<?xml version="1.0"?>
<?xml-stylesheet type="text/xsl" href="billres.xsl"?>
<!DOCTYPE bill PUBLIC "-//US Congress//DTDs/bill.dtd//EN" "bill.dtd">
<bill bill-stage="Introduced-in-House" bill-type="olc" dms-id="H55AC057BFB3D462EA390EC7B2CF58141" public-private="public"> 
<form> 
<distribution-code display="yes">I</distribution-code> 
<congress>111th CONGRESS</congress> <session>1st Session</session> 
<legis-num>H. R. 2195</legis-num> 
<current-chamber>IN THE HOUSE OF REPRESENTATIVES</current-chamber> 
<action> 
<action-date date="20090430">April 30, 2009</action-date> 
<action-desc><sponsor name-id="T000193">Mr. Thompson of Mississippi</sponsor> (for himself, <cosponsor name-id="K000210">Mr. King of New York</cosponsor>, <cosponsor name-id="C001067">Ms. Clarke</cosponsor>, <cosponsor name-id="L000517">Mr. Daniel E. Lungren of California</cosponsor>, <cosponsor name-id="J000032">Ms. Jackson-Lee of Texas</cosponsor>, <cosponsor name-id="S000030">Ms. Loretta Sanchez of California</cosponsor>, <cosponsor name-id="H000213">Ms. Harman</cosponsor>, <cosponsor name-id="C001063">Mr. Cuellar</cosponsor>, <cosponsor name-id="C001065">Mr. Carney</cosponsor>, <cosponsor name-id="L000397">Ms. Zoe Lofgren of California</cosponsor>, <cosponsor name-id="P000096">Mr. Pascrell</cosponsor>, <cosponsor name-id="L000570">Mr. Luján</cosponsor>, and <cosponsor name-id="L000559">Mr. Langevin</cosponsor>) introduced the following bill; which was referred to the <committee-name committee-id="HIF00">Committee on Energy and Commerce</committee-name>, and in addition to the Committee on <committee-name committee-id="HHM00">Homeland Security</committee-name>, for a period to be subsequently determined by the Speaker, in each case for consideration of such provisions as fall within the jurisdiction of the committee concerned</action-desc> 
</action> 
<legis-type>A BILL</legis-type> 
<official-title>To amend the Federal Power Act to provide additional authorities to adequately protect the critical electric infrastructure against cyber attack, and for other purposes.</official-title> 
</form> 
<legis-body id="HE99C1069127D492ABB21EF73F8FCD352" style="OLC"> 
<section id="HAB9D4515DB504D5BB84816275F35B6C0" section-type="section-one"><enum>1.</enum><header>Critical electric infrastructure</header> 
<subsection id="H18C10AC095654EF59C8538956793FEAE"><enum>(a)</enum><header>Findings</header> 
<paragraph id="H80D45AD875914C6FAC0967E7B261CC9D"><enum>(1)</enum><text>The critical electric infrastructure of the United States and Canada has more than $1 trillion in asset value, more than 200,000 miles of transmission lines, and more than 800,000 megawatts of generating capability, serving over 300 million people.</text> </paragraph>
<paragraph id="HDB2124815C0C4EAC8DDFACE47984644C"><enum>(2)</enum><text>The effective functioning of this infrastructure is highly dependent on computer-based control systems that are used to monitor and manage sensitive processes and physical functions.</text> </paragraph>
<paragraph id="HCD97C403225E4862BB01C2BB18A8C524"><enum>(3)</enum><text>These control systems are becoming increasingly connected to open networks, such as corporate intranets and the Internet. According to the Department of Homeland Security’s United States Computer Emergency Readiness Team (<quote>US–CERT</quote>), this transition towards widely used technologies and open connectivity exposes control systems to the ever-present cyber risks that exist in the information technology world in addition to control system specific risks.</text> </paragraph>
<paragraph id="H25109400BC63436293D500563D31CB8D"><enum>(4)</enum><text>Malicious actors pose a significant risk to this infrastructure. The Federal Bureau of Investigation (<quote>FBI</quote>) has identified multiple sources of threats, including foreign nation states, domestic criminals and hackers, and disgruntled employees.</text> </paragraph>
<paragraph id="H246CAF38A0A74B7E8E83FFB15924C4A7"><enum>(5)</enum><text>Intentional or naturally occurring Electromagnetic Pulse (<quote>EMP</quote>) events also threaten critical electric infrastructure. The Commission to Assess the Threat to the United States from EMP Attack reported in 2008 that an EMP attack could cause significant damage or disruption to critical electric infrastructure and other critical infrastructure due to the widespread use of Supervisory Control and Data Acquisition (<quote>SCADA</quote>) systems. The National Academy of Sciences also reported in 2008 that Severe Space Weather Events could produce similar results.</text> </paragraph>
<paragraph id="HD62B492634F2496B896D6B424F434522"><enum>(6)</enum><text display-inline="yes-display-inline">The Department of Homeland Security’s Control Systems Security Program is designed to increase the reliability, security, and resilience of control systems to guard against and enhance domestic preparedness for and collective response to a cyber attack by a terrorist or other person. This is done by developing voluntary cyber risk reduction products, supporting the Department of Homeland Security’s Industrial Control Systems Computer Emergency Response Team (“ICS–CERT”) in developing vulnerability mitigation recommendations and strategies, and coordinating and leveraging activities for improving the Nation’s critical infrastructure security posture.</text> </paragraph>
<paragraph id="H32F63CFDAA934750ABF4598DA0C02CBC"><enum>(7)</enum><text display-inline="yes-display-inline">According to recent news reports, the electronic control systems of the electrical system in the United States have been routinely penetrated and compromised. According to current and former national security officials, cyber spies from China, Russia, and other countries have penetrated the United States electrical system in order to map the system, and have left behind software programs that could be used to disrupt and disable the system.</text> </paragraph>
<paragraph id="H05DA95B5705A40EC804CC4B860B393A1"><enum>(8)</enum><text display-inline="yes-display-inline">In the interest of national security, and to enhance domestic preparedness for and collective response to a cyber attack by a terrorist or other person, a statutory mechanism is necessary to protect the critical electric infrastructure against cyber threats.</text> </paragraph>
<paragraph id="HFBFFEC642D994A68987DBE866ABF0C9"><enum>(9)</enum><text display-inline="yes-display-inline">In spite of existing mandatory cybersecurity standards, a report from the North American Electric Reliability Corporation (<quote>NERC</quote>) suggests that many utilities are underreporting their assets, potentially to avoid compliance requirements. In April 2009, NERC reported that only 23 percent of responding utilities identified a <quote>Critical Cyber Asset</quote> as required by NERC Reliability Standard 002–1. According to NERC, the results of this survey suggest that utilities may not have identified certain qualifying assets as <quote>Critical</quote>. NERC requested that entities take a fresh, comprehensive look at their methodology in order to identify and secure more Critical Cyber Assets.</text> </paragraph>
<paragraph id="HFDB2989C3FF84B9FB584CB65C918F12E"><enum>(10)</enum><text>On May 21, 2008, in testimony before the House Committee on Homeland Security, Joseph Kelliher, then-Chairman of the Federal Energy Regulatory Commission (<quote>the Commission</quote>), stated that his agency is in need of additional legal authorities to adequately protect the electric power system against cyber attack.</text> </paragraph></subsection>
<subsection id="H13FC0AACD3944764842AAC714903F2F0"><enum>(b)</enum><header>Research on cyber compromise of critical electric infrastructure</header>
<paragraph commented="no" display-inline="yes-display-inline" id="HA7A420DE05ED444DA07A5D53DA7EE6F5"><enum>(1)</enum><text display-inline="yes-display-inline">Pursuant to section 201 of the Homeland Security Act of 2002 (6 U.S.C. 121) and in furtherance of domestic preparedness for and collective response to a cyber attack by a terrorist or other person, the Secretary of Homeland Security, working with other national security and intelligence agencies, shall conduct research and determine if the security of federally owned programmable electronic devices and communication networks (including hardware, software, and data) essential to the reliable operation of critical electric infrastructure have been compromised.</text> </paragraph>
<paragraph id="H64B9FDE54AB04518A4C6ABABFFF5E601" indent="up1"><enum>(2)</enum><text>The scope of the research referred to in paragraph (1) shall include: the extent of compromise, identification of attackers, the method of penetration, ramifications of the compromise on future operations of critical electric infrastructure, secondary ramifications of the compromise on other critical infrastructure sectors and the functioning of civil society, ramifications of compromise on national security, including war fighting capability, and recommended mitigation activities.</text> </paragraph>
<paragraph id="H09A24253B07B42298F13C38E69E62D94" indent="up1"><enum>(3)</enum><text>The Secretary of Homeland Security shall report the findings to the appropriate committees of Congress, including the Committee on Homeland Security of the House of Representatives and the Homeland Security and Governmental Affairs Committee of the Senate. The report may contain a classified annex.</text> </paragraph></subsection>
<subsection id="HEAD952C7E4F24870968C6B10C3074E4D"><enum>(c)</enum><header>Federal Power Act Amendment</header><text>Part II of the Federal Power Act (16 U.S.C. 791a and following) is amended by adding the following new sections at the end thereof:</text> 
<quoted-block display-inline="no-display-inline" id="H2B0A948D787E4ACFBA086B49D0566DB6" style="OLC"> 
<section id="H358B4926BDBA494F83DD38233029B16"><enum>224</enum><header>Critical infrastructure</header> 
<subsection id="HB63A9C55D08B43C9A4EF6873E81F62B7"><enum>(a)</enum><header>Definitions</header><text display-inline="yes-display-inline">For purposes of this section:</text> 
<paragraph id="H307ACFE3482F4B88B468A2E106BB88"><enum>(1)</enum><header>Critical electric infrastructure</header><text display-inline="yes-display-inline">The term <term>critical electric infrastructure</term> means systems and assets, whether physical or cyber used for the generation, transmission, distribution, or metering of electric energy that, in the determination of the Commission, in consultation with the Secretary of Homeland Security and other national security agencies, are so vital to the United States that the incapacity or destruction of such systems and assets, either alone or in combination with the failure of other assets, would cause significant harm to the security, national or regional economic security, or national or regional public health or safety.</text> </paragraph>
<paragraph id="HDFF139740AF849E4B706AEE4115F6373"><enum>(2)</enum><header>Critical electric infrastructure information</header><text>The term <term>critical electric infrastructure information</term> means critical infrastructure information related to critical electric infrastructure.</text> </paragraph>
<paragraph id="H4051AD5806424D08A62F444632C7B3EB"><enum>(3)</enum><header>Critical infrastructure information</header><text>The term <term>critical infrastructure information</term> has the same meaning as is given that term in section 212(3) of the Critical Infrastructure Information Act of 2002 (6 U.S.C. 131(3)).</text> </paragraph>
<paragraph id="HBF6352D5F7624AEAB87226A3FADF63E4"><enum>(4)</enum><header>Cyber threat</header><text>The term <term>cyber threat</term> means any act by a terrorist or other person that disrupts, attempts to disrupt, or poses a significant risk of disruption to the operation of programmable electronic devices and communication networks (including hardware, software, and data) essential to the reliable operation of critical electric infrastructure.</text> </paragraph>
<paragraph id="H0928BDB1A78840AE934CDC59877B1179"><enum>(5)</enum><header>Cyber vulnerability</header><text display-inline="yes-display-inline">The term ‘cyber vulnerability’ means any weakness that, if exploited by a terrorist or other person, poses a significant risk of disruption to the operation of programmable electronic devices and communication networks (including hardware, software, and data) essential to the reliable operation of critical electric infrastructure.</text> </paragraph></subsection>
<subsection id="HFAD9DA20699A4596B09386638F6E9F27"><enum>(b)</enum><header>Assessment, report, and determination</header> 
<paragraph id="H4CB6307EDDB04A9A9293697D042F44F9"><enum>(1)</enum><header>In general</header><text>Pursuant to section 201 of the Homeland Security Act of 2002 (6 U.S.C. 121), the Secretary of Homeland Security shall assess cyber vulnerabilities or threats to critical infrastructure, including critical electric infrastructure and advanced metering infrastructure, on an ongoing basis and produce reports, including recommendations, on a periodic basis for the purposes of homeland security, including the enhancement of domestic preparedness for and collective response to a cyber attack by a terrorist, nation-state, or other person, and for other purposes.</text> </paragraph>
<paragraph id="H371FFCC1322041769849D99E5AE16859"><enum>(2)</enum><header>Elements of the report</header><text>The Secretary shall—</text> 
<subparagraph id="H1F8195EF55174C7F8D20EE7C4C0C2EE4"><enum>(A)</enum><text>include in the reports under this section findings regarding a cyber vulnerability or terrorist threat or potential terrorist threat, and a nation-state threat or potential threat to critical electric infrastructure; and</text> </subparagraph>
<subparagraph id="HBE2F73BE28E4491EAEDB17555AF5475F"><enum>(B)</enum><text>provide recommendations regarding actions that may be performed to enhance individualized and collective domestic preparedness and response to the cyber vulnerability or terrorist or nation-state.</text> </subparagraph></paragraph>
<paragraph id="H9EC5958595204C59B7641E38D5EFE3D8"><enum>(3)</enum><header>Transmittal of report</header><text display-inline="yes-display-inline">The Secretary of Homeland Security shall transmit reports prepared in response to the cyber vulnerability or threat to the Commission and the appropriate committees of Congress, including the Committee on Homeland Security of the House of Representatives and the Homeland Security and Governmental Affairs Committee of the Senate, of the Secretary’s determinations under this section. Each such report may contain a classified annex.</text> </paragraph>
<paragraph id="HD799680AC6CF4646B87190EEE779B2A0"><enum>(4)</enum><header>Timely determination</header><text>If, in carrying out the assessment required under paragraph (1), the Secretary of Homeland Security determines that a significant cyber vulnerability or threat to critical electric infrastructure has been identified, the Secretary of Homeland Security shall communicate such a determination to the Commission in a timely manner. The Secretary of Homeland Security may incorporate intelligence or information received from other national security or intelligence agencies in making such determination.</text> </paragraph></subsection>
<subsection id="HB9F7D6047508475E98E800C5A9C4536"><enum>(c)</enum><header>Commission authority</header> 
<paragraph id="H1523C78A29464815B7A6901FFF1FC44D"><enum>(1)</enum><header>Issuance of rules or orders</header><text>Following receipt of a finding under subsection (b), the Commission shall issue (and from time to time thereafter amend) such rules or orders as are necessary to protect critical electric infrastructure against vulnerabilities or threats.</text> </paragraph>
<paragraph id="H6D9571C09073491EA851C7FF5B3F5664"><enum>(2)</enum><header>Emergency procedures</header><text>The Commission may issue, in consultation with the Secretary of Homeland Security, a rule or order under this section without prior notice or hearing if it determines the rule or order must be issued immediately to protect critical electric infrastructure from an imminent threat or vulnerability.</text> </paragraph></subsection>
<subsection id="HAE2EDE8E9DF44F6183D5D72EABD94C59"><enum>(d)</enum><header>Duration of emergency rules or orders</header><text>Any rule or order issued by the Commission without prior notice or hearing under subsection (c)(2) shall remain effective for not more than 90 days unless, during such 90 days, the Commission gives interested persons an opportunity to submit written data, views, or arguments (with or without opportunity for oral presentation) and affirms, amends, or repeals the rule or order.</text> </subsection>
<subsection id="H085731923C60452F86125C2FDF4D5BCD"><enum>(e)</enum><header>Jurisdiction</header><text>Notwithstanding section 201, the provisions of this section shall apply to any entity that owns, controls, or operates critical electric infrastructure, and such entities shall be subject to the jurisdiction of the Commission for purposes of carrying out this section and for purposes of applying the enforcement authorities of this Act with respect to such provisions, but shall not make an electric utility or any other entity subject to the jurisdiction of the Commission for any other purposes.</text> </subsection>
<subsection id="H89986FB3A8E4455FB88E6B00234471A1"><enum>(f)</enum><header>Protection of critical electric infrastructure information</header><text>The provisions of section 214 of the Homeland Security Act of 2002 (6 U.S.C. 133) shall apply to critical electric infrastructure information submitted to the Commission under this section to the same extent that they apply to critical infrastructure information voluntarily submitted to the Department of Homeland Security under that Act (6 U.S.C. 101 and following).</text> </subsection></section>
<section id="H4321ABF79EE14E508A740806127C787C"><enum>224B.</enum><header>Protection against known cyber vulnerabilities or threats to the critical electric infrastructure</header> 
<subsection id="H1CCC2A9E42C54F82A45E1D41D1B48A02"><enum>(a)</enum><header>Interim measures</header><text display-inline="yes-display-inline">After notice and opportunity for comment, the Commission shall establish, in consultation with the Secretary of Homeland Security, by rule or order, within 120 days of enactment of this section, such mandatory interim measures as are necessary to protect against known cyber vulnerabilities or threats to the reliable operation of the critical electric infrastructure in the United States. Such interim reliability measures:</text> 
<paragraph id="H2CBA833800354E9C92BB66B8644301CE"><enum>(1)</enum><text display-inline="yes-display-inline">shall serve to supplement, replace, or modify cybersecurity reliability standards that, as of the date of enactment of this section, were in effect pursuant to section 215, but that are determined by the Commission, in consultation with the Secretary of Homeland Security and other national security agencies, to be inadequate to address known cyber vulnerabilities or threats; and</text> </paragraph>
<paragraph id="H311C95FC978A4764BCBE882E6CA07C2C"><enum>(2)</enum><text display-inline="yes-display-inline">may be replaced by new cybersecurity reliability standards that are developed and approved pursuant to section 215 following the date of enactment of this section.</text> </paragraph></subsection>
<subsection id="H880D9156FFCB41D9A2CB0327A7C04E7C"><enum>(b)</enum><header>Plans</header><text display-inline="yes-display-inline">The rule or order issued under this subsection may require any owner, user or operator of critical electric infrastructure in the United States to develop a plan to address cyber vulnerabilities or threats identified by the Commission and to submit such plan to the Commission for approval.</text> </subsection></section><after-quoted-block>.</after-quoted-block></quoted-block> </subsection></section>
<section id="H558E990C72E34D2B86A8E13F989A31B0"><enum>2.</enum><header>Evaluation of existing authorities</header><text display-inline="no-display-inline">Section 214 of title II, subtitle B of the Homeland Security Act of 2002 (6 U.S.C. 133(i)) is amended by adding at the end the following:</text> 
<quoted-block display-inline="no-display-inline" id="HE2B305CF43C9411CABE775C6BADB5AA4" style="OLC"> 
<subsection id="H4A09165FA93B4E939BBEFB3692FFFBB1"><enum>(i)</enum><header>Review of authorities To protect critical infrastructure</header><text display-inline="yes-display-inline">The Secretary of Homeland Security shall evaluate the capacity and authority of the Department of Homeland Security and other Federal agencies to ensure the security and resilience of electronic devices and communication networks essential to each of the critical infrastructure sectors identified pursuant to Homeland Security Presidential Directive 7 against a cyber attack by a terrorist, nation-state, or other person, for the purpose of enhancing domestic preparedness for, and collective response to, a cyber attack by a terrorist, nation-state, or other person and to enhance the Nation's homeland security posture.</text> </subsection><after-quoted-block>.</after-quoted-block></quoted-block> </section>
</legis-body> 
</bill> 
