< Back to Current Version

Overview of U.S. Domestic Response to the 2019 Novel Coronavirus (2019-nCoV)

Changes from July 23, 2012 to February 10, 2016

This page shows textual changes in the document between the two versions indicated in the dates above. Textual matter removed in the later version is indicated with red strikethrough and textual matter added in the later version is indicated with blue.


. Cybersecurity: CRS Experts Eric A. Fischer Senior Specialist in Science and Technology July 23, 2012 Congressional Research Service 7-5700 www.crs.gov R42619 CRS Report for Congress Prepared for Members and Committees of Congress c11173008 . Cybersecurity: CRS Experts T he following table provides names and contact information for CRS experts on policy issues related to cybersecurity bills currently being debated in the 112th Congress. Concerns about information-system security, often referred to as cybersecurity, are longstanding

Cybersecurity: CRS Experts

February 10, 2016 (R42619)
The following table provides names and contact information for CRS experts on policy and legal issues before Congress related to cybersecurity
. The frequency, impact, and sophistication of cyberattacks and the growth of cybercrime and cyberespionage have added urgency to the concernslong-standing concerns about those issues. Consensus has been growinggrown that the policy framework for cybersecurity should take into account the diversity and continuing evolution of the technology and threats—from spam to botnets to hacktivism, cyberterrorism, and cyberwar— , and the increasing role of the Internet in the U.S. economy and the lives of citizens. Among the issues Congress will likely confront are cybersecurity for critical infrastructure, most of which is owned by the private sector; information sharing, both of unclassified and classified information, along with protection of privacy and civil liberties; prevention of and response to domestic and and global economies and the lives of citizens. Issues include
  • information sharing among private-sector entities and between them and the federal government;
  • data breaches of personal records and other information;
  • protection of privately held critical infrastructure;
  • addressing domestic and
    international cybercrime and espionage; and ; the relationship between cyberspace and national security.

    Legislative Issues

    Name/Title

    Phone

    Email

    Legislation in the 114th and recent Congresses

    [author name scrubbed]Senior Specialist in Science and Technology

    [phone number scrubbed]

    [email address scrubbed]

    Critical infrastructure protection

    Chris A. JaikaranAnalyst in Cybersecurity Policy

    [phone number scrubbed]

    [email address scrubbed]

    Chemical industry

    Dana SheaSpecialist in Science and Technology Policy

    [phone number scrubbed]

    [email address scrubbed]

    Defense industrial base

    [author name scrubbed]Specialist in National Security Policy and Information Operations

    [phone number scrubbed]

    [email address scrubbed]

    Electricity grid

    [author name scrubbed]Specialist in Energy Policy

    [phone number scrubbed]

    [email address scrubbed]

    Financial institutions

    [author name scrubbed]Specialist in Financial Economics

    [phone number scrubbed]

    [email address scrubbed]

    Industrial control systems

    [author name scrubbed]Specialist in Energy Policy

    [phone number scrubbed]

    [email address scrubbed]

    Cyberattack prevention and response

    Chris A. JaikaranAnalyst in Cybersecurity Policy

    [phone number scrubbed]

    [email address scrubbed]

    Cybercrime

         

    Federal laws

    [author name scrubbed]Senior Specialist in American Public Law

    [phone number scrubbed]

    [email address scrubbed]

    Law enforcement

    Kristin M. FinkleaSpecialist in Domestic Security

    [phone number scrubbed]

    [email address scrubbed]

    Cyberwarfare

    [author name scrubbed]Specialist in National Security Policy and Information Operations

    [phone number scrubbed]

    [email address scrubbed]

    Data breach notification

    [author name scrubbed]Legislative Attorney

    [phone number scrubbed]

    [email address scrubbed]

    Economic issues

    [author name scrubbed]Specialist in Financial Economics

    [phone number scrubbed]

    [email address scrubbed]

    Emerging issues

    [author name scrubbed]Senior Specialist in Science and Technology

    [phone number scrubbed]

    [email address scrubbed]

    Espionage

         

    Economic and industrial

    Kristin M. FinkleaSpecialist in Domestic Security

    [phone number scrubbed]

    [email address scrubbed]

    Legal issues

    [author name scrubbed]Legislative Attorney

    [phone number scrubbed]

    [email address scrubbed]

    State-sponsored

    [author name scrubbed]Specialist in National Security Policy and Information Operations

    [phone number scrubbed]

    [email address scrubbed]

    Federal agency roles

    [author name scrubbed]Senior Specialist in Science and Technology

    [phone number scrubbed]

    [email address scrubbed]

    Chief Information Officers (CIOs)

    Patricia Maloney FigliolaSpecialist in Internet and Telecommunications Policy

    [phone number scrubbed]

    [email address scrubbed]

    Commerce

    John F. Sargent, Jr.Specialist in Science and Technology Policy

    [phone number scrubbed]

    [email address scrubbed]

    Defense (DOD)

    [author name scrubbed]Specialist in National Security Policy and Information Operations

    [phone number scrubbed]

    [email address scrubbed]

    Executive Office of the President (EOP)

    [author name scrubbed]Section Research Manager

    [phone number scrubbed]

    [email address scrubbed]

    Homeland Security (DHS)

    Chris A. JaikaranAnalyst in Cybersecurity Policy

    [phone number scrubbed]

    [email address scrubbed]

    Intelligence Community (IC)

    John RollinsSpecialist in Terrorism and National Security

    [phone number scrubbed]

    [email address scrubbed]

    Justice (DOJ)

    Kristin M. FinkleaSpecialist in Domestic Security

    [phone number scrubbed]

    [email address scrubbed]

    National Security Agency (NSA)

    [author name scrubbed]Specialist in National Security Policy and Information Operations

    [phone number scrubbed]

    [email address scrubbed]

    Science agencies (NIST, NSF, OSTP)

    [author name scrubbed]Senior Specialist in Science and Technology

    [phone number scrubbed]

    [email address scrubbed]

    Treasury and financial agencies

    [author name scrubbed]Specialist in Financial Economics

    [phone number scrubbed]

    [email address scrubbed]

    Federal Information Security Management Act (FISMA)

    Chris A. JaikaranAnalyst in Cybersecurity Policy

    [phone number scrubbed]

    [email address scrubbed]

    Federal surveillance

    [author name scrubbed] Legislative Attorney

    [phone number scrubbed]

    [email address scrubbed]

    Hacktivism

    Kristin M. FinkleaSpecialist in Domestic Security

    [phone number scrubbed]

    [email address scrubbed]

    Information sharing

    [author name scrubbed]Senior Specialist in Science and Technology

    [phone number scrubbed]

    [email address scrubbed]

    Antitrust laws

    [author name scrubbed] Legislative Attorney

    [phone number scrubbed]

    [email address scrubbed]

    Classified information

    John RollinsSpecialist in Terrorism and National Security

    [phone number scrubbed]

    [email address scrubbed]

    Freedom of Information Act (FOIA)

    [author name scrubbed]Legislative Attorney

    [phone number scrubbed]

    [email address scrubbed]

    Legal aspects

    [author name scrubbed] Legislative Attorney

    [phone number scrubbed]

    [email address scrubbed]

    Privacy and civil liberties

    [author name scrubbed]Legislative Attorney

    [phone number scrubbed]

    [email address scrubbed]

    Information warfare

    [author name scrubbed]Specialist in National Security Policy and Information Operations

    [phone number scrubbed]

    [email address scrubbed]

    International cooperation

         

    Defense and diplomatic

    [author name scrubbed]Specialist in National Security Policy and Information Operations

    [phone number scrubbed]

    [email address scrubbed]

    Law enforcement

    Kristin M. FinkleaSpecialist in Domestic Security

    [phone number scrubbed]

    [email address scrubbed]

    International trade

    [author name scrubbed]Specialist in International Trade and Finance

    [phone number scrubbed]

    [email address scrubbed]

    National strategy and policy

    [author name scrubbed]Senior Specialist in Science and Technology

    [phone number scrubbed]

    [email address scrubbed]

    National security

    [author name scrubbed]Specialist in National Security Policy and Information Operations

    [phone number scrubbed]

    [email address scrubbed]

    Technological issues

    Patricia Maloney FigliolaSpecialist in Internet and Telecommunications Policy

    [phone number scrubbed]

    [email address scrubbed]

    Emerging technologies

    [author name scrubbed]Senior Specialist in Science and Technology

    [phone number scrubbed]

    [email address scrubbed]

    Research and development (R&D)

    Patricia Maloney FigliolaSpecialist in Internet and Telecommunications Policy

    [phone number scrubbed]

    [email address scrubbed]

    Terrorism

    John RollinsSpecialist in Terrorism and National Security

    [phone number scrubbed]

    [email address scrubbed]

    Workforce

    [author name scrubbed]Analyst in American National Government

    [phone number scrubbed]

    [email address scrubbed]

    Author Contact Information

    [author name scrubbed], Senior Specialist in Science and Technology ([email address scrubbed], [phone number scrubbed])
    [author name scrubbed], Analyst in Cybersecurity Policy ([email address scrubbed], [phone number scrubbed])
    cyberspace and national security; and how federal funding should be invested to protect information systems. Legislative Issues Name/Title Phone E-mail Legislation in the 112th Congress Eric A. Fischer Senior Specialist in Science and Technology 7-7071 efischer@crs.loc.gov Critical infrastructure protection John D. Moteff Specialist in Science and Technology Policy 7-1435 jmoteff@crs.loc.gov Chemical industry Dana Shea Specialist in Science and Technology Policy 7-6844 dshea@crs.loc.gov Defense industrial base Catherine A. Theohary Analyst in National Security Policy and Information Operations 7-0844 ctheohary@crs.loc.gov Electricity grid Richard J. Campbell Specialist in Energy Policy 7-7905 rcampbell@crs.loc.gov Financial institutions N. Eric Weiss Specialist in Financial Economics 7-6209 eweiss@crs.loc.gov Industrial control systems Dana Shea Specialist in Science and Technology Policy 7-6844 dshea@crs.loc.gov Federal laws Charles Doyle Senior Specialist in American Public Law 7-6968 cdoyle@crs.loc.gov Law enforcement Kristin M. Finklea Specialist in Domestic Security 7-6259 kfinklea@crs.loc.gov Cybersecurity workforce Wendy Ginsberg Analyst in American National Government 7-3933 wginsberg@crs.loc.gov, Cyberterrorism Catherine A. Theohary Analyst in National Security Policy and Information Operations 7-0844 ctheohary@crs.loc.gov Cyberwar Catherine A. Theohary Analyst in National Security Policy and Information Operations 7-0844 ctheohary@crs.loc.gov Data breach notification Gina Stevens Legislative Attorney 7-2581 gstevens@crs.loc.gov Cybercrime Congressional Research Service 1 . Cybersecurity: CRS Experts Legislative Issues Name/Title Phone E-mail Economic issues N. Eric Weiss Specialist in Financial Economics 7-6209 eweiss@crs.loc.gov Advanced persistent threat Catherine A. Theohary Analyst in National Security Policy and Information Operations 7-0844 ctheohary@crs.loc.gov Economic and industrial Kristin M. Finklea Specialist in Domestic Security 7-6259 kfinklea@crs.loc.gov Legal issues Brian T. Yeh Legislative Attorney 7-5182 byeh@crs.loc.gov State-sponsored Catherine A. Theohary Analyst in National Security Policy and Information Operations 7-0844 ctheohary@crs.loc.gov Eric A. Fischer Senior Specialist in Science and Technology 7-7071 efischer@crs.loc.gov Chief Information Officers (CIOs) Patricia Maloney Figliola Specialist in Internet and Telecommunications Policy 7-2508 pfigliola@crs.loc.gov Commerce John F. Sargent, Jr. Specialist in Science and Technology Policy 7-9147 jsargent@crs.loc.gov Defense (DOD) Catherine A. Theohary Analyst in National Security Policy and Information Operations 7-0844 ctheohary@crs.loc.gov Executive Office of the President (EOP) John D. Moteff Specialist in Science and Technology Policy 7-1435 jmoteff@crs.loc.gov Homeland Security (DHS) John D. Moteff Specialist in Science and Technology Policy 7-1435 jmoteff@crs.loc.gov Intelligence Community (IC) John Rollins Specialist in Terrorism and National Security 7-5529 jrollins@crs.loc.gov Justice (DOJ) Kristin M. Finklea Specialist in Domestic Security 7-6259 kfinklea@crs.loc.gov National Security Agency (NSA) Catherine A. Theohary Analyst in National Security Policy and Information Operations 7-0844 ctheohary@crs.loc.gov Science agencies (NIST, NSF, OSTP) Eric A. Fischer Senior Specialist in Science and Technology 7-7071 efischer@crs.loc.gov Treasury and financial agencies Rena S. Miller Analyst in Financial Economics 7-0826 rsmiller@crs.loc.gov Federal Information Security Management Act (FISMA) John D. Moteff Specialist in Science and Technology Policy 7-1435 jmoteff@crs.loc.gov Federal Internet monitoring Richard M. Thompson II Legislative Attorney 7-8449 rthompson@crs.loc.gov Hacktivism Kristin M. Finklea Specialist in Domestic Security 7-6259 kfinklea@crs.loc.gov Information sharing Eric A. Fischer Senior Specialist in Science and Technology 7-7071 efischer@crs.loc.gov Espionage Federal agency roles Congressional Research Service 2 . Cybersecurity: CRS Experts Legislative Issues Name/Title Phone E-mail Antitrust laws Kathleen Ann Ruane Legislative Attorney 7-9135 kruane@crs.loc.gov Civil liability Edward C. Liu Legislative Attorney 7-9166 eliu@crs.loc.gov Classified information John Rollins Specialist in Terrorism and National Security 7-5529 jrollins@crs.loc.gov Freedom of Information Act (FOIA) Gina Stevens Legislative Attorney 7-2581 gstevens@crs.loc.gov Privacy and civil liberties Gina Stevens Legislative Attorney 7-2581 gstevens@crs.loc.gov Defense and diplomatic Catherine A. Theohary Analyst in National Security Policy and Information Operations 7-0844 ctheohary@crs.loc.gov Law enforcement Kristin M. Finklea Specialist in Domestic Security 7-6259 kfinklea@crs.loc.gov Eric A. Fischer Senior Specialist in Science and Technology 7-7071 efischer@crs.loc.gov John Rollins Specialist in Terrorism and National Security 7-5529 jrollins@crs.loc.gov Public/private partnerships Eric A. Fischer Senior Specialist in Science and Technology 7-7071 efischer@crs.loc.gov Supply chain Eric A. Fischer Senior Specialist in Science and Technology 7-7071 efischer@crs.loc.gov Technological issues Eric A. Fischer Senior Specialist in Science and Technology 7-7071 efischer@crs.loc.gov Botnets Eric A. Fischer Senior Specialist in Science and Technology 7-7071 efischer@crs.loc.gov Cloud computing Patricia Maloney Figliola Specialist in Internet and Telecommunications Policy 7-2508 pfigliola@crs.loc.gov Mobile devices Patricia Maloney Figliola Specialist in Internet and Telecommunications Policy 7-2508 pfigliola@crs.loc.gov Research and development (R&D) Patricia Maloney Figliola Specialist in Internet and Telecommunications Policy 7-2508 pfigliola@crs.loc.gov International cooperation National strategy and policy National security Congressional Research Service 3 . Cybersecurity: CRS Experts Author Contact Information Eric A. Fischer Senior Specialist in Science and Technology efischer@crs.loc.gov, 7-7071 Congressional Research Service 4