R. 1599. A bill to amend section 520E of of Florida, Mr. DIAZ-BALART, Ms. Mr. CICILLINE, Ms. CLARKE, Mr. the Public Health Service Act to require WASSERMAN SCHULTZ, Mr. RADEL, Mr. COHEN, Mr. CONNOLLY, Ms. DELAURO, States and their designees receiving grants HASTINGS of Florida, Mr. ROONEY, Mr. Ms. DELBENE, Mr. DINGELL, Mr. for development or implementation of state- BUCHANAN, Mr. GARCIA, Ms. ROS- DOYLE, Ms. DUCKWORTH, Ms. wide suicide early intervention and preven- LEHTINEN, and Mr. MILLER of Flor- EDWARDS, Ms. ESTY, Mr. GRIJALVA, tion strategies to consult with each Feder- ida): Mr. HIGGINS, Mr. HIMES, Mr. HINO- ally recognized Indian tribe, tribal organiza- H.R. 1592. A bill to provide for the convey- JOSA, Mr. HOLT, Mr. HORSFORD, Ms. tion, and urban Indian organization in the ance of the David W. Dyer Federal Building JACKSON LEE, Mr. KILMER, Mr. LAN- State; to the Committee on Energy and Com- and United States Courthouse in Miami, GEVIN, Mr. LARSEN of Washington, merce. Florida, to Miami Dade College in Miami Mr. LARSON of Connecticut, Ms. LEE By Mr. GRIJALVA: Dade County, Florida; to the Committee on of California, Mr. LEWIS, Mr. H.R. 1600. A bill to prescribe procedures for Transportation and Infrastructure. LOEBSACK, Mrs. CAROLYN B. MALONEY effective consultation and coordination by By Ms. SPEIER (for herself, Mr. AN- of New York, Mr. MARKEY, Mr. Federal agencies with federally recognized DREWS, Ms. BASS, Mr. BECERRA, Mr. MCDERMOTT, Mr. MCGOVERN, Ms. Indian tribes regarding Federal Government activities that impact tribal lands and inter- BERA, Mr. BLUMENAUER, Ms. MOORE, Mr. NADLER, Ms. NORTON, Mr. ests to ensure that meaningful tribal input is BONAMICI, Mr. BRADY of Pennsyl- PETERS of Michigan, Ms. PINGREE of an integral part of the Federal decision- vania, Mr. BRALEY of Iowa, Ms. Maine, Mr. POLIS, Mr. RANGEL, Mr. making process; to the Committee on Nat- BROWN of Florida, Mr. BUTTERFIELD, RYAN of Ohio, Ms. LORETTA SANCHEZ ural Resources. Mr. CAPUANO, Mr. CARSON of Indiana, of California, Mr. SARBANES, Ms. By Mr. GRIJALVA (for himself, Ms. Mr. CARTWRIGHT, Ms. CASTOR of Flor- SCHAKOWSKY, Mr. SCHIFF, Mr. SCHRA- CHU, Mr. CONYERS, Ms. NORTON, Ms. ida, Ms. CHU, Mr. CICILLINE, Ms. DER, Ms. SCHWARTZ, Ms. SHEA-POR- LEE of California, Ms. SCHAKOWSKY, CLARKE, Mr. CLAY, Mr. CLEAVER, Mr. TER, Ms. SLAUGHTER, Mr. TONKO, Mr. and Mr. SERRANO): COHEN, Mr. CONNOLLY, Mr. CONYERS, VAN HOLLEN, Mr. VELA, Mr. WALZ, H.R. 1601. A bill to amend title XVI of the Mr. CROWLEY, Mr. CUMMINGS, Mr. Mr. WAXMAN, Mr. WELCH, Mr. YAR- Social Security Act to update eligibility for DANNY K. DAVIS of Illinois, Mr. MUTH, Mr. CONYERS, Mr. AL GREEN of the supplemental security income program, DEFAZIO, Ms. DEGETTE, Ms. Texas, Ms. ROYBAL-ALLARD, Mr. DELAURO, Mr. DELANEY, Mr. DOG- and for other purposes; to the Committee on THOMPSON of California, Mr. PETERS Ways and Means. GETT, Ms. EDWARDS, Mr. ELLISON, Ms. of California, Mr. TIERNEY, Mr. ESHOO, Mr. FARR, Mr. FATTAH, Ms. By Mr. GRIJALVA: LYNCH, Mr. CARTWRIGHT, Mr. BEN H.R. 1602. A bill to amend the Internal Rev- FRANKEL of Florida, Mr. GARAMENDI, ´ RAY LUJAN of New Mexico, Mr. enue Code of 1986 to allow Indian tribes to Mr. AL GREEN of Texas, Mr. GRI- VARGAS, Ms. BORDALLO, Ms. ESHOO, transfer the credit for electricity produced JALVA, Mr. GUTIERREZ, Ms. HAHN, Mr. Ms. CASTOR of Florida, Ms. TITUS, from renewable resources; to the Committee HASTINGS of Florida, Mr. HOLT, Mr. Mrs. DAVIS of California, Mr. ELLI- on Ways and Means. HONDA, Mr. HUFFMAN, Ms. JACKSON SON, Mr. ENYART, Mr. FOSTER, Mr. By Mr. GRIMM (for himself, Mr. KING LEE, Mr. JOHNSON of Georgia, Mr. GENE GREEN of Texas, Mr. KILDEE, of New York, and Mr. MEEKS): JONES, Ms. KAPTUR, Mr. KEATING, Mr. Mr. KIND, Mr. MATHESON, Mr. MCIN- H.R. 1603. A bill to support and promote KIND, Ms. LEE of California, Mr. TYRE, Mr. O’ROURKE, Mr. RUSH, Mr. community financial institutions in the mu- LEWIS, Mr. LEVIN, Mr. BEN RAY SABLAN, Mr. SMITH of Washington, tual form, and for other purposes; to the ´ LUJAN of New Mexico, Mrs. CAROLYN Mr. CAPUANO, and Ms. WILSON of Committee on Financial Services. B. MALONEY of New York, Mr. MAR- Florida): By Mr. LAMBORN: KEY, Ms. MATSUI, Mrs. MCCARTHY of H.R. 1595. A bill to amend the Higher Edu- H.R. 1604. A bill to establish the National New York, Ms. MCCOLLUM, Mr. cation Act of 1965 to extend the reduced in- Geospatial Technology Administration with- MCGOVERN, Mr. MCNERNEY, Mr. terest rate for Federal Direct Stafford in the United States Geological Survey to GEORGE MILLER of California, Ms. Loans; to the Committee on Education and enhance the use of geospatial data, products, MOORE, Mrs. NAPOLITANO, Ms. NOR- the Workforce. technology, and services, to increase the TON, Mr. PAYNE, Mr. PERLMUTTER, By Mr. DEFAZIO: economy and efficiency of Federal geospatial Ms. PINGREE of Maine, Mr. POLIS, Mr. H.R. 1596. A bill to increase the employ- activities, and for other purposes; to the QUIGLEY, Mr. RANGEL, Mr. RAHALL, ment of Americans by requiring State work- Committee on Natural Resources, and in ad- Ms. ROYBAL-ALLARD, Ms. SCHA- force agencies to certify that employers are dition to the Committees on Oversight and KOWSKY, Ms. SCHWARTZ, Mr. SCHRA- actively recruiting Americans and that Government Reform, Science, Space, and DER, Mr. THOMPSON of California, Mr. Americans are not qualified or available to Technology, and Agriculture, for a period to THOMPSON of Mississippi, Mr. TIER- fill the positions that the employer wants to be subsequently determined by the Speaker, NEY, Ms. TITUS, Mr. TONKO, Mr. fill with H-2B nonimmigrants; to the Com- in each case for consideration of such provi- WALZ, Ms. WATERS, Mr. WELCH, Ms. mittee on the Judiciary. sions as fall within the jurisdiction of the WILSON of Florida, and Mr. LARSON of By Mr. DEUTCH: committee concerned. Connecticut): H.R. 1597. A bill to amend the Internal Rev- By Mr. LARSON of Connecticut: H.R. 1593. A bill to amend title 10, United enue Code of 1986 to provide a credit to indi- H.R. 1605. A bill to protect Second Amend- States Code, to improve the prevention of viduals for legal expenses paid with respect ment rights, ensure that all individuals who and response to sexual assault in the Armed to establishing guardianship of a disabled in- should be prohibited from buying a firearm Forces by establishing a Sexual Assault dividual; to the Committee on Ways and are listed in the National Instant Criminal Oversight and Response Council and an en- Means. Background Check System, and provide a re- hanced Sexual Assault Oversight and Re- By Mr. GRIFFIN of Arkansas (for him- sponsible and consistent background check sponse Office and by requiring the appoint- self, Mr. GRIFFITH of Virginia, Mr. process; to the Committee on the Judiciary, ment of a Director of Military Prosecutions MCGOVERN, Ms. SHEA-PORTER, Mr. and in addition to the Committees on Vet- for sexual-related offenses committed by a NUNNELEE, Ms. HANABUSA, Mr. BLU- erans’ Affairs, and Energy and Commerce, member of the Armed Forces, and for other MENAUER, Ms. BORDALLO, Ms. for a period to be subsequently determined purposes; to the Committee on Armed Serv- SLAUGHTER, Mr. KEATING, Mr. HIMES, by the Speaker, in each case for consider- ices. Mr. RUSH, Mrs. HARTZLER, Mr. JONES, ation of such provisions as fall within the ju- By Mr. CASSIDY (for himself, Mr. Ms. NORTON, Mr. BRADY of Pennsyl- risdiction of the committee concerned. BRIDENSTINE, Mr. LAMALFA, Mrs. vania, Mr. WESTMORELAND, Mr. By Mr. NEUGEBAUER: NOEM, Mr. POSEY, Mr. FLEMING, and RAHALL, Mr. GRIJALVA, Mrs. MILLER H.R. 1606. A bill to amend the Federal Crop Mr. OLSON): of Michigan, Mr. HASTINGS of Florida, Insurance Act to make available to pro- H.R. 1594. A bill to prohibit the use of Fed- Mr. VAN HOLLEN, Mr. BUCSHON, Mr. ducers a supplemental coverage option based eral funds for the costs of official portraits of HECK of Washington, Mr. on both an individual yield and loss basis members of Congress, heads of executive BRIDENSTINE, Mr. LATTA, Mr. LONG, and an area yield and loss basis in order to agencies, or heads of offices of the legislative Mr. TAKANO, Mr. OLSON, Mr. WITT- allow producers to cover all or a portion of branch; to the Committee on House Adminis- MAN, Mr. STEWART, Mr. FITZPATRICK, their deductible under the individual yield tration, and in addition to the Committee on Mr. POLIS, Mrs. ROBY, Mr. and loss policy, to improve the accuracy of Oversight and Government Reform, for a pe- BENTIVOLIO, and Mr. COHEN): actual production history determinations, riod to be subsequently determined by the H.R. 1598. A bill to amend title 38, United and for other purposes; to the Committee on Speaker, in each case for consideration of States Code, to direct the Secretary of Vet- Agriculture. such provisions as fall within the jurisdic- erans Affairs to issue, upon request, veteran By Mrs. NOEM (for herself and Mr. tion of the committee concerned. identification cards to certain veterans; to TERRY): By Mr. COURTNEY (for himself, Mr. the Committee on Veterans’ Affairs. H.R. 1607. A bill to amend the Federal Crop BISHOP of New York, Ms. BONAMICI, By Mr. GRIJALVA (for himself, Mr. Insurance Act to extend certain supple- Mr. BRALEY of Iowa, Mrs. BUSTOS, GARY G. MILLER of California, and mental agricultural disaster assistance pro- Mrs. CAPPS, Mr. CA´ RDENAS, Mr. CAR- Mrs. NAPOLITANO): grams to cover fiscal years 2012 through 2018,

VerDate Mar 15 2010 03:17 Apr 18, 2013 Jkt 029060 PO 00000 Frm 00055 Fmt 7634 Sfmt 0634 E:\CR\FM\L17AP7.100 H17APPT1 jbell on DSK7SPTVN1PROD with HOUSE H2124 CONGRESSIONAL RECORD — HOUSE April 17, 2013 and for other purposes; to the Committee on tives, the following statements are sub- By Mr. GRIJALVA: Agriculture. mitted regarding the specific powers H.R. 1600. By Mr. OWENS: granted to Congress in the Constitu- Congress has the power to enact this legis- H.R. 1608. A bill to require the Secretary of lation pursuant to the following: Health and Human Services to promulgate tion to enact the accompanying bill or Article I, Section 8 of the United States regulations regarding the authorship, con- joint resolution. Constitution. tent, format, and dissemination of Patient By Mr. COURTNEY: By Mr. GRIJALVA: Medication Information to ensure patients H.R. 1590. H.R. 1601. receive consistent and high-quality informa- Congress has the power to enact this legis- Congress has the power to enact this legis- tion about their prescription medications lation pursuant to the following: lation pursuant to the following: and are aware of the potential risks and ben- Article I, section 8, Clause 1 and Article U.S. Const. art. I, §§ 1 and 8. efits of prescription medications; to the IV, section 3, Clause 2 of the Constitution of By Mr. GRIJALVA: Committee on Energy and Commerce. the United States grant Congress the author- H.R. 1602. By Mr. PASCRELL (for himself and ity to enact this bill. Congress has the power to enact this legis- Mr. KING of New York): By Mr. CARTER: lation pursuant to the following: H.R. 1609. A bill to authorize the Secretary H.R. 1591. Article I, Section 8 of the United States of Education to make grants to support fire Congress has the power to enact this legis- Constitution. safety education programs on college cam- lation pursuant to the following: By Mr. GRIMM: puses; to the Committee on Education and Article I, Section 8, Clause 1: The Congress H.R. 1603. the Workforce. shall have Power To lay and collect Taxes, Congress has the power to enact this legis- By Mr. RIBBLE (for himself, Mr. WALZ, Duties, Imposts and Excises, to pay the lation pursuant to the following: Mr. GIBBS, Mr. ROKITA, Mr. PETRI, Debts and provide for the common Defence Article I, Section 8, Clause 3 and Mr. DUFFY): and general Welfare of the United States; but By Mr. LAMBORN: H.R. 1610. A bill to amend the Food, Con- all Duties, Imposts and Excises shall be uni- H.R. 1604. servation, and Energy Act of 2008 to author- form throughout the United States; Congress has the power to enact this legis- ize producers on a farm to produce fruits and By Mr. MICA: lation pursuant to the following: vegetables for processing on the base acres of H.R. 1592. Article IV, Section 3— the farm; to the Committee on Agriculture. Congress has the power to enact this legis- Article IV—The States By Mr. RIBBLE: lation pursuant to the following: Section 3—New States H.R. 1611. A bill to authorize the Secretary Article I, Section 8 of the United States The Congress shall have Power to dispose of Agriculture to use funds derived from con- Constitution, specifically Clause 1 (relating of and make all needful Rules and Regula- servation-related programs executed on Na- to providing for the general welfare of the tions respecting the Territory or other Prop- tional Forest System lands to utilize the Ag- United States) and Clause 18 (relating to the erty belonging to the United States; and riculture Conservation Experienced Services power to make all laws necessary and proper nothing in this Constitution shall be so con- Program; to the Committee on Agriculture, for carrying out the powers vested in Con- strued as to Prejudice any Claims of the and in addition to the Committee on Natural gress), and Article IV, Section 3, Clause 2 (re- United States, or of any particular State. Resources, for a period to be subsequently lating to the power of Congress to dispose of By Mr. LARSON of Connecticut: determined by the Speaker, in each case for and make all needful rules and regulations H.R. 1605. consideration of such provisions as fall with- Congress has the power to enact this legis- in the jurisdiction of the committee con- respecting the territory or other property belonging to the United States). lation pursuant to the following: cerned. Article I, Section 8, Clause 6 By Ms. SPEIER: By Mr. ROGERS of Alabama (for him- The Congress shall have Power . . . To H.R. 1593. self, Mr. ADERHOLT, Mr. BACHUS, Mr. Congress has the power to enact this legis- make all Laws which shall be necessary and BONNER, Mr. BROOKS of Alabama, lation pursuant to the following: proper for carrying into Execution the fore- Mrs. ROBY, and Ms. SEWELL of Ala- This bill is enacted pursuant to the power going Powers, and all other Powers veted by bama): granted to Congress under Article 1, Section this Constitution in the Government of the H.R. 1612. A bill to direct the Secretary of United States, or in any Department or Offi- Veterans Affairs to convey a parcel of land 8 of the United States Constitution. By Mr. CASSIDY: cer thereof. in Tuskegee, Alabama, to Tuskegee Univer- By Mr. NEUGEBAUER: sity, and for other purposes; to the Com- H.R. 1594. Congress has the power to enact this legis- H.R. 1606. mittee on Veterans’ Affairs. Congress has the power to enact this legis- By Mr. LATHAM (for himself, Mr. lation pursuant to the following: Article I, Section 8, Clause 1 of the United lation pursuant to the following: COLE, Mr. DUFFY, Mr. FITZPATRICK, States Constitution Article I, Section 8, Clauses 1 ‘‘The Con- Mr. FORTENBERRY, Mr. HANNA, Mr. By Mr. COURTNEY: gress shall have Power To lay and collect KING of Iowa, and Mr. NUGENT): H.R. 1595. Taxes, Duties, Imposts and Excises, to pay H. Res. 166. A resolution condemning any the Debts and provide for the common De- proposals for the arbitrary seizure of funds Congress has the power to enact this legis- lation pursuant to the following: fense and general Welfare of the United from federally insured deposit accounts in States; but all Duties, Imposts and Excises the United States by the Government with- Article I, Section 8, Clause 3 shall be uniform throughout the United out due process; to the Committee on Finan- The Congress shall have Power . . . To reg- States’’, 18 (‘‘To make all Laws which shall cial Services. ulate Commerce with foreign Nations, and be necessary and proper for carrying into By Mr. GRAVES of Missouri (for him- among the several States, and with the In- Execution the foregoing Powers, and all self, Mr. HANNA, Mr. SCHIFF, Mr. dian Tribes. other Powers vested by this Constitution in PAYNE, Mr. SIMPSON, Ms. BORDALLO, By Mr. DEFAZIO: H.R. 1596. the Government of the United States, or in Mr. LOEBSACK, Mr. NEAL, Mr. HOLT, Congress has the power to enact this legis- any Department or Officer thereof’’). Mr. GUTHRIE, Mr. ROE of Tennessee, lation pursuant to the following: By Mrs. NOEM: and Mr. WALZ): H. Res. 167. A resolution recognizing the Article I Section 8. Clause 4. H.R. 1607. Congress has the power to enact this legis- roles and contributions of America’s teach- To establish an uniform Rule of Natu- ers to building and enhancing our Nation’s ralization, and uniform Laws on the subject lation pursuant to the following: Article I, Section 8, Clause 3, the Com- civic, cultural, and economic well-being; to of Bankruptcies throughout the United the Committee on Education and the Work- States merce Clause. force. By Mr. DEUTCH: By Mr. OWENS: H.R. 1608. By Mr. MARKEY (for himself, Mr. H.R. 1597. Congress has the power to enact this legis- Congress has the power to enact this legis- NEAL, Mr. MCGOVERN, Mr. KENNEDY, lation pursuant to the following: lation pursuant to the following: Ms. TSONGAS, Mr. TIERNEY, Mr. CAPU- Article I, Section 8, Clause 1 of the U.S. This bill is enacted pursuant to the power ANO, Mr. LYNCH, and Mr. KEATING): granted to Congress under Article I, Section H. Res. 168. A resolution condemning the Constitution. horrific attacks of April 15, 2013, in Boston, By Mr. GRIFFIN of Arkansas: 8, of the United States Constitution. Massachusetts, and expressing support, sym- H.R. 1598. By Mr. PASCRELL: pathy, and prayers for all persons impacted Congress has the power to enact this legis- H.R. 1609. by this tragedy; to the Committee on Over- lation pursuant to the following: Congress has the power to enact this legis- sight and Government Reform. Article I, section 8 of the Constitution of lation pursuant to the following: the United States. Congress has the power to enact this legis- f By Mr. GRIJALVA: lation pursuant to Article I, Section 8, CONSTITUTIONAL AUTHORITY H.R. 1599. Clause 3 of the United States Constitution. STATEMENT Congress has the power to enact this legis- By Mr. RIBBLE: lation pursuant to the following: H.R. 1610. Pursuant to clause 7 of rule XII of Article I, Section 8 of the United States Congress has the power to enact this legis- the Rules of the House of Representa- Constitution. lation pursuant to the following:

VerDate Mar 15 2010 03:17 Apr 18, 2013 Jkt 029060 PO 00000 Frm 00056 Fmt 7634 Sfmt 0634 E:\CR\FM\L17AP7.100 H17APPT1 jbell on DSK7SPTVN1PROD with HOUSE April 17, 2013 CONGRESSIONAL RECORD — HOUSE H2125

Article I, Section 8, Clause 1 of the United H.R. 763: Mr. WALBERG, Mr. WENSTRUP, Mr. H.R. 1249: Mr. SMITH of Washington and Mr. States Constitution. DIAZ-BALART, Mr. POMPEO, Mr. HANNA, Mr. POE of Texas. By Mr. RIBBLE: AUSTIN SCOTT of Georgia, Mr. NEUGEBAUER, H.R. 1250: Mr. GRAVES of Georgia. H.R. 1611. and Mr. REICHERT. H.R. 1252: Mr. RYAN of Ohio, Mr. COFFMAN, Congress has the power to enact this legis- H.R. 769: Mr. ENYART. and Ms. SCHAKOWSKY. lation pursuant to the following: H.R. 786: Mrs. CAPPS. H.R. 1276: Mr. BRALEY of Iowa, Mr. Article I, Section 8, Clause 1 of the United H.R. 792: Mr. CLAY. CICILLINE, Mr. COHEN, Mr. CRAWFORD, Mr. States Constitution. H.R. 807: Mr. CRAWFORD, Mrs. ELLMERS, DOYLE, Mr. FITZPATRICK, Mr. GIBSON, Mr. By Mr. ROGERS of Alabama: and Mr. COBLE. GENE GREEN of Texas, Mr. GUTIERREZ, Ms. H.R. 1612. H.R. 809: Mr. DUNCAN of Tennessee. HANABUSA, Mr. LANGEVIN, Mr. LOEBSACK, Mr. Congress has the power to enact this legis- H.R. 820: Mr. RANGEL and Mrs. MARINO, Mr. MARKEY, Ms. MCCOLLUM, Mr. lation pursuant to the following: CHRISTENSEN. ROGERS of Michigan, Ms. LORETTA SANCHEZ Article 1, Section 8, Clause 1—This bill pro- H.R. 846: Mr. DENHAM, Mr. GINGREY of of California, Mr. SENSENBRENNER, Mr. motes the general welfare of the United Georgia, Mr. RAHALL, and Mrs. LUMMIS. TONKO, Mr. WITTMAN, and Mr. YARMUTH. H.R. 847: Mr. MURPHY of Florida and Mr. States by returning vacant land to its origi- H.R. 1286: Mr. ANDREWS. SHERMAN. nal charitable donor, Tuskegee University. H.R. 1288: Mr. COHEN, Mr. FORBES, Mrs. H.R. 851: Mr. BRADY of Pennsylvania. Article 1, Section 8, Clause 18—Creates CHRISTENSEN, and Mr. LATHAM. H.R. 855: Mr. MAFFEI. necessary and proper authority for the Sec- H.R. 1354: Ms. WILSON of Florida and Ms. H.R. 892: Ms. SCHWARTZ. retary of Veterans Affairs to convey the va- CASTOR of Florida. H.R. 893: Mr. CHABOT and Mr. STOCKMAN. cant land to Tuskegee University. H.R. 1355: Mr. AUSTIN SCOTT of Georgia, H.R. 894: Mr. COHEN. CALISE OHO EADOWS f H.R. 904: Mr. WEBER of Texas, Mr. ROSKAM, Mr. S , Mr. Y , Mr. M , Mr. DESJARLAIS, Mr. FRANKS of Arizona, and Mr. ADDITIONAL SPONSORS and Mr. FORBES. H.R. 906: Mr. POCAN, Mr. MORAN, and Mr. BARTON. Under clause 7 of rule XII, sponsors BILIRAKIS. H.R. 1362: Mr. OWENS. were added to public bills and resolu- H.R. 938: Mr. GARDNER, Ms. HERRERA H.R. 1406: Mr. STUTZMAN, Mr. WITTMAN, Mr. tion as follows: BEUTLER, Mr. LARSON of Connecticut, Mr. LABRADOR, Mr. HOLDING, Mr. BISHOP of Utah, ROSS, Mr. MULVANEY, Mr. PERLMUTTER, Ms. Mr. DESANTIS, Mr. RIBBLE, Mr. JOHNSON of H.R. 139: Mr. CARTWRIGHT. WILSON of Florida, Mr. GRAYSON, Mr. COT- Ohio, Mr. GIBBS, Mr. BENTIVOLIO, Mr. HAR- H.R. 164: Mr. STEWART, Mrs. ELLMERS, Mr. TON, Mr. WEBER of Texas, Ms. DELAURO, Mr. RIS, Mr. REICHERT, Mr. VALADAO, Mr. COL- GRIMM, Mr. PETERSON, and Mr. PAULSEN. RENACCI, Mr. ROYCE, and Mr. SESSIONS. LINS of New York, Mr. COFFMAN, Mr. THOMP- H.R. 198: Mr. MCDERMOTT. H.R. 940: Mr. GOSAR. SON of Pennsylvania, Mr. NUNES, Mr. H.R. 274: Mrs. BUSTOS and Ms. SINEMA. H.R. 949: Ms. SCHWARTZ, Mr. BRADY of CRAWFORD, Mr. MULVANEY, Mr. LATHAM, Mr. H.R. 300: Mr. YODER. Pennsylvania, and Ms. DELAURO. MEADOWS, and Mr. GARRETT. H.R. 335: Mr. GARAMENDI. H.R. 959: Mr. SHIMKUS and Mr. PITTS. H.R. 1416: Mrs. WALORSKI, Mrs. CAPITO, Mr. H.R. 357: Mr. RUNYAN. H.R. 961: Mr. LOBIONDO and Mrs. CAROLYN LANCE, Mrs. HARTZLER, Mr. CRAWFORD, Mrs. H.R. 377: Mr. RUIZ and Ms. SEWELL of Ala- B. MALONEY of New York. BLACK, Mr. KINZINGER of Illinois, Mrs. bama. H.R. 962: Mr. PETERS of California. CHRISTENSEN, Mr. HIGGINS, Mr. MEADOWS, H.R. 382: Mr. RADEL and Mr. BURGESS. H.R. 974: Mr. HECK of Washington. and Mr. YOUNG of Florida. OHNSON H.R. 445: Mr. J of Georgia. H.R. 997: Mr. YOUNG of Florida. H.R. 1427: Ms. TITUS. H.R. 452: Mr. SWALWELL of California, Mr. H.R. 1010: Ms. SHEA-PORTER. H.R. 1435: Mr. GRIJALVA. COURTNEY, Mr. PALLONE, Mr. TONKO, Mr. HIG- H.R. 1014: Mr. COLE. H.R. 1466: Ms. BORDALLO, Ms. DELAURO, Ms. GINS, and Mrs. LOWEY. H.R. 1015: Mr. GERLACH and Mr. WOLF. SCHAKOWSKY, Mr. POCAN, Ms. SLAUGHTER, H.R. 485: Mr. SWALWELL of California and H.R. 1026: Mr. GOSAR, Mr. LUCAS, Mr. Mr. RYAN of Ohio, Ms. TITUS, Ms. EDWARDS, Ms. TITUS. WEBER of Texas, and Mr. RIBBLE. and Mr. YARMUTH. H.R. 495: Mr. NUNES. H.R. 1029: Mr. BRADY of Pennsylvania. H.R. 1494: Mr. LATTA and Mrs. DAVIS of H.R. 521: Ms. SINEMA. H.R. 1074: Mr. TAKANO, Mr. GENE GREEN of California. H.R. 523: Mr. KING of New York, Mr. HUD- Texas, and Mr. BISHOP of New York. H.R. 1496: Mr. COSTA. SON, Mr. DESJARLAIS, Mr. HENSARLING, Mr. H.R. 1077: Mr. COTTON, Mr. GRIFFIN of Ar- H.R. 1502: Mr. GOHMERT and Mr. NEUGE- LABRADOR, Mrs. LUMMIS, Mr. GARY G. MIL- kansas, and Mr. FINCHER. BAUER LER of California, Mr. RIGELL, Ms. ROS- H.R. 1078: Mr. SMITH of Nebraska. H.R. 1528: Mr. PETERSON and Mr. DUNCAN of LEHTINEN, Mr. RUNYAN, Mr. SOUTHERLAND, H.R. 1095: Mr. KLINE. Tennessee. Mr. WOODALL, and Mr. YOUNG of Alaska. H.R. 1130: Ms. LEE of California. H.R. 1538: Mr. VELA. H.R. 525: Mr. RADEL. H.R. 1149: Ms. MCCOLLUM. H.R. 1549: Mrs. ELLMERS, Mr. WALDEN, Mr. H.R. 526: Mr. SCHIFF. H.R. 1173: Mr. LEVIN and Mr. LARSON of H.R. 556: Mr. CHABOT, Mr. STOCKMAN, Mr. Connecticut. CASSIDY, Mr. JOHNSON of Ohio, Mr. LONG, Mr. TERRY, and Mr. HALL. YOHO, and Mr. GRAVES of Georgia. H.R. 1179: Mr. BISHOP of Georgia and Mr. H.R. 627: Mr. VELA, Ms. BASS, Mrs. DAVIS of OWENS. H.R. 1551: Mr. WESTMORELAND, Mr. RIGELL, California, Ms. JACKSON LEE, Ms. TITUS, Mr. H.R. 1199: Mr. COHEN, Mr. WALZ, Mr. KIL- Mr. GRAVES of Missouri, Mr. SCHOCK, and Mr. THOMPSON of Mississippi, Mr. MER, Mr. MEEKS, Ms. CHU, Mr. BISHOP of New BUTTERFIELD. FALEOMAVAEGA, Mr. LEWIS, Mr. PIERLUISI, York, Mr. SARBANES, Mr. DINGELL, Mr. H.R. 1588: Ms. DEGETTE, Ms. CASTOR of Mrs. NOEM, Mr. TERRY, Mr. ROSKAM, Ms. DELANEY, Mr. SCHRADER, and Ms. DELBENE. Florida, Mrs. CHRISTENSEN, Mr. RUSH, Ms. SINEMA, Mrs. WAGNER, Mrs. WALORSKI, Mr. H.R. 1209: Mr. BENTIVOLIO, Mr. WENSTRUP, SCHAKOWSKY, Mr. SARBANES, Mr. RANGEL, HULTGREN, Mr. LUETKEMEYER, Mr. HUFFMAN, Mr. VELA, Mr. FLORES, Mrs. BLACK, Mrs. and Mr. ENGEL. Ms. SCHWARTZ, Mr. OLSON, Mr. DOYLE, Mr. BLACKBURN, Mr. DESJARLAIS, Mr. FINCHER, H. Con. Res. 4: Mr. LONG. CUMMINGS, Mr. MARCHANT, Mr. GRIFFIN of Mr. KEATING, Mr. BARTON, Mr. DUNCAN of H. Con. Res. 23: Mr. ROSKAM. Arkansas, Mr. WOLF, Mr. FORBES, Mr. Tennessee, Mr. DAINES, Mrs. MCMORRIS ROD- H. Res. 36: Mrs. NOEM, Mr. ROONEY, and Mr. STUTZMAN, Mr. LARSEN of Washington, Mr. GERS, Mr. REICHERT, Mr. JONES, Mr. PETERS LUETKEMEYER. ANDREWS, Mr. CA´ RDENAS, and Mr. VEASEY. of California, Mr. FLEISCHMANN, Mr. KING- H. Res. 76: Mr. LONG. H.R. 649: Mr. FARR. STON, Ms. EDWARDS, and Mr. FORBES. H. Res. 134: Mr. WOLF and Mr. TERRY. H.R. 693: Mr. DUNCAN of Tennessee. H.R. 1242: Mr. BARR. H. Res. 144: Mr. LANCE. H.R. 721: Mr. ANDREWS. H.R. 1245: Ms. LORETTA SANCHEZ of Cali- H. Res. 154: Mr. RANGEL, Ms. BORDALLO, H.R. 724: Mr. MULVANEY, Mr. BENISHEK, and fornia, Ms. JACKSON LEE, Ms. CLARKE, Mr. Ms. HAHN, Ms. LOFGREN, Mr. GEORGE MILLER Mr. PALAZZO. HIGGINS, Mr. KEATING, Mr. PAYNE, Ms. of California, Mr. PETERS of California, Ms. H.R. 730: Mr. POE of Texas. GABBARD, Mr. HORSFORD, Mr. SWALWELL of LINDA T. SA´ NCHEZ of California, Mr. SCHIFF, H.R. 732: Mr. BENTIVOLIO. California, Mr. DINGELL, Mr. CONNOLLY, Ms. Mr. SHERMAN, Mr. THOMPSON of California, H.R. 755: Ms. MATSUI. HAHN, and Mr. GALLEGO. and Mr. HONDA.

VerDate Mar 15 2010 04:23 Apr 18, 2013 Jkt 029060 PO 00000 Frm 00057 Fmt 7634 Sfmt 0634 E:\CR\FM\A17AP7.025 H17APPT1 jbell on DSK7SPTVN1PROD with HOUSE