Text: H.R.940 — 115th Congress (2017-2018)All Bill Information (Except Text)

There is one version of the bill.

Text available as:

Shown Here:
Introduced in House (02/07/2017)

 
[Congressional Bills 115th Congress]
[From the U.S. Government Publishing Office]
[H.R. 940 Introduced in House (IH)]

<DOC>






115th CONGRESS
  1st Session
                                H. R. 940

 To secure communications of utilities from terrorist threats, and for 
                            other purposes.


_______________________________________________________________________


                    IN THE HOUSE OF REPRESENTATIVES

                            February 7, 2017

 Ms. Jackson Lee introduced the following bill; which was referred to 
                   the Committee on Homeland Security

_______________________________________________________________________

                                 A BILL


 
 To secure communications of utilities from terrorist threats, and for 
                            other purposes.

    Be it enacted by the Senate and House of Representatives of the 
United States of America in Congress assembled,

SECTION 1. SHORT TITLE.

    This Act may be cited as the ``Securing Communications of Utilities 
from Terrorist Threats'' or the ``SCOUTS Act''.

SEC. 2. POLICY.

    (a) Security and Resilience.--The Secretary of Homeland Security, 
in coordination with the sector-specific agencies, may work with 
critical infrastructure owners and operators and State, local, tribal, 
and territorial entities to seek voluntary participation of such 
agencies to determine how the Department of Homeland Security can best 
serve the sector-specific cybersecurity needs to manage risk and 
strengthen the security and resilience of the Nation's critical 
infrastructure against terrorist attacks that could have a debilitating 
impact on national security, economic stability, public health and 
safety, or any combination thereof.
    (b) Objectives.--In implementing subsection (a), the Secretary 
shall seek to reduce vulnerabilities, minimize consequences, identify 
and disrupt terrorism threats, and hasten response and recovery efforts 
related to impacted critical infrastructures.
    (c) Investigation of Best Means To Engage Owners and Operators.--
The Secretary, in coordination with the sector-specific agencies, may 
investigate the best means for engaging sector-specific agencies in 
participation in a voluntary cybersecurity information sharing, 
emergency support, and emerging threat awareness program.
    (d) Listening Opportunity.--The Secretary shall establish voluntary 
opportunities for sector-specific agencies and critical infrastructure 
owners and operators to inform the Department of Homeland Security of 
sector-specific challenges to cybersecurity, including regarding--
            (1) what needs they may have or may not have regarding 
        critical infrastructure protection; and
            (2) how the Department of Homeland Security is or is not 
        helping to meet those needs that have been identified, through 
        voluntary participation.
    (e) GAO Report.--The Comptroller General of the United States shall 
report to the Congress by not later than 6 months after the date of the 
enactment of this Act on the views, experiences, and preferences of 
critical infrastructure owners and operators regarding the benefits of 
engaging in voluntary cybersecurity incident reporting, intelligence 
gathering, and technical support resources provided by the Department 
of Homeland Security.
    (f) International Partners.--The Secretary shall, in consultation 
with appropriate Federal agencies, establish terrorism prevention 
policy to engage with international partners to strengthen the security 
and resilience of domestic critical infrastructure and critical 
infrastructure located outside of the United States, or in its 
territorial waters, on which the Nation depends.

SEC. 3. STRATEGIC IMPERATIVES.

    (a) Research and Report on the Most Efficient Means for Information 
Exchange by Identifying Baseline Data and Systems Requirements for the 
Federal Government.--The Secretary shall facilitate the timely exchange 
of terrorism threat and vulnerability information as well as 
information that allows for the development of a situational awareness 
capability for Federal civilian agencies during terrorist incidents. 
The goal of such facilitation is to enable efficient information 
exchange through the identification of requirements for data and 
information formats and accessibility, system interoperability, and 
redundant systems and alternate capabilities should there be a 
disruption in the primary systems.
    (b) Implementation of an Integration and Analysis Function To 
Inform Planning and Operational Decisions Regarding the Protection of 
Critical Infrastructure From Terrorism Events.--The Secretary of 
Homeland Security shall implement an integration and analysis function 
for critical infrastructure that includes operational and strategic 
analysis on terrorism incidents, threats, and emerging risks. Such 
function shall include establishment by the Secretary of integration of 
data sharing capabilities with Fusion Centers that accomplish the 
following:
            (1) Determine the appropriate role that Fusion Centers may 
        fill in reporting data related to cybersecurity threat or 
        incident information regarding individuals or service providers 
        with access to or ongoing business relationships with critical 
        infrastructure.
            (2) Determine whether or how the National Protection and 
        Programs Directorate and the National Cybersecurity and 
        Communications Integration Center may work with Fusion Centers 
        to report possible cybersecurity incidents.
            (3) Determine a means for Fusion Centers to report 
        availability of critical infrastructure to support local, 
        State, Federal, tribal, and territorial law enforcement and the 
        provision of basic public services after disruption events such 
        as electric power brownouts and blackouts, accidents that 
        disrupt service, and vandalism to or near facilities.
            (4) Categorize and prioritize cybersecurity intake risk 
        information based on relevance to critical infrastructure 
        owners or operators in the area served by the Fusion Center.
            (5) Establish an emerging threat hotline and secure online 
        sector-specific cybersecurity incident reporting portal by 
        which information may be disseminated through Fusion Centers.
            (6) Develop, keep up to date, and make available a Federal 
        agency directory of designated offices or individuals tasked 
        with responding to, mitigating, or assisting in recovery from 
        cybersecurity incidents involving critical infrastructure and 
        make the directory available on a voluntary basis to critical 
        infrastructure owners and operators.
            (7) Establish a voluntary incident access portal with the 
        ability to allow users to determine the means, methods, and 
        level of incident reporting that is sector-specific and 
        relevant to the recipient as defined and controlled by the 
        recipient.
            (8) Gather voluntary feedback from critical infrastructure 
        owners and operators on the value, relevance, and timeliness of 
        the information received, which shall include how they believe 
        information and the means used to disseminate that information 
        might be improved.
            (9) Report to Congress every 2 years on the voluntary 
        participation of critical infrastructure owners and operators 
        in the programs established under this title.
            (10) Implement a capability to collate, assess, and 
        integrate vulnerability and consequence information with threat 
        streams and hazard information to--
                    (A) evaluate the impact of cybersecurity and 
                cyberphysical impacts of critical physical assets;
                    (B) aid in prioritizing assets and managing risks 
                to critical infrastructure in impacted areas;
                    (C) determine, through the voluntary cooperation of 
                critical infrastructure owners and operators, the 
                staffing and professional need for cybersecurity 
                critical infrastructure protection with Fusion Centers;
                    (D) determine, through coordination with the 
                sector-specific agencies, the agency staffing needed to 
                support cybersecurity critical infrastructure 
                protection and report the findings to Congress;
                    (E) research and report findings regarding the 
                feasibility of exploring terrorist incident 
                correlations between critical infrastructure damage, 
                destruction, and diminished capacity, and what occurs 
                during certain natural disasters;
                    (F) anticipate interdependencies and cascading 
                impacts related to cyber telecommunications failures;
                    (G) recommend security and resilience measures for 
                critical infrastructure prior to, during, and after a 
                terrorism event or incident;
                    (H) evaluate interdependencies and cascading 
                impacts related to electric grid failures;
                    (I) support post-terrorism incident management and 
                restoration efforts related to critical infrastructure; 
                and
                    (J) make recommendations on preventing the collapse 
                or serious degrading of the telecommunication 
                capability in an area impacted by a terrorism event.
            (11) Support the Department of Homeland Security's ability 
        to maintain and share, as a common Federal service, a near 
        real-time situational awareness capability for critical 
        infrastructure that includes actionable information about 
        imminent terrorist threats, significant trends, and awareness 
        of incidents that may impact critical infrastructure.

SEC. 4. DEFINITIONS.

    For purposes of this Act:
            (1) Critical infrastructure.--The term ``critical 
        infrastructure'' means systems and assets, whether physical or 
        virtual, so vital to the United States that the incapacity or 
        destruction of such systems and assets would have a 
        debilitating impact on security, national economic security, 
        national public health or safety, or any combination of those 
        matters.
            (2) Resilience.--The term ``resilience'' means the ability 
        to prepare for and adapt to changing conditions and withstand 
        and recover rapidly from disruptions. The term includes the 
        ability to withstand and recover from deliberate attacks, 
        accidents, or naturally occurring threats or incidents.
            (3) Sector-specific agency.--The term ``sector-specific 
        agency'' means a Federal department or agency designated as a 
        Sector-Specific Agency by Presidential Policy Directive 21, 
        relating to Critical Infrastructure Security and Resilience.
            (4) Security.--The term ``security'' means reducing the 
        risk to critical infrastructure by physical means or defense 
        cyber measures to intrusions, attacks, or the effects of 
        terrorist intrusions or attacks.
                                 <all>