- TXT
-
PDF
(PDF provides a complete and accurate display of this text.)
Tip
?
Calendar No. 401
116th Congress } { Report
SENATE
2d Session } { 116-192
_______________________________________________________________________
DOTGOV ONLINE TRUST IN GOVERNMENT ACT OF 2019
__________
R E P O R T
of the
COMMITTEE ON HOMELAND SECURITY AND
GOVERNMENTAL AFFAIRS
UNITED STATES SENATE
to accompany
S. 2749
TO PROVIDE REQUIREMENTS FOR THE .GOV DOMAIN, AND FOR
OTHER PURPOSES
[GRAPHIC(S) NOT AVAILABLE IN TIFF FORMAT]
January 6, 2020.--Ordered to be printed
______
U.S. GOVERNMENT PUBLISHING OFFICE
99-010 WASHINGTON : 2020
COMMITTEE ON HOMELAND SECURITY AND GOVERNMENTAL AFFAIRS
RON JOHNSON, Wisconsin, Chairman
ROB PORTMAN, Ohio GARY C. PETERS, Michigan
RAND PAUL, Kentucky THOMAS R. CARPER, Delaware
JAMES LANKFORD, Oklahoma MAGGIE HASSAN, New Hampshire
MITT ROMNEY, Utah KAMALA D. HARRIS, California
RICK SCOTT, Florida KYRSTEN SINEMA, Arizona
MICHAEL B. ENZI, Wyoming JACKY ROSEN, Nevada
JOSH HAWLEY, Missouri
Gabrielle D'Adamo Singer, Staff Director
Joseph C. Folio III, Chief Counsel
Colleen E. Berny, Professional Staff Member
David M. Weinberg, Minority Staff Director
Zachary I. Schram, Minority Chief Counsel
Jeffrey D. Rothblum, Minority Senior Professional Staff Member
Laura W. Kilbride, Chief Clerk
Calendar No. 401
116th Congress } { Report
SENATE
2d Session } { 116-192
======================================================================
DOTGOV ONLINE TRUST IN GOVERNMENT ACT OF 2019
_______
January 6, 2020.--Ordered to be printed
_______
Mr. Johnson, from the Committee on Homeland Security and
Governmental Affairs, submitted the following
R E P O R T
[To accompany S. 2749]
[Including cost estimate of the Congressional Budget Office]
The Committee on Homeland Security and Governmental
Affairs, to which was referred the bill (S. 2749), to provide
requirements for the .gov domain, and for other purposes,
having considered the same, reports favorably thereon with
amendments and recommends that the bill, as amended, do pass.
CONTENTS
Page
I. Purpose and Summary..............................................1
II. Background and Need for the Legislation..........................2
III. Legislative History..............................................5
IV. Section-by-Section Analysis......................................6
V. Evaluation of Regulatory Impact..................................9
VI. Congressional Budget Office Cost Estimate........................9
VII. Changes in Existing Law Made by the Bill, as Reported...........10
I. Purpose and Summary
S. 2749, the DOTGOV Online Trust in Government Act of 2019,
increases the utility and availability of the .gov domain to
Federal agencies, state, local, tribal and territorial (SLTT)
governments, and publicly-controlled entities. This bill sets
specific timeline requirements for the transition of the .gov
program and administration. Upon enactment, the .gov domain
program is to transition from the General Services
Administration (GSA) to the Department of Homeland Security's
(DHS) Cybersecurity and Infrastructure Security Agency (CISA).
On a continuous basis thereafter, CISA is required to inventory
all active hostnames and services in the .gov domain and
provide that data to domain registrants at no cost.
Within 30 days of the bill's enactment, CISA is required to
submit its operational and contractual transition plan for the
.gov program to Congress. CISA is also required to begin
administering the .gov domain program and publish domain
registration requirements on a public website within 120 days
of the bill's enactment. Upon CISA's publication of its
registration requirements, GSA is required to rescind the
requirements of 41 CFR, parts 102-173. Within 180 days, CISA is
to develop and submit to Congress a strategy to counter
malicious cyber activity using the .gov domain information.
CISA is also required to, within one year, publish an
outreach strategy for engaging with SLTT and publicly-
controlled entities on the benefits of the .gov domain, and
develop and publish a reference guide for migrating to the .gov
domain. Additionally, no later than one year after the bill's
enactment, CISA must develop a five-year security enhancement
strategy and implementation plan for the .gov domain and submit
it to Congress. CISA is also required to submit a report to
Congress on the outreach strategy, security strategy,
inventory, services, and fees associated with .gov domain
registration. After the submission of the initial report, CISA
is to submit follow-up reports on a biannual basis for four
years. Finally, this bill limits the fees charged for the
administration of the program to the amounts charged on October
1, 2019, for the first five years of enactment.
II. Background and the Need for Legislation
Background on the .gov domain program
Over thirty years ago, in 1985, the .gov top-level domain
(TLD) was established in the United States.\1\ The GSA started
administering the .gov program and registering Federal agencies
in 1997.\2\ In 2003, the .gov domain expanded to include SLTT
governments.\3\
---------------------------------------------------------------------------
\1\Jessica Salmoiraghi, U.S. Gen. Serv's Admin., The DotGov
Program: Putting the US Government on the Internet, at 3 (2019),
https://www.nass.org/sites/default/files/2019%20Summer/presentations/
presentation-dotgov-summer19.pdf; See also Zahra, Everything You Need
to Know About .Gov Domains, TownWeb (May 2018), https://
www.townweb.com/2016/09/30/everything-need-know-gov-domains/.
\2\Id.
\3\Id.
---------------------------------------------------------------------------
Today, there are a variety of TLDs available for websites,
including .com, .org, .net, and .us.\4\ However, these types of
domains are not exclusive, whereas the .gov domain is only
available to U.S. Government organizations.\5\ To receive a
.gov domain, registrants must meet the eligibility
requirements, pass the validation process, and verify that they
are legitimate U.S. Government entities.\6\
---------------------------------------------------------------------------
\4\Salmoiraghi, supra note 1, at 9-10.
\5\Id.; See also U.S. Gen. Serv's Admin., Why .gov?, https://
www.gsa.gov/cdnstatic/DotGov_One-Pager.pdf.
\6\DotGov Portal, Domain Requirements, https://home.dotgov.gov/
registration/requirements/; See also Steve Grobman, State County
Authorities Fail at Midterm Election Internet Security, McAfee (Oct.
24, 2018), https://www.mcafee.com/blogs/other-blogs/executive-
perspectives/state-county-authorities-fail-at-midterm-election-
internet-security/.
---------------------------------------------------------------------------
The Committee has determined that additional reforms are
needed to secure and safeguard the .gov domain program. As
discussed below, S. 2749 implements those reforms as
improvements to the .gov internet domain program.
Increases awareness and supports the transition to .gov
As of April 2019, there were 6,000 .gov domain customers
comprised of 56 percent local government, 22 percent Federal
Government, 20 percent state government, and 3 percent tribal/
native sovereign nations.\7\ Local governments make up more
than half of the .gov domain participation rate with
approximately 3,360 participants, yet the U.S. Census Bureau
reported 38,779 general purpose governments (counties, cities,
towns, townships, villages, and additional jurisdictions) in
2017.\8\ Thus, only approximately 8.7 percent of these types of
local governments are currently utilizing the .gov domain.
---------------------------------------------------------------------------
\7\Salmoiraghi, supra note 1, at 3-4, 6.
\8\U.S. Census Bureau, 2017 Census of Governments--Organization,
Table 2. Local Governments by Type and State: 2017 (2017), https://
www.census.gov/data/tables/2017/econ/gus/2017-governments.html;
Governing: the States and Localities, Number of Local Governments by
State, e.Republic (2017), https://www.governing.com/gov-data/number-of-
governments-by-state.html (citing U.S. Census Bureau); See also
Salmoiraghi, supra note 1.
---------------------------------------------------------------------------
In October 2018, McAfee examined the security of election
infrastructure at the state and county level and found that
``large majorities of county websites use top level domain
names such as .com, .net and .us rather than the government
validated .gov in their web addresses.''\9\ Specifically,
``Minnesota and Texas had the largest percentage of non-.gov
domain names with 95.4% and 95% respectively. They were
followed by Michigan (91.2%), New Hampshire (90%), Mississippi
(86.6%) and Ohio (85.9%).''\10\ Arizona had the largest .gov
domain participation with 66.7 percent of counties using
validated addresses.\11\ In addition, major cities throughout
the nation are not utilizing the .gov domain, including
Houston, Los Angeles, New York City, and Philadelphia.\12\
---------------------------------------------------------------------------
\9\Grobman, supra note 6.
\10\Id.
\11\Id.
\12\Brian Krebs, It's Way Too Easy to Get a .gov Domain Name,
KrebsonSecurity (Nov. 26, 2019), https://krebsonsecurity.com/2019/11/
its-way-too-easy-to-get-a-gov-domain-name/.
---------------------------------------------------------------------------
Utilizing the .gov domain helps local governments validate
their information to residents. For example, in December 2018,
the town website of Falmouth, Massachusetts switched from
falmouthmass.us to falmouthma.gov.\13\ According to their
information technology director, Gregory Banwarth, ``the .com.,
.org, .us name space is basically a public domain, so just
about any company or any entity can grab those things, and
we've seen an increase in the number of services [. . .] that
are actually just masquerading state or municipal services with
an extra cost attached . . .'' In addition, he stated the
public is becoming more aware of the .gov domain and knows it
is legitimate government information.\14\
---------------------------------------------------------------------------
\13\Salmoiraghi, supra note 1, at 11; See also Brad Cole, Falmouth
Getting New Website, E-Mail Address, Falmouth Enter. (Dec. 6, 2018),
https://www.capenews.net/falmouth/news/falmouth-getting-new-website-e-
mail-addresses/article_bae21f6c-f0fe-54f3-bcf8-30dce2aaa202.html.
\14\Id.
---------------------------------------------------------------------------
Currently, the Federal Government's authority to provision
.gov domains is not codified in statute. S. 2749 increases
awareness to the .gov domain by defining the purpose of the
.gov internet domain program and codifying CISA's provision of
.gov domain name registration services, and supporting
services, to any Federal, SLTT government, or other publicly-
controlled entity that complies with the registration
requirements.
Improves security for those utilizing .gov
As previously mentioned, the vast majority of county and
local governments are not currently utilizing the .gov domain.
As a result, cybercriminals are targeting these governments, as
well as small businesses and individuals, to obtain sensitive
information. One phishing campaign was uncovered earlier this
year that involved an effort to impersonate hundreds of local
government websites and prey on small businesses.\15\ According
to Lookout Phishing AI,
---------------------------------------------------------------------------
\15\Jeremy Richards, Too Close to Home: Local Business Targeted by
Phishing Attacks, Lookout Blog (May 29, 2019), https://
blog.lookout.com/local-businesses-phishing-attacks.
[t]he threat actor has registered more than 200
domains with the same email address since 2015, and is
now averaging about seven to ten per week. And
recently, the actor has created a series of fake local
government websites, impersonating the likes of Dallas
County, Polk County, the City of San Mateo, the City of
Tampa, and the City of North Las Vegas.\16\
---------------------------------------------------------------------------
\16\Id.
The fake sites were almost a perfect replica of the
legitimate websites, but contained a ``Vendor Registration
Form'' to compromise personally identifiable information and
other credentials.\17\
---------------------------------------------------------------------------
\17\Id.
---------------------------------------------------------------------------
While there are current security and verification processes
in place for U.S. Government entities to apply for and obtain a
.gov domain, individuals have recently attempted and
successfully acquired a .gov domain.\18\ In November 2019, a
computer researcher submitted to Krebs on Security evidence
that they ``got a .gov domain simply by filling out and
emailing an online form, grabbing some letterhead off the
homepage of a small U.S. town that only has a `.us' domain
name, and impersonating the town's mayor in the
application.''\19\ Although the researcher did this as an
experiment, there are malicious actors who will attempt this to
create false websites and emails, and circulate fabricated news
stories.\20\
---------------------------------------------------------------------------
\18\DotGov Portal, supra note 6; See also Krebs, supra note 12.
\19\Id.
\20\Id.
---------------------------------------------------------------------------
This bill will improve cybersecurity for government
websites by increasing the utilization of a trusted and secured
.gov domain by Federal and SLTT governments, and other
publicly-controlled entities. In addition, S. 2749 directs CISA
to develop a security enhancement strategy and implementation
plan to improve the cybersecurity benefits of the .gov domain.
The strategy will include: a modernization plan for the
information systems that support.gov domain operations; a
modernization plan for the .gov program office and contracts to
leverage and exploit emerging technologies; and, specific
cybersecurity enhancements for the domain.
Ensures an effective transition from GSA to DHS
The GSA's Office of Information Integrity and Access
currently manages the .gov internet domain program.\21\
However, in consultation with the Office of Management and
Budget (OMB) and other Executive Branch agencies, the Committee
believes that the .gov internet domain program should be moved
from GSA to DHS's CISA.\22\ S. 2749 ensures the .gov internet
domain program is effectively transferred from GSA to CISA by
laying out a transition timeline, requiring CISA to submit a
plan to Congress for the program transition, begin operational
control of the .gov internet domain program, and publicly
publish .gov domain registration policies. GSA shall rescind
its existing .gov domain requirements, which will count towards
the ``one in, two out'' rule under the Presidential Executive
Order on Reducing Regulation and Controlling Regulatory
Costs.\23\ During this transition period, and for a five-year
period starting on the date of enactment, any fees for new
registrations or annual renewals of .gov domains shall not be
more than the amount of the fees charged as of October 1, 2019.
The annual fee for the .gov domain as of that date was $400 per
year.\24\ It is not the Committee's intent to limit or define
how the Executive Branch develops processes or policies for the
coordination of the assignment of .gov domain names for
Executive Branch agencies.
---------------------------------------------------------------------------
\21\U.S. Gen. Serv's Admin., DotGov Domain Services (May 31, 2019),
https://www.gsa.gov/policy-regulations/policy/information-integrity-
and-access/dotgov-domain-services.
\22\E-mail from Office of Mgmt. & Budget, Exec. Office of the
President, to Staff of S. Comm. on Homeland Sec. and Gov'l Affairs
(Sep. 10, 2019) (on file with the Committee).
\23\Exec. Order No. 13771, 82 FR 9339 (Jan. 30, 2017), https://
www.whitehouse.gov/presidential-actions/presidential-executive-order-
reducing-regulation-controlling-regulatory-costs/.
\24\Zahra, supra note 1.
---------------------------------------------------------------------------
III. Legislative History
On October 30, 2019, Ranking Member Gary Peters (D-MI)
introduced S. 2749, DOTGOV Online Trust in Government Act of
2019, which was referred to the Committee on Homeland Security
and Governmental Affairs. Chairman Ron Johnson (R-WI), Senator
Amy Klobuchar (D-MN), Senator James Lankford (R-OK), Senator
Roy Blunt (R-MO), and Senator Margaret Wood Hassan (D-DH) are
cosponsors.
The Committee considered S. 2749 at a business meeting on
November 6, 2019. During the business meeting, Ranking Member
Peters offered an amendment and Senator Rick Scott offered an
amendment as modified.
Peters Amendment 1 made three technical changes to the
bill, including clarifying requirements for domain registrants.
Scott Amendment 1 as modified added oversight language on the
fees for making the .gov domain name registration and any
supporting services available. This included adding additional
language to the bill's findings that the .gov internet domain
should be available at no cost or at a negligible cost;
clarifying that the total fees collected shall not exceed the
direct operational expenses to maintain the .gov internet
domain program; adding to the reporting requirement on how CISA
is developing, assessing, and determining .gov domain fees; and
ensuring that any fees for .gov domains shall not be more than
the amount of the fees charged as of October 1, 2019 for a five
year period.
The Committee adopted Peters Amendment 1 and Scott
Amendment 1 as modified en bloc by voice vote. Senators present
for the votes on the amendments were: Johnson, Portman, Paul,
Lankford, Romney, Scott, Enzi, Hawley, Peters, Carper, Hassan,
Sinema, and Rosen.
The Committee favorably reported the bill en bloc, as
amended by Peter Amendment 1 and Scott Amendment 1, by voice
vote. Senators present for the vote were: Johnson, Portman,
Paul, Lankford, Romney, Scott, Enzi, Hawley, Peters, Carper,
Hassan, Sinema, and Rosen.
Consistent with Committee rules, the Committee reports the
bill with technical amendments by mutual agreement of the
Chairman and Ranking Member.
IV. Section-by-Section Analysis of the Bill, as Reported
Section 1. Short title
This section provides the bill's short title, the ``DOTGOV
Online Trust in Government Act of 2019'' or the ``DOTGOV Act of
2019.''
Section 2. Findings
This section includes findings by Congress regarding the
.gov domain, including that the .gov domain is a unique
American resource based on its role in creating the Internet.
It also recognizes that the .gov domain improves the public's
safety and security because it is recognized as a safe and
official resource, and difficult to impersonate. This section
also states that the .gov should be made available at no cost
or at a negligible cost to all levels of government in the
United States. Finally, it states that the .gov internet domain
provides a critical service and should be operated in a
transparent manner.
Section 3. Definitions
This section defines several terms, including
``Administrator,'' ``Director,'' ``online service,'' and
``State.''
Section 4. Duties of Department of Homeland Security
This section defines that the purpose of the .gov internet
domain program is to legitimize and improve the public's trust
in government entities and their online services; enable
reliable connections to and from government entities; provide
the registration of .gov internet domains in a simple and
secure manner; improve the security for the .gov namespace the
services provided; and to assist the public and domain
registrants in discovering available government services.
Section 4(b)(1) amends Title XXII of the Homeland Security
Act of 2002 by adding a new paragraph on carrying out the
duties and authorities relating to the .gov domain. The
paragraph then adds a new section at the end on the duties and
authorities relating to the .gov domain.
Subsection (a) of the new section codifies that CISA shall
offer .gov domain name registration services, and supporting
services, to any Federal, SLTT government, or other publicly-
controlled entity that complies with the requirements for
registration developed by CISA, without requiring these
entities to share unnecessary data with the federal government
or requiring them to participate in any other federal programs.
Subsection (b) of the new section codifies that CISA, in
consultation with OMB, shall establish and publicly publish the
registration and operation policies of the .gov domains
necessary to minimize the risk of .gov names that may mislead
or confuse the public; shall not permit .gov domains to be used
for commercial or campaign purposes; and, shall certify domains
are registered and retained only by authorized people. It also
limits CISA from sharing unnecessary information with other DHS
components and Federal agencies.
Subsection (c) of the new section codifies that in addition
to .gov domains, CISA may offer supporting services
specifically intended to increase the security, privacy,
reliability, accessibility, and speed of those .gov domains.
Nothing shall be construed to limit CISA's authorities to
provide services or technical assistance, or to establish new
authorities for services, other than those authorities that
support the operation of the .gov domain or registrants' needs.
Subsection (d) of the new section also allows CISA to
charge entities fees, if needed, to recover the costs of
providing .gov domain services. However, the total amount of
fees for new registrants or annual renewals of .gov domains
cannot surpass the direct operational costs of maintaining the
.gov internet domain.
Subsection (e) of the new section requires that CISA
consult with OMB, GSA, other appropriate civilian Federal
agencies, and representatives of state, local, tribal, or
territorial governments on the strategic direction and
requirements of the .gov domain, specifically on matters of
privacy, accessibility, transparency, and technology
modernization.
Subsection (f) of the new section directs CISA to inventory
all .gov domain hostnames and services, and provide that data
to all .gov users at no cost. This data can be obtained via the
analysis of public and non-public sources, which include
commercial data sets. CISA shall share all unique hostnames and
services discovered within domain registrants' zones with
Federal and non-federal domain registrants. CISA is further
directed to share data collected or used by the program about
Federal executive branch agencies as necessary with OMB in
support of OMB's role overseeing Federal technology and
cybersecurity under the Federal Information Security Management
Act. CISA is further directed to publish the publicly
accessible Federal website information online. CISA may also
publicly publish analyses and data relating to compliance with
industry best practices and Federal mandates. Additionally,
CISA is directed to collect information on the use of non-.gov
Federal domains and to collect information from SLTT
governments on non-.gov domain use. This information is also to
be published online.
Section 4(b)(2)sets forth additional duties of CISA that
are not codified in the Homeland Security Act. Section
4(b)(2)(A) directs CISA to develop a strategy to utilize the
information collected under this subsection to counter
malicious cyber activities, and to submit this strategy within
180 days of enactment to the Senate Committee on Homeland
Security and Governmental Affairs, the Senate Committee on
Rules and Administration, the House Homeland Security
Committee, and the Committee on House Administration. Within
one year of enactment, CISA, in consultation with GSA and with
entities representing SLTT governments, is required to develop
an outreach strategy, and to submit this strategy to the Senate
Committee on Homeland Security and Governmental Affairs, the
Senate Committee on Rules and Administration, the House
Homeland Security Committee, and the Committee on House
Administration. This outreach strategy will require specific
engagement plans and information explaining the benefits,
including security benefits, of moving to the .gov domain for
these governments.
Section 4(b)(2)(B) directs CISA, in consultation with GSA
and with entities representing SLTT governments, to develop and
publish a public reference guide within one year of enactment
on transitioning online services to the .gov domain. The guide
will include process and technical information in carrying out
a migration; cybersecurity best practices relating to
registration and operation of a .gov domain; and CISA-vetted
private sector resources and references to contract vehicles
that may assist in performing the migration.
Section 4(b)(2)(C) directs CISA to develop a security
enhancement strategy and implementation plan within one year
after enactment to improve the cybersecurity benefits of the
.gov domain over the next five years, and to submit the
strategy to the Senate Committee on Homeland Security and
Governmental Affairs, the Senate Committee on Rules and
Administration, the House Homeland Security Committee, and the
Committee on House Administration. The strategy will include a
modernization plan for the information systems that support the
operation of the .gov domain, a modernization plan for the
structure of the .gov program office and contracts to best take
advantage of emerging technologies, and specific cybersecurity
enhancements.
Finally, section 4(b)(3) amends Section 2008(a) of the
Homeland Security Act of 2002 and adds a new subsection that
makes .gov migration costs an allowable expense under the Urban
Area Security Initiative and State Homeland Security Grant
Program.
Section 5. Report
This section requires CISA to submit a report or a detailed
briefing one year after enactment, and again at three years and
five years after enactment to the Senate Committee on Homeland
Security and Governmental Affairs, the Senate Committee on
Rules and Administration, the House Homeland Security
Committee, and the Committee on House Administration. The
report or detailed briefing shall include information on the
status of the required outreach strategy, security enhancement
strategy and implementation plan, .gov inventory, supporting
services, and the development, assessment, and determination of
the fees for new registrations or annual renewals of .gov
domain registrants.
Section 6. Transition
This section lays out a transition timeline for
transferring the .gov internet domain program from GSA to CISA.
Within 30 days of enactment, it requires CISA to submit a plan
for transitioning the program to the Senate Committee on
Homeland Security and Governmental Affairs, the Senate
Committee on Rules and Administration, the House Homeland
Security Committee, and the Committee on House Administration.
Not later than 120 days after enactment, CISA shall begin
operational control of the .gov internet domain program and
shall publicly publish .gov domain registration policies, at
which time GSA shall rescind its existing .gov domain
requirements. In addition, this section states that for a five-
year period starting on the date of enactment, any fees for new
registrations or annual renewals of .gov domains shall not be
more than the amount of the fees charged as of October 1, 2019.
V. Evaluation of Regulatory Impact
Pursuant to the requirements of paragraph 11(b) of rule
XXVI of the Standing Rules of the Senate, the Committee has
considered the regulatory impact of this bill and determined
that the bill will have no regulatory impact within the meaning
of the rules. The Committee agrees with the Congressional
Budget Office's statement that the bill contains no
intergovernmental or private-sector mandates as defined in the
Unfunded Mandates Reform Act (UMRA) and would impose no costs
on state, local, or tribal governments.
VI. Congressional Budget Office Cost Estimate
U.S. Congress,
Congressional Budget Office,
Washington, DC, November 21, 2019.
Hon. Ron Johnson,
Chairman, Committee on Homeland Security and Governmental Affairs, U.S.
Senate, Washington, DC.
Dear Mr. Chairman: The Congressional Budget Office has
prepared the enclosed cost estimate for S. 2749, the DOTGOV
Online Trust in Government Act of 2019.
If you wish further details on this estimate, we will be
pleased to provide them. The CBO staff contact is Aldo
Prosperi.
Sincerely,
Phillip L. Swagel,
Director.
Enclosure.
S. 2749 would codify the process through which federal and
nonfederal entities request internet domain names specifically
for governmental users (i.e. domain names ending in .gov). The
bill would transfer the responsibility for overseeing the
current process from the General Services Administration (GSA)
to the Cybersecurity and Infrastructure Security Agency (CISA).
The bill also would permit state and local entities to apply
for homeland security grants to help fund the costs of
transitioning to those governmental domain names.
GSA spends about $5 million each year to manage the
program. CBO expects that under the bill, CISA would pay for
those operating expenses instead; thus, any change in spending
subject to appropriation would be insignificant.
GSA currently charges a $400 fee for each domain name
request to recover the amount it pays vendors to process the
transaction. S. 2749 would permit CISA to provide that service
with or without reimbursement. A reduction in fee collections
from nonfederal entities would be recorded as an increase in
direct spending. CBO does not expect that CISA would waive the
current fee; thus, any increase in direct spending would be
insignificant over the 2020--2029 window, CBO estimates.
The CBO staff contact for this estimate is Aldo Prosperi.
The estimate was reviewed by Leo Lex, Deputy Assistant Director
for Budget Analysis.
VII. Changes in Existing Law Made by the Bill, as Reported
In compliance with paragraph 12 of rule XXVI of the
Standing Rules of the Senate, changes in existing law made by
the bill, as reported, are shown as follows: (existing law
proposed to be omitted is enclosed in brackets, new matter is
printed in italic, and existing law in which no change is
proposed is shown in roman):
HOMELAND SECURITY ACT OF 2002
* * * * * * *
SEC. 1. SHORT TITLE; TABLE OF CONTENTS.
(a) * * *
(b) Table of Contents.--The table of contents for this Act
is as follows:
Sec. 1. * * *
* * * * * * *
TITLE XXII--CYBERSECURITY AND INFRASTRUCTURE SECURITY AGENCY
* * * * * * *
2215. Duties and Authorities Relating To .Gov Domain.
* * * * * * *
TITLE XX--HOMELAND SECURITY GRANTS
* * * * * * *
Subtitle A--Grants to States and High-Risk Urban Areas
* * * * * * *
SEC. 2008. USE OF FUNDS
(a) * * *
(1) * * *
* * * * * * *
(13) any activity permitted under the Fiscal Year
2007 Program Guidance of the Department for the State
Homeland Security Grant Program, the Urban Area
Security Initiative (including activities permitted
under the full-time counterterrorism staffing pilot),
or the Law Enforcement Terrorism Prevention Program;
[and]
(14) migrating any online service (as defined in
section 3 of the DOTGOV Online Trust in Government Act
of 2019) to the .gov domain; and
[(14)] (15) any other appropriate activity, as
determined by the Administrator.
* * * * * * *
TITLE XXII--CYBERSECURITY AND INFRASTRUCTURE SECURITY AGENCY
* * * * * * *
Subtitle A--Cybersecurity and Infrastructure Security
* * * * * * *
SEC. 2202. CYBERSECURITY AND INFRASTRUCTURE SECURITY AGENCY
(a) * * *
(b) * * *
(c) * * *
(1) * * *
* * * * * * *
(10) carry out cybersecurity, infrastructure
security, and emergency communications stakeholder
outreach and engagement and coordinate that outreach
and engagement with critical infrastructure Sector-
Specific Agencies, as appropriate; [and]
(11) carry out the duties and authorities relating to
the .gov domain, as described in section 2215; and
[(11)] (12) carry out such other duties and powers
prescribed by law or delegated by the Secretary.
* * * * * * *
SEC. 2215. DUTIES AND AUTHORITIES RELATING TO .GOV DOMAIN
(a) Availability of .gov Domain.--The Director shall make
.gov domain name registration services, as well as any
supporting services described in subsection (c), generally
available--
(1) to any Federal, State, local, or territorial
government entity, or other publicly controlled entity,
including any Tribal government recognized by the
Federal Government or a State government, that complies
with the requirements for registration developed by the
Director as described in subsection (b);
(2) without conditioning registration on the sharing
of any information with the Director or any other
Federal entity, other than the information required to
meet the requirements described in subsection (b); and
(3) without conditioning registration on
participation in any separate service offered by the
Director or any other Federal entity.
(b) Requirements.--The Director, in consultation with the
Director of the Office of Management and Budget, shall
establish and publish on a publicly available website
requirements for the registration and operation of .gov domains
sufficient to--
(1) minimize the risk of .gov domains whose names
could mislead or confuse users;
(2) establish that .gov domains may not be used for
commercial or campaign purposes;
(3) ensure that domains are registered and maintained
only by authorized individuals; and
(4) limit the sharing or use of any information
obtained through the administration of the .gov domain
with any other Department component or any other agency
of the Federal Government for any purpose other than
the administration of the .gov domain, the services
described in subsection (c), and the requirements for
establishing a .gov inventory described in subsection
(f).
(c) Supporting Services.--
(1) In general.--The Director may provide services to
the entities described in subsection (a)(1)
specifically intended to support the security, privacy,
reliability, accessibility, and speed of registered
.gov domains.
(2) Rule of Construction.--Nothing in paragraph (1)
shall be construed to--
(A) limit other authorities of the Director
to provide services or technical assistance to
an entity described in subsection (a)(1); or
(B) establish new authority for services
other than those the purpose of which expressly
supports the operation of .gov domains and the
needs of .gov domain registrants.
(d) Fees.--
(1) In general.--The Director may provide any service
relating to the availability of the .gov internet
domain program, including .gov domain name registration
services described in subsection (a) and supporting
services described in subsection (c), to entities
described in subsection (a)(1) with or without
reimbursement.
(2) Limitation.--The total fees collected for new
.gov domain registrants or annual renewals of .gov
domains shall not exceed the direct operational
expenses of maintaining the .gov internet domain.
(e) Consultation.--The Director shall consult with the
Director of the Office of Management and Budget, the
Administrator of General Services, other civilian Federal
agencies as appropriate, and entities representing State,
local, Tribal, or territorial governments in developing the
strategic direction of the .gov domain and in establishing
requirements under subsection (b), in particular on matters of
privacy, accessibility, transparency, and technology
modernization.
(f) .gov Inventory.--
(1) In general.--The Director shall, on a continuous
basis--
(A) inventory all hostnames and services in
active use within the .gov domain; and
(B) provide the data described in
subparagraph (A) to domain registrants at no
cost.
(2) Requirements.--In carrying out paragraph (1)--
(A) data may be collected through analysis of
public and non-public sources, including
commercial data sets;
(B) the Director shall share with Federal and
non-Federal domain registrants all unique
hostnames and services discovered within the
zone of their registered domain;
(C) the Director shall share any data or
information collected or used in the management
of the .gov domain name registration services
relating to Federal executive branch
registrants with the Director of the Office of
Management and Budget for the purpose of
fulfilling the duties of the Director of the
Office of Management and Budget under section
3553 of title 44, United States Code;
(D) the Director shall publish on a publicly
available website discovered hostnames that
describe publicly accessible Federal agency
websites, to the extent consistent with the
security of Federal information systems but
with the presumption of disclosure;
(E) the Director may publish on a publicly
available website any analysis conducted and
data collected relating to compliance with
Federal mandates and industry best practices,
to the extent consistent with the security of
Federal information systems but with the
presumption of disclosure; and
(F) the Director shall--
(i) collect information on the use of
non-.gov domain suffixes by Federal
agencies for their official online
services;
(ii) collect information on the use
of non-.gov domain suffixes by State,
local, Tribal, and territorial
governments; and
(iii) publish the information
collected under clause (i) on a
publicly available website.
(3) Strategy.--Not later than 180 days after the date
of enactment of this section, the Director shall
develop and submit to the Committee on Homeland
Security and Governmental Affairs and the Committee on
Rules and Administration of the Senate and the
Committee on Homeland Security and the Committee on
House Administration of the House of Representatives a
strategy to utilize the information collected under
this subsection for countering malicious cyber
activity.
* * * * * * *