国会记录:2002年1月28日(参议院)Page S176-S183关于引入Edwards先生的账单和联合决议的陈述:1900年。一项保护以网络万有主义和网络犯罪的法案,以及其他目的;商务,科学和交通委员会。______由Edwards先生:S. 1901年。一项授权国家科学基金会和国家安全局的条例草案,建立计划,以增加在网络安全领域开展研究的合格教师教学的人数,以及其他目的。向卫生,教育,劳动力和养老金委员会。爱德华兹先生。主席先生,自9月11日的恐怖活动以来,我国的首要任务是确保家庭免受恐怖主义的祸害。首先,在我们的心中,当然,战斗的前线的男人和女人:士兵们为自由的自由而战;纽约的消防员和警察;邮政工具在华盛顿。Those of us elected to serve in Washington have a special responsibility to protect our security. To discharge that duty, I have been working with my colleagues here in the Senate. We have made a great deal of progress, but there's a lot more work to do. After a long debate, Congress passed and the President signed important legislation, based partly on a bill I introduced, to tighten security in our airports. But we have to do more. There are several bills that I have helped author that are working their way through Congress. Two of these bills, to tighten security at seaports and to protect against bioterrorism, have already passed the Senate and are awaiting action in the House. Another bill, to tighten our border security, should reach the Senate floor soon. All three should be enacted quickly. You can be sure our enemies are not waiting for us to act. One of the greatest challenges in the struggle for security is to prepare for the next attack, not just the last one. We have seen how vicious thugs can destroy innocent life with airplanes, how they can terrorize ordinary people with biological weapons. We are responding to those threats. But what about threats whose awful consequences we haven't yet felt? Today I want to talk about one of those threats: the threat of "cyberterrorism", an attack against the computer networks upon which our safety and economy now depend. Computers have become a foundation of our electricity, oil, gas, water, telephones, emergency services, and banks, not to mention our national defense apparatus. Computer networks have brought extraordinary improvements in the way we live and work. We communicate more often, more quickly, more cheaply. With the push of a button in a classroom or a bedroom, our children can get more information than most libraries have ever held. Yet there is a dark side to the internet, a new set of dangers. Today, if you ask an expert quietly, he or she will tell you that cyberspace is a very vulnerable place. Terrorists could cause terrible harm. They might be able to stop all traffic on the internet. Shut down power for entire cities for extended periods. Disrupt our phones. Poison our water. Paralyze our emergency services--police, firefighters, ambulances. The list goes on. We now live in a world where a terrorist can do as much damage with a keyboard and a modem as with a gun or a bomb. Already, one hacker has broken into a computer-controlled waste management system and caused millions of gallons of raw sewage to spill into parks, rivers, and private property. You probably haven't heard about this attack because it occurred in Australia. But imagine if terrorists launched calculated, coordinated attacks on America. Our enemies are already targeting our networks. After September 11, a Pakistani group hacked into two government web services, including one at the Department of Defense, and declared a "cyber jihad" against the United States. Another series of attacks, known as "Moonlight Maze," assaulted the Pentagon, Department of Energy, and NASA, and obtained vast quantities of technical defense research. To date, we can be thankful that these attacks have not been terribly sophisticated. But that could change soon. As the Defense Science Board recently stated, the U.S. will eventually be attached "by a sophisticated adversary using an effective array of information warfare tools and [[Page S177]] techniques. Two choices are available: adapt before the attack or afterward." In addition, cybercrime is already a billion-dollar drain on our economy, a drain growing larger each year. In 1955, one survey reported that losses from FBI-reported computer crime had already reached $2 billion. Last year, the "ILOVEYOU" virus alone caused $8.7 billion in damage worldwide, much of it here. Cyberattacks have shut down major web sites like Yahoo! and eBay, not to mention the FBI. According to a recent survey, 85 percent of large corporations and government agencies detected computer security breaches over the prior 12 months. Two thirds suffered financial losses as a result. So the danger is clear, and the only question is how we address it. I think we need to address it in many ways. Today I want to focus on just two that are especially critical. The first is to encourage computer users to take proven measures to protect themselves. In the industry, these proven measures are known as "best practices"--steps like using customized passwords, not the ones that come with software, or promptly installing known "patches" to keep intruders out. The National Academy of Sciences recently reported that cybersecurity today is far worse than what known best practices can provide. As a result, viruses have shut down tens of thousands of machines even after patches to block them were widely available. Because the password protections on some systems are so weak, intruders have taken the "routers" that control Internet traffic hostage. And the government is as guilty as anyone. According to the report card issued by a member of the House of Representatives, most government agencies rate between a "D" and an "F" on cybersecurity. Improving our security by implementing existing best practices is our first big task. Our second challenge is to train more researchers, teachers, and workers to fight cyberthreats. Today the private sector engages in some short-term R&D on cybersecurity. But broader research and knowledge needs aren't being met. In addition, our workforce in cybersecurity is woefully inadequate, especially in academia. Each year, American universities award Ph.D.'s in computer science to about one thousand people each year. But less than one-half of one-percent specialize in cybersecurity, and fewer still go on to train others in the discipline. As Dr. Bill Chu, Chairman of the Software and Information Systems Department at the University of North Carolina at Charlotte and one of the country's leading experts on cybersecurity puts it: "The weakest link . . . is the lack of qualified information security professionals. The majority of information technology professionals in this country have not been trained in the basics of information security. Information technology faculty in most universities do not have sufficient background to properly train students." As a whole, the challenge of cybersecurity is not unlike the challenge of a terrible disease like cancer. First, we have to encourage everyone to do what they can to reduce the risk of disease-- don't smoke, eat right, exercise. That is what cybersecurity "best practices" like changing passwords are all about. Second, we have to make sure we have got top-notch scientists working to find new medicines to prevent and fight the disease. And that is why we need more cyber teachers and researchers. To tackle these two challenges, I'm proud today to introduce two new bills that will support an intensive, $400 million cybersecurity effort over the next five years. The first bill is called the Cyberterrorism Preparedness Act of 2002. That bill's first step is to establish a new, nonprofit, nongovernment, consortium of academic and private sector experts to lay out a clear set of "best practices" that protect against cyberattack. The White House Office of Science and Technology Policy, the Institute for Defense Analyses, and the President's Committee of Advisors on Science and Technology have all recommended a new, nonprofit cybersecurity consortium. Such a consortium can work closely with the private sector, unfettered by bureaucracy, in a way that all the country can see and learn from. The goals of the consortium are simple: first, the establishment of "best practices" that are tailored to different computer systems and needs; second, the widest possible dissemination of those practices; and third, long-term, multi-disciplinary research on cybersecurity- research that isn't occurring now. The second part of the Cyberterrorism Preparedness Act will implement "best practices" for government systems. The government has a duty to lead by example, something we aren't doing right now. And so, within 6 months after this Act passed, the National Institute of Standards and Technology would immediately begin the process of implementing best practices for government agencies, beginning with small-scale tests and concluding with government-wide adoption of the recommended best practices. The last part of my bill will assess the issue of best practices for the private sector. While the bill doesn't impose new mandates beyond the government, it does require careful consideration of how to encourage the widest possible use of known best practices. There's a particular focus on entities that do business with the Federal Government as grantees or contractors. Government agencies should not be exposed to security vulnerabilities in the products supplied by these companies. And Federal dollars should not be flowing to firms that expose America to cyberterrorism. So the new consortium would be required to study whether and how government could condition grants and contracts on the adoption of cybersecurity best practices. The President is authorized to implement recommendations from that study. The Cyberterrorism Preparedness Act will address the first goal of cybersecurity--making sure we're taking the steps we already know to improve our security. The second bill I am introducing today--the Cybersecurity Research and Education Act--focuses on our second task: "training the trainers" and increasing the number of researchers, teachers, and workers committed to cybersecurity. First, the bill establishes a Cybersecurity Graduate Fellowship Program at the National Science Foundation. Individuals selected to participate in the program will receive a loan that covers the full tuition and fees as well as a living stipend for 4 years of doctoral study. Upon graduation, these loans will be forgiven at 20 percent per year for each year that the individual teaches at a college or university. After only 5 years of teaching, the entire loan will be paid off. That way, we can ensure that the money we invest in these promising young scientists will be used to train others interested in cybersecurity. Second, my bill also establishes a competitive sabbatical for Distinguished Faculty in Cybersecurity. Under the program, a qualified faculty member will receive a stipend to spend a year working and researching at the Department of Defense, a university specializing in cybersecurity, or some other appropriate facility. Universities sending faculty on sabbatical will receive funding to hire a temporary replacement instructor. In addition, when the faculty member returns, the university will get a generous grant to enhance its cybersecurity infrastructure needs. For example, the university could purchase advanced computing equipment and hire graduate research assistants. Participants in this program will have a unique opportunity to engage in cutting-edge research with some of the best minds in the country. When they return to their schools, these faculty will be even better equipped to advance the state of cybersecurity education. Third, this bill will create a Cybersecurity Awareness, Training, and Education Program at the National Security Agency. NSA has a strong history of supporting cybersecurity education, as exemplified through initiatives such as the Centers of Excellence program and the National Colloquium for Information Systems Security Education. The program I propose would build on NSA's expertise and would enable the agency to make grants to universities specializing in cybersecurity. The grants could be used for projects like teaching basic computer security to K- 12 teachers, or for the development of a "virtual university." Students who don't [[Page S178]] have access to nearby course offerings would then be able to take cybersecurity classes online. All of these programs are critical in our fight against cyberterrorism. A strong and vibrant academic community is essential for building the trained workforce of tomorrow. We must be committed to funding long-term research. And we must vigilantly maintain basic cybersecurity protections in government, while promoting them in the private sector. When it comes to the threat of a sophisticated, coordinated cyberterrorist attack, the question most likely is not whether such an attack will come. The question is when. And so we must be prepared to fight against a "cyberjihad," and we must be prepared to win. I ask unanimous consent that the text of my two bills be printed in the Record. There being no objection, the bills were ordered to be printed in the Record, as follows: S. 1900 Be it enacted by the Senate and House of Representatives of the United States of America in Congress assembled, SECTION 1. SHORT TITLE. This Act may be cited as the "Cyberterrorism Preparedness Act of 2002". SEC. 2. GRANT FOR PROGRAM FOR PROTECTION OF INFORMATION INFRASTRUCTURE AGAINST DISRUPTION. (a) In General.--The National Institute of Standards and Technology shall, using amounts authorized to be appropriated by section 5, award a grant to a qualifying nongovernmental entity for purposes of a program to support the development of appropriate cybersecurity best practices, support long- term cybersecurity research and development, and perform functions relating to such activities. The purpose of the program shall be to provide protection for the information infrastructure of the United States against terrorist or other disruption or attack or other unwarranted intrusion. (b) Qualifying Nongovernmental Entity.--For purposes of this section, a qualifying nongovernmental entity is any entity that-- (1) is a nonprofit, nongovernmental consortium composed of at least three academic centers of expertise in cybersecurity and at least three private sector centers of expertise in cybersecurity; (2) has a board of directors of at least 12 members who include senior administrators of academic centers of expertise in cybersecurity and senior managers of private sector centers of expertise in cybersecurity and of whom not more than one third are affiliated with the centers comprising the consortium; (3) is operated by individuals from academia, the private sector, or both who have-- (A) a demonstrated expertise in cybersecurity; and (B) the capacity to carry out the program required under subsection (g); (4) has in place a set of rules to ensure that conflicts of interest involving officers, employees, and members of the board of directors of the entity do not undermine the activities of the entity; (5) has developed a detailed plan for the program required under subsection (g); and (6) meets any other requirements established by the National Institute of Standards and Technology for purposes of this Act. (c) Application.--Any entity seeking a grant under this section shall submit to the National Institute of Standards and Technology an application therefor, in such form and containing such information as the National Institute for Standards and Technology shall require. (d) Selection of Grantee.--The entity awarded a grant under this section shall be selected after full and open competition among qualifying nongovernmental entities. (e) Dispersal of Grant Amount.--Amounts available for the grant under this section pursuant to the authorization of appropriations in section 5 shall be dispersed on a fiscal year basis over the five fiscal years beginning with fiscal year 2003. (f) Consultation.--In carrying out activities under this section, including selecting an entity for the award of a grant, dispersing grant amounts, and overseeing activities of the entity receiving the grant, the National Institute of Standards and Technology-- (1) shall consult with an existing interagency entity, or new interagency entity, consisting of the elements of the Federal Government having a substantial interest and expertise in cybersecurity and designated by the President for purposes of this Act; and (2) may consult separately with any such element of the Federal Government. (g) Program Using Grant Amount.-- (1) In general.--The entity awarded a grant under this section shall carry out a national program for the purpose of protecting the information infrastructure of the United States against disruption. The program shall consist of-- (A) multi-disciplinary research and development to identify appropriate cybersecurity best practices, to measure the effectiveness of cybersecurity best practices that are put into use, and to identify sound means to achieve widespread use of appropriate cybersecurity best practices that have proven effective; (B) multi-disciplinary, long-term, or high-risk research and development (including associated human resource development) to improve cybersecurity; and (C) the activities required under paragraphs (3) and (4). (2) Conduct of research and development.-- (A) In general.--Except as provided in subparagraph (B), research and development under subparagraphs (A) and (B) of paragraph (1) shall be carried out using funds and other support provided by the grantee to entities selected by the grantee after full and open competition among entities determined by the grantee to be qualified to carry out such research and development. (B) Conduct by grantee.--The grantee may carry out research and development referred to in subparagraph (A) in any fiscal year using not more than 15 percent of the amount dispersed to the grantee under this Act in such fiscal year by the National Institute of Standards and Technology. (3) Recommendations on cybersecurity best practices.-- (A) Recommendations.--Not later than 18 months after the selection of the grantee under this section, the grantee shall prepare a report containing recommendations for appropriate cybersecurity best practices. (B) Updates.--The grantee shall update the recommendations made under subparagraph (A) not less often than once every six months, and may update any portion of such recommendations more frequently if the grantee determines that circumstances so require. (C) Considerations.--In making recommendations under subparagraph (A), and any update of such recommendations under subparagraph (B), the grantee shall-- (i) review the most current cybersecurity best practices identified by the National Institute of Standards and Technology under section 3(a); and (ii) consult with-- (I) the entities carrying out research and development under paragraph (1)(A); (II) entities employing cybersecurity best practices; and (III) a wide range of academic, private sector, and public entities. (D) Dissemination.--The grantee shall submit the report under subparagraph (A), and any update of the report under paragraph (B), to the bodies and officials specified in paragraph (5), and shall widely disseminate the report, and any such update, among government (including State and local government), private, and academic entities. (4) Activities relating to widespread use of cybersecurity best practices.-- (A) In general.--Not later than two years after the selection of the grantee under this section, the grantee shall submit to the bodies and officials specified in paragraph (5) a report containing-- (i) an assessment of the advisability of requiring the contractors and grantees of the Federal Government to use appropriate cybersecurity best practices; and (ii) recommendations for sound means to achieve widespread use of appropriate cybersecurity best practices that have proven effective. (B) Report elements.--The report under subparagraph (A) shall set forth-- (i) whether or not the requirement described in subparagraph (A)(i) is advisable, including whether the requirement would impose undue or inappropriate burdens, or other inefficiencies, on contractors and grantees of the Federal Government; (ii) if the requirement is determined advisable-- (I) whether, and to what extent, the requirement should be subject to exceptions or limitations for particular contractors or grantees, including the types of contractors or grantees and the nature of the exceptions or limitations; and (II) which cybersecurity best practices should be covered by the requirement and with what, if any, exceptions or limitations; and (iii) any other matters that the grantee considers appropriate. (5) Specified bodies and officials.--The bodies and officials specified in this paragraph are as follows: (A) The appropriate committees of Congress. (B) The President. (C) The Director of the Office of Management and Budget. (D) The National Institute of Standards and Technology. (E) The interagency entity designated by the President under subsection (f)(1). (h) Grant Administration.-- (1) Use of grant competition and management systems.--The National Institute of Standards and Technology may permit the entity awarded the grant under this section to utilize the grants competition system and grants management system of the National Institute of Standards and Technology for purposes of the efficient administration of activities by the entity under subsection (g). (2) Rules.--The National Institute of Standards and Technology shall establish any rules and procedures that the National Institute of Standards and Technology considers appropriate to further the purposes of this section. Such rules may include provisions relating to the ownership of any intellectual property created by the entity [[Page S179]] awarded the grant under this section or funded by the entity under subsection (g). (i) Supplement Not Supplant.--The National Institute of Standards and Technology shall take appropriate actions to ensure that activities under this section supplement, rather than supplant, other current governmental and nongovernmental efforts to protect the information infrastructure of the United States. SEC. 3. APPROPRIATE CYBERSECURITY BEST PRACTICES FOR THE FEDERAL GOVERNMENT. (a) NIST Recommendations.-- (1) In general.--Not later than 180 days after the date of the enactment of this Act, the National Institute of Standards and Technology shall submit to the bodies and officials specified in subsection (e) a report that-- (A) identifies appropriate cybersecurity best practices that could reasonably be adopted by the departments and agencies of the Federal Government over the 24-month period beginning on the date of the report; and (B) sets forth proposed demonstration projects for the adoption of such best practices by various departments and agencies of the Federal Government beginning 90 days after the date of the report. (2) Updates.--The National Institute of Standards and Technology may submit to the bodies and officials specified in subsection (e) any updates of the report under paragraph (1) that the National Institute of Standards and Technology consider appropriate due to changes in circumstances. (3) Consultation.--In preparing the report under paragraph (1), and any updates of the report under paragraph (2), the National Institute of Standards and Technology shall consult with departments and agencies of the Federal Government having an interest in the report and such updates, and with academic centers of expertise in cybersecurity and private sector centers of expertise in cybersecurity. (b) Demonstration Projects for Implementation of Recommendations.-- (1) In general.--Commencing not later than 90 days after receipt of the report under subsection (a), the President shall carry out the demonstration projects set forth in the report, including any modification of any such demonstration project that the President considers appropriate. (2) Updates.--If the National Institute of Standards and Technology updates under subsection (a)(2) any recommendation under subsection (a)(1)(A) that is relevant to a demonstration project under paragraph (1), the President shall modify the demonstration project to take into account such update. (3) Report.--Not later than nine months after commencement of the demonstration projects under this subsection, the President shall submit to the appropriate committees of Congress a report on the demonstration projects. The report shall set forth the following: (A) An assessment of the extent to which the adoption of appropriate cybersecurity best practices by departments and agencies of the Federal Government under the demonstration projects has improved cybersecurity at such departments and agencies. (B) An assessment whether or not the adoption of appropriate cybersecurity best practices by departments and agencies of the Federal Government under the demonstration projects has affected the capability of such departments and agencies to carry out their missions. (C) A description of the cost of the adoption of appropriate cybersecurity best practices by departments and agencies of the Federal Government under the demonstration projects. (D) A description of a security-enhancing missions- comparable, cost-effective program, to the extent such program is feasible, for the adoption of appropriate cybersecurity best practices government-wide. (E) Any other matters that the President considers appropriate. (c) Adoption of Cybersecurity Best Practices Government- Wide.--The President shall implement a program for the adoption of appropriate cybersecurity best practices government-wide commencing not later than six months after the date of the report. (d) Incorporation of Recommendations.--If during the development or implementation of the program under subsection (c) the President receives any recommendations under paragraph (3) or (4) of section 3(g), the President shall modify the program in order to take into account such recommendations. (e) Specified Bodies and Officials.--The bodies and officials specified in this subsection are as follows: (1) The appropriate committees of Congress. (2) The President. (3) The Director of the Office of Management and Budget. (4) The interagency entity designated by the President under section 3(f)(1). SEC. 4. DEFINITIONS. In this Act: (1) Appropriate committees of congress.--The term "appropriate committees of Congress" means-- (A) the Committee on Commerce, Science, and Transportation of the Senate; and (B) the Committee on Science of the House of Representatives. (2) Cybersecurity.--The term "cybersecurity" means information assurance, including information security, information technology disaster recovery, and information privacy. (3) Cybersecurity best practice.--The term "cybersecurity best practice" means a computer hardware or software configuration, information system design, operational procedure, or measure, structure, or method that most effectively protects computer hardware, software, networks, or network elements against an attack that would cause harm through the installation of unauthorized computer software, saturation of network traffic, alteration of data, disclosure of confidential information, or other means. (4) Appropriate cybersecurity best practice.--The term "appropriate cybersecurity best practice" means a cybersecurity best practice that-- (A) permits, as needed, customization or expansion for the computer hardware, software, network, or network element to which the best practice applies; (B) takes into account the need for security protection that balances-- (i) the risk and magnitude of harm threatened by potential attack; and (ii) the cost of imposing security protection; and (C) takes into account the rapidly changing nature of computer technology. SEC. 5. AUTHORIZATION OF APPROPRIATIONS. There is hereby authorized to be appropriated for the National Institute of Standards and Technology for purposes of activities under this Act, amounts as follows: (1) For fiscal year 2003, $70,000,000. (2) For each of the fiscal years 2004 through 2007, such sums as may be necessary. ____ S. 1901 Be it enacted by the Senate and House of Representatives of the United States of America in Congress assembled, SECTION 1. SHORT TITLE. This Act may be cited as the "Cybersecurity Research and Education Act of 2002". SEC. 2. FINDINGS. Congress finds that-- (1) critical elements of the Nation's basic economic and physical infrastructure rely on information technology for effective functioning; (2) increased reliance on technology has left our Nation vulnerable to the threat of cyberterrorism; (3) long-term research on practices, methods, and technologies that will help ensure the safety of our information infrastructure remains woefully inadequate; (4) there is a critical shortage of faculty at institutions of higher education who specialize in disciplines related to cybersecurity; (5) a vigorous scholarly community in fields related to cybersecurity is necessary to help conduct research and disseminate knowledge about the practical application of the community's findings; and (6) universities in the United States award the Ph.D. degree in computer sciences to approximately 1,000 individuals each year, but of those awarded this degree, less than 0.3 percent specialize in cybersecurity and still fewer become employed in faculty positions at institutions of higher education. SEC. 3. DEFINITIONS. In this Act: (1) Cybersecurity.--The term "cybersecurity" means information assurance, including scientific, technical, management, or any other relevant disciplines required to ensure computer and network security, including, but not limited to, a discipline related to the following functions: (A) Secure System and network administration and operations. (B) Systems security engineering. (C) Information assurance systems and product acquisition. (D) Cryptography. (E) Threat and vulnerability assessment, including risk management. (F) Web security. (G) Operations of computer emergency response teams. (H) Cybersecurity training, education, and management. (I) Computer forensics. (J) Defensive information operations. (2) Cybersecurity infrastructure.--The term "cybersecurity infrastructure" includes-- (A) equipment that is integral to research and education capabilities in cybersecurity, including, but not limited to-- (i) encryption devices; (ii) network switches; (iii) routers; (iv) firewalls; (v) wireless networking gear; (vi) protocol analyzers; (vii) file servers; (viii) workstations; (ix) biometric tools; and (x) computers; and (B) technology support staff (including graduate students) that is integral to research and education capabilities in cybersecurity. (3) Director.--The term "Director" means the Director of the National Science Foundation. (4) Institution of higher education.--The term "institution of higher education" has the meaning given the term in section 101(a) [[Page S180]] of the Higher Education Act of 1965 (20 U.S.C. 1001(a)). (5) Other relevant discipline.--The term "other relevant discipline" includes, but is not limited to, the following fields as the fields specifically relate to securing information infrastructures: (A) Biometrics. (B) Software engineering. (C) Computer science and engineering. (D) Law. (E) Business management or administration. (F) Psychology. (G) Mathematics. (H) Sociology. (6) Qualified institution.--The term "qualified institution" means an institution of higher education that, at the time of submission of an application pursuant to any of the programs authorized by this Act-- (A) has offered, for not less than 3 years prior to the date the application is submitted under this Act, a minimum of 2 graduate courses in cybersecurity (not including short- term special seminars or 1-time classes offered by visitors); (B) has not less than 3 faculty members who teach cybersecurity courses-- (i) each of whom has published not less than 1 refereed cybersecurity research article in a journal or through a conference during the 2-year period preceding the date of enactment of this Act; (ii) at least 1 of whom is tenured; and (iii) each of whom has demonstrated active engagement in the cybersecurity scholarly community during the 2-year period preceding the date of enactment of this Act, such as serving as an editor of a cybersecurity journal or participating on a program committee for a cybersecurity conference or workshop; (C) has graduated not less than 1 Ph.D. scholar in cybersecurity during the 2-year period preceding the date of enactment of this Act; and (D) has not less than 3 graduate students enrolled who are pursuing a Ph.D. in cybersecurity. SEC. 4. CYBERSECURITY GRADUATE FELLOWSHIP PROGRAM. (a) Purpose.--The purpose of this section is-- (1) to encourage individuals to pursue academic careers in cybersecurity upon the completion of doctoral degrees; and (2) to stimulate advanced study and research, at the doctoral level, in complex, relevant, and important issues in cybersecurity. (b) Establishment.--The Director is authorized to establish a Cybersecurity Fellowship Program (referred to in this section as the "fellowship program") to annually award 3 to 5-year graduate fellowships to individuals for studies and research at the doctoral level in cybersecurity. (c) Cybersecurity Fellowship Program Advisory Board.-- (1) Establishment.--There is established a Cybersecurity Fellowship Program Advisory Board (referred to in this section as the "Board"). (2) Membership.--The Director shall appoint members of the Board who shall include-- (A) not fewer than 3 full-time faculty members-- (i) each of whom teaches at an institution of higher education; and (ii) each of whom has a specialty in cybersecurity; and (B) not fewer than 2 research scientists employed by a Federal agency with duties that include cybersecurity activities. (3) Terms.--Members of the Board shall be appointed for renewable 2-year terms. (d) Application.--Each individual desiring to receive a graduate fellowship under this section shall submit an application to the Director at such time, in such manner, and containing such information as the Director, in consultation with the Board, shall require. (e) Award.--The Director is authorized to award graduate fellowships under the fellowship program that shall-- (1) be made available to individuals, through a competitive selection process, for study at a qualified institution and in accordance with the procedures established in subsection (h); (2) be in an amount that is sufficient to cover annual tuition and fees for doctoral study at a qualified institution for the duration of the graduate fellowship, and shall include, in addition, an annual living stipend of $20,000; and (3) be for a duration of 3 to 5-years, the specific duration of each graduate fellowship to be determined by the Director in consultation with the Board on a case-by-case basis. (f) Repayment.--Each graduate fellowship shall-- (1) subject to paragraph (f)(2), be subject to full repayment upon completion of the doctoral degree according to a repayment schedule established and administered by the Director; (2) be forgiven at the rate of 20 percent of the total amount of graduate fellowship assistance received under this section for each academic year that a recipient is employed as a full-time faculty member at an institution of higher education for a period not to exceed 5 years; and (3) be monitored by the Director to ensure compliance with this section. (g) Eligibility.--To be eligible to receive a graduate fellowship under this section, an individual shall-- (1) be a citizen of the United States; (2) be matriculated or eligible to be matriculated for doctoral studies at a qualified institution; and (3) demonstrate a commitment to a career in higher education. (h) Selection.-- (1) In general.--The Director, in consultation with the Board, shall select recipients for graduate fellowships. (2) Duties.--The Director, in consultation with the Board, shall-- (A) establish criteria for a competitive selection process for recipients of graduate fellowships; (B) establish and promulgate an application process for the fellowship program; (C) receive applications for graduate fellowships; (D) annually review applications and select recipients of graduate fellowships; and (E) establish and administer a repayment schedule for recipients of graduate fellowships. (3) Consideration.--In making selections for graduate fellowships, the Director, to the extent possible and in consultation with the Board, shall consider applicants whose interests are of an interdisciplinary nature, encompassing the social scientific as well as technical dimensions of cybersecurity. (i) Authorization of Appropriations.--There are authorized to be appropriated to carry out this section $5,000,000 for each of fiscal years 2003 through 2005, and such sums as may be necessary for each succeeding fiscal year. SEC. 5. SABBATICAL FOR DISTINGUISHED FACULTY IN CYBERSECURITY. (a) Establishment.--The Director is authorized to award grants to institutions of higher education to enable faculty members who are teaching cybersecurity subjects to spend a sabbatical from teaching working at-- (1) the National Security Agency; (2) the Department of Defense; (3) the National Institute of Standards and Technology; (4) a research laboratory supported by the Department of Energy; or (5) a qualified institution. (b) Application.--Each institution of higher education desiring to receive a grant under this section shall submit an application to the Director at such time, in such manner, and containing such information as the Director shall require. (c) Grant Awards.-- (1) In general.--The Director shall award a grant under this section only if the National Science Foundation and the agency or institution where the faculty member will spend the sabbatical approve the sabbatical placement. (2) Number and duration.--For each fiscal year, the Director shall award grants for not more than 25 sabbatical positions that will each be for a 1-year period. (3) Amount of award.-- (A) In general.--Each institution of higher education that is awarded a grant under this section shall receive $250,000 for each faculty member who will spend a sabbatical pursuant to the grant. (B) Use of award.--The Director shall award a grant under this section in 2 disbursements in the following manner: (i) First disbursement.--The first disbursement shall be made upon selection of a grant recipient and shall consist of the following: (I) $20,000 to provide a stipend for living expenses to each faculty member awarded a sabbatical under this section. (II) An amount sufficient for the grant recipient to hire a qualified replacement for the faculty member awarded a sabbatical under this section for the term of the sabbatical, if such a replacement is possible. (ii) Second disbursement.--The second disbursement shall be made at the conclusion of the sabbatical, only if the faculty member completes the sabbatical in its entirety, and shall be used for the grant recipient's cybersecurity infrastructure needs, including-- (I) acquiring equipment or technology; (II) hiring graduate students; or (III) supporting any other activity that will enhance the grant recipient's course offerings and research in cybersecurity. (d) Eligibility.--To be eligible to receive a grant under this section, an institution of higher education shall submit an application under subsection (b) that-- (1) identifies the faculty member to whom the institution of higher education will provide a sabbatical and ensures that the faculty member is a citizen of the United States; (2) ensures that the faculty member to whom the institution of higher education will provide a sabbatical is tenured at that institution of higher education and meets general standards of excellence in research or teaching; and (3) explains how the faculty member to whom the institution of higher education will provide a sabbatical will-- (A) integrate into the faculty member's course offerings knowledge related to cybersecurity that is gained during the sabbatical; and (B) in conjunction with the institution of higher education, use the second disbursement of funds available under subsection (c)(3)(B)(ii). (e) Authorization of Appropriations.--There is authorized to be appropriated to carry out this section $8,000,000 for each of fiscal years 2003 through 2005. [[Page S181]] SEC. 6. ENHANCING CYBERSECURITY INFRASTRUCTURE. (a) Establishment.--The Director is authorized to award grants to qualified institutions to fund activities that provide, enhance, and facilitate acquisition of cybersecurity infrastructure at qualified institutions. (b) Use of Grant Award.--Each qualified institution that receives a grant under this section shall use the grant funds for needs specifically related to-- (1) cybersecurity education and research; and (2) development efforts related to cybersecurity. (c) Matching Funds.--Each qualified institution that receives a grant under this section shall contribute to the activities assisted under this section non-Federal matching funds equal to not less than 25 percent of the amount of the grant. (d) Authorization of Appropriations.--There is authorized to be appropriated to carry out this section $10,000,000 for each of fiscal years 2003 through 2005. SEC. 7. CYBERSECURITY AWARENESS, TRAINING, AND EDUCATION PROGRAM. (a) Purpose.--The purpose of this section is to increase the quality of education and training in cybersecurity, thereby increasing the number of qualified students entering the field of cybersecurity to adequately address the Nation's increasing dependence on information technology and to defend the Nation's increasingly vulnerable information infrastructure. (b) Establishment.--The Director of the National Security Agency is authorized to award grants, on a competitive basis, to qualified institutions to establish Cybersecurity Awareness, Training, and Education Programs (referred to in this section as "information programs"). (c) Application.-- (1) In general.--Each qualified institution desiring to receive a grant under this section shall submit an application to the Director of the National Security Agency at such time, in such manner, and accompanied by such information as the Director of the National Security Agency shall require. (2) Plans.--Each application submitted pursuant to paragraph (1) shall include a plan for establishing and maintaining an information program under this section, including a description of-- (A) the design, structure, and scope of the proposed information program, including unique qualities that may distinguish the proposed information program from possible approaches of other qualified institutions; (B) research being conducted in the disciplines encompassed by the plan; (C) any integration of the information program with other federally funded programs related to cybersecurity education, such as the National Science Foundation Scholarship for Service Program, the Department of Defense Multidisciplinary Research Program of the University Research Initiative, and the Department of Defense Information Assurance Scholarship Program; (D) necessary costs for information infrastructure to support the information program; (E) how the qualified institution will protect the integrity and security of the information infrastructure and any student testing mechanisms; and (F) other relevant information. (3) Collaboration.--A qualified institution desiring to receive a grant under this section may propose collaboration with other qualified institutions. (d) Grant Awards.--Each qualified institution that receives a grant under this section shall use the grant funds to-- (1) establish or enhance a Center for Studies in Cybersecurity Awareness, Training, and Education that shall-- (A) establish a professionally produced, web-based collection of cybersecurity programs of instruction that have been approved for general public dissemination by the authors and owners of the programs; (B) maintain a web-based directory of cybersecurity education and training related conferences and symposia; (C) sponsor the development of specific instructional materials in cybersecurity and other relevant disciplines, including-- (i) intrusion detection; (ii) overview of information assurance; (iii) ethical use of computing systems; (iv) network security; (v) cryptography; (vi) risk management; (vii) malicious logic; and (viii) system security engineering; (D) sponsor cybersecurity education symposia; (E) collaborate with the National Colloquium for Information Assurance Education; (F) create a `Virtual Academy' for sharing courseware and laboratory exercises in cybersecurity; and (G) review and participate in integrating various cybersecurity education and training standards into unified curricula; and (2) establish or enhance a Center for the Development of Faculty in Cybersecurity that shall-- (A) establish criteria for recognition and certification of cybersecurity trainers and educators; (B) establish faculty training outreach to teachers in kindergarten through grade 12 and to faculty of part B institutions (as defined in section 322 of the Higher Education Act of 1965 (20 U.S.C. 1061)); (C) build, test, and evaluate laboratory exercises that represent use of model practices in cybersecurity for use in training and education programs; and (D) establish an integrated program to include the programs described in this paragraph and paragraph (1). (e) Authorization of Appropriations.--There are authorized to be appropriated to carry out this section-- (1) $1,500,000 for fiscal year 2003; (2) $2,000,000 for fiscal year 2004; (3) $3,000,000 for fiscal year 2005; and (4) $4,500,000 for fiscal year 2006. SEC. 8. CYBERSECURITY WORKFORCE AND FACILITIES STUDY. (a) Study.--The Comptroller General shall conduct a study and collect data on the following: (1) The cybersecurity workforce, including-- (A) the size and nature of the cybersecurity workforce by occupation category (including academic faculty at institutions of higher education), level of education and training, personnel demographics, and industry characteristics; and (B) the role of foreign workers in the cybersecurity workforce. (2) Academic cybersecurity research facilities, including-- (A) total academic research space available or utilized for research relating to cybersecurity; (B) academic research space relating to cybersecurity that is in need of major repair or renovation; (C) new or ongoing projects at institutions of higher education expected to produce new or renovated research space to be used for research relating to cybersecurity; and (D) any research space needs related to cybersecurity and based on projections of growth in educational programs and research, including costs and initiatives required to meet such needs and possible consequences of failure to meet such needs. (3) Other information that the Comptroller General determines appropriate. (b) Report.--Not later than 6 months after the date of enactment of this Act, and biennially thereafter, the Comptroller General shall prepare and submit a report on the study conducted pursuant to subsection (a) to the-- (1) Committee on Health, Education, Labor and Pensions of the Senate; and (2) Committee on Education and the Workforce of the House of Representatives. ______