|00:00:01||S. CYBERSECURITY POLICIES REMAIN CONSISTENT FOR PROTECTIONS AGAINST THREATS TO OUR GOVERNMENT AND PRIVATE SECTOR NETWORKS.|
|00:00:08||THIS AMENDMENT WILL MAINTAIN CONSISTENCY AMONG THIS BILL AND OTHER CYBERSECURITY POLICIES.|
|00:00:14||THE TERMS, QUOTE, DENY, DEGRADE, DISRUPT, DESTROY, ARE FOUND THROUGHOUT OUR NATIONAL SECURITY STRATEGY AND GUIDANCE DOCUMENTS.|
|00:00:26||GUIDE WAS EMITTED FROM H.|
|00:00:30||INSERTING IT WILL MAKE -- THE INCREASE IN CYBERSECURITY INCIDENCES LED TO THE DEVELOPMENT OF CENTERS LIKE THE AIR FORCE'S CYBERSPACE TECHNICAL OF EXCELLENCE IN MY DISTRICT IN DEYTON, OHIO.|
|00:00:44||TO COMBAT THIS GROWING TREND IN THE SOPHISTICATION OF CYBERATTACKS, THE CENTER OF TECHNICAL EXCELLENCE HAS BEEN TURNED TO THAT FOCUS.|
|00:00:51||THE NEED TO PROTECT U.|
|00:00:52||S. NETWORKS FROM DENIAL OF SERVICE ATTACKS WAS MADE CLEAR THREE WEEKS OF 2007 ESTONIA WAS DENIED SERVICE ATTACKS AGAINST GOVERNMENT WEBSITES, BANKS, UNIVERSITIES AND ESTONIA NEWSPAPERS.|
|00:01:06||I URGE ALL OF MY COLLEAGUES TO SUPPORT THIS AMENDMENT AND THE UNDERLYING BILL.|
|00:01:12||WITH THAT I RESERVE THE BALANCE OF MY TIME.|
|00:01:18||THE CHAIR: THE GENTLEMAN RESERVES THE BALANCE OF HIS TIME.|
|00:01:21||THE GENTLEMAN FROM MICHIGAN IS RECOGNIZED.|
|00:01:23||ROGERS: THANK YOU, MADAM CHAIR WOMAN.|
|00:01:24||I THANK MR. TURNER.|
Mr. TURNER of Ohio. Madam Chairman, this amendment would make a technical correction to the definition sections of this bill to ensure that U.S. cybersecurity policies remain consistent for protections against threats to our government and private sector networks.
This amendment will maintain consistency among this bill and other cybersecurity policies. The terms ``deny, degrade, disrupt or destroy'' are found throughout our national cybersecurity strategy and our guidance documents. The term ``deny'' was inadvertently omitted from H.R. 3523. Inserting ``deny'' makes the bill consistent with other national documents in the discussion of cybersecurity.
The increase in cybersecurity incidents led to the development of centers like the Air Force's Cyberspace Technical Center of Excellence at Wright Patterson Air Force base in my district in Dayton, Ohio. To combat this growing trend in the sophistication of cyberattacks, the Center of Technical Excellence has been turned to that focus.
The need to protect U.S. networks from denial-of-service attacks was made clear when, for 3 weeks in 2007, Estonia was the target of a large-scale [Page: H2176] series of denial-of-service attacks against government Web sites, banks, universities, and Estonian newspapers.
I urge all of my colleagues to support this amendment and the underlying bill.
I yield 30 seconds to the chairman.