Cybersecurity: CRS Experts

Concerns about information-system security and other aspects of cybersecurity are long-standing. The frequency, impact, and sophistication of cyberattacks and the growth of cybercrime and cyberespionage have added urgency to the concerns. Consensus has been growing that the policy framework for cybersecurity take into account the diversity and continuing evolution of the technology and threats—from spam to botnets to hacktivism, cyberterrorism, and cyberwar—and the increasing role of the Internet in the U.S. economy and the lives of citizens. Among the issues the 114th Congress is expected to continue confronting are cybersecurity for critical infrastructure, most of which is owned by the private sector; sharing of unclassified and classified information, with protection of privacy and civil liberties; prevention of and response to domestic and international cybercrime; cyberspace and national security; and federal funding to protect information systems.

Cybersecurity, cyber security, information security, computer, information technology, information assurance, e-security, web security, cybercrime, cyber crime, computer crimes, cyber attacks, computer fraud, identity theft, hackers, hack, cyberterrorism, cyberwar, data breach notification, cyber espionage, cyberespionage, Chief Information Officers (CIOs), Department of Homeland Security (DHS), Intelligence Community (IC), National Security Agency (NSA), Science agencies (NIST, NSF, OSTP), banks, financial agencies, Federal Information Security Management Act (FISMA), Internet, Einstein, hacktivism, information sharing, classified information, Freedom of Information Act (FOIA), privacy and civil liberties, critical infrastructure, information infrastructure, chemical industry, defense industrial base, electricity grid, banks, financial institutions, industrial control systems, SCADA, Stuxnet, Flame, advanced persistent threat, public/private partnerships, supply chain, botnet, cloud computing, mobile devices, Internet of things, big data, dark web, smartphone, tablet computer, data center, research and development (R&D), server, network, threat, vulnerability, data security, data assurance, risk management H.R. 3490, H.R. 757, H.R. 1560, H.R. 1731, H.R. 3510, H.R. 3598, H.R. 3869, H.R. 3878, H.R. 4127, S. 178, S. 456, S. 754, CISPA, CISA, NCPAA, PCNA, CSA

Cybersecurity, cyber security, information security, computer, information technology, information assurance, e-security, web security, cybercrime, cyber crime, computer crimes, cyber attacks, computer fraud, identity theft, hackers, hack, cyberterrorism, cyberwar, data breach notification, cyber espionage, cyberespionage, Chief Information Officers (CIOs), Department of Homeland Security (DHS), Intelligence Community (IC), National Security Agency (NSA), Science agencies (NIST, NSF, OSTP), banks, financial agencies, Federal Information Security Management Act (FISMA), Internet, Einstein, hacktivism, information sharing, classified information, Freedom of Information Act (FOIA), privacy and civil liberties, critical infrastructure, information infrastructure, chemical industry, defense industrial base, electricity grid, banks, financial institutions, industrial control systems, SCADA, Stuxnet, Flame, advanced persistent threat, public/private partnerships, supply chain, botnet, cloud computing, mobile devices, Internet of things, big data, dark web, smartphone, tablet computer, data center, research and development (R&D), server, network, threat, vulnerability, data security, data assurance, risk management, H.R. 3490, H.R. 757, H.R. 1560, H.R. 1731, H.R. 3510, H.R. 3598, H.R. 3869, H.R. 3878, H.R. 4127, S. 178, S. 456, S. 754, CISPA, CISA, NCPAA, PCNA, CSA

Cybersecurity, cyber security, information security, computer, information technology, information assurance, e-security, web security, cybercrime, cyber crime, computer crimes, cyber attacks, computer fraud, identity theft, hackers, hack, cyberterrorism, cyberwar, data breach notification, cyber espionage, cyberespionage, Chief Information Officers (CIOs), Department of Homeland Security (DHS), Intelligence Community (IC), National Security Agency (NSA), Science agencies (NIST, NSF, OSTP), banks, financial agencies, Federal Information Security Management Act (FISMA), Internet, Einstein, hacktivism, information sharing, classified information, Freedom of Information Act (FOIA), privacy and civil liberties, critical infrastructure, information infrastructure, chemical industry, defense industrial base, electricity grid, banks, financial institutions, industrial control systems, SCADA, Stuxnet, Flame, advanced persistent threat, public/private partnerships, supply chain, botnet, cloud computing, mobile devices, Internet of things, big data, dark web, smartphone, tablet computer, data center, research and development (R&D), server, network, threat, vulnerability, data security, data assurance, risk management, H.R. 3490, H.R. 757, H.R. 1560, H.R. 1731, H.R. 3510, H.R. 3598, H.R. 3869, H.R. 3878, H.R. 4127, S. 178, S. 456, S. 754, CISPA, CISA, NCPAA, PCNA, CSA

Cybersecurity: CRS Experts

February 10, 2016 (R42619)

The following table provides names and contact information for CRS experts on policy and legal issues before Congress related to cybersecurity. The frequency, impact, and sophistication of cyberattacks and the growth of cybercrime and cyberespionage have added urgency to long-standing concerns about those issues. Consensus has grown that the policy framework for cybersecurity should take into account the diversity and continuing evolution of the technology and threats, and the increasing role of the Internet in the U.S. and global economies and the lives of citizens. Issues include

  • information sharing among private-sector entities and between them and the federal government;
  • data breaches of personal records and other information;
  • protection of privately held critical infrastructure;
  • addressing domestic and international cybercrime and espionage; and
  • the relationship between cyberspace and national security.

Legislative Issues

Name/Title

Phone

Email

Legislation in the 114th and recent Congresses

[author name scrubbed]
Senior Specialist in Science and Technology

[phone number scrubbed]

[email address scrubbed]

Critical infrastructure protection

Chris A. Jaikaran
Analyst in Cybersecurity Policy

[phone number scrubbed]

[email address scrubbed]

Chemical industry

Dana Shea
Specialist in Science and Technology Policy

[phone number scrubbed]

[email address scrubbed]

Defense industrial base

[author name scrubbed]
Specialist in National Security Policy and Information Operations

[phone number scrubbed]

[email address scrubbed]

Electricity grid

[author name scrubbed]
Specialist in Energy Policy

[phone number scrubbed]

[email address scrubbed]

Financial institutions

[author name scrubbed]
Specialist in Financial Economics

[phone number scrubbed]

[email address scrubbed]

Industrial control systems

[author name scrubbed]
Specialist in Energy Policy

[phone number scrubbed]

[email address scrubbed]

Cyberattack prevention and response

Chris A. Jaikaran
Analyst in Cybersecurity Policy

[phone number scrubbed]

[email address scrubbed]

Cybercrime

 

 

 

Federal laws

[author name scrubbed]
Senior Specialist in American Public Law

[phone number scrubbed]

[email address scrubbed]

Law enforcement

Kristin M. Finklea
Specialist in Domestic Security

[phone number scrubbed]

[email address scrubbed]

Cyberwarfare

[author name scrubbed]
Specialist in National Security Policy and Information Operations

[phone number scrubbed]

[email address scrubbed]

Data breach notification

[author name scrubbed]
Legislative Attorney

[phone number scrubbed]

[email address scrubbed]

Economic issues

[author name scrubbed]
Specialist in Financial Economics

[phone number scrubbed]

[email address scrubbed]

Emerging issues

[author name scrubbed]
Senior Specialist in Science and Technology

[phone number scrubbed]

[email address scrubbed]

Espionage

 

 

 

Economic and industrial

Kristin M. Finklea
Specialist in Domestic Security

[phone number scrubbed]

[email address scrubbed]

Legal issues

[author name scrubbed]
Legislative Attorney

[phone number scrubbed]

[email address scrubbed]

State-sponsored

[author name scrubbed]
Specialist in National Security Policy and Information Operations

[phone number scrubbed]

[email address scrubbed]

Federal agency roles

[author name scrubbed]
Senior Specialist in Science and Technology

[phone number scrubbed]

[email address scrubbed]

Chief Information Officers (CIOs)

Patricia Maloney Figliola
Specialist in Internet and Telecommunications Policy

[phone number scrubbed]

[email address scrubbed]

Commerce

John F. Sargent, Jr.
Specialist in Science and Technology Policy

[phone number scrubbed]

[email address scrubbed]

Defense (DOD)

[author name scrubbed]
Specialist in National Security Policy and Information Operations

[phone number scrubbed]

[email address scrubbed]

Executive Office of the President (EOP)

[author name scrubbed]
Section Research Manager

[phone number scrubbed]

[email address scrubbed]

Homeland Security (DHS)

Chris A. Jaikaran
Analyst in Cybersecurity Policy

[phone number scrubbed]

[email address scrubbed]

Intelligence Community (IC)

John Rollins
Specialist in Terrorism and National Security

[phone number scrubbed]

[email address scrubbed]

Justice (DOJ)

Kristin M. Finklea
Specialist in Domestic Security

[phone number scrubbed]

[email address scrubbed]

National Security Agency (NSA)

[author name scrubbed]
Specialist in National Security Policy and Information Operations

[phone number scrubbed]

[email address scrubbed]

Science agencies (NIST, NSF, OSTP)

[author name scrubbed]
Senior Specialist in Science and Technology

[phone number scrubbed]

[email address scrubbed]

Treasury and financial agencies

[author name scrubbed]
Specialist in Financial Economics

[phone number scrubbed]

[email address scrubbed]

Federal Information Security Management Act (FISMA)

Chris A. Jaikaran
Analyst in Cybersecurity Policy

[phone number scrubbed]

[email address scrubbed]

Federal surveillance

[author name scrubbed]
Legislative Attorney

[phone number scrubbed]

[email address scrubbed]

Hacktivism

Kristin M. Finklea
Specialist in Domestic Security

[phone number scrubbed]

[email address scrubbed]

Information sharing

[author name scrubbed]
Senior Specialist in Science and Technology

[phone number scrubbed]

[email address scrubbed]

Antitrust laws

[author name scrubbed]
Legislative Attorney

[phone number scrubbed]

[email address scrubbed]

Classified information

John Rollins
Specialist in Terrorism and National Security

[phone number scrubbed]

[email address scrubbed]

Freedom of Information Act (FOIA)

[author name scrubbed]
Legislative Attorney

[phone number scrubbed]

[email address scrubbed]

Legal aspects

[author name scrubbed]
Legislative Attorney

[phone number scrubbed]

[email address scrubbed]

Privacy and civil liberties

[author name scrubbed]
Legislative Attorney

[phone number scrubbed]

[email address scrubbed]

Information warfare

[author name scrubbed]
Specialist in National Security Policy and Information Operations

[phone number scrubbed]

[email address scrubbed]

International cooperation

 

 

 

Defense and diplomatic

[author name scrubbed]
Specialist in National Security Policy and Information Operations

[phone number scrubbed]

[email address scrubbed]

Law enforcement

Kristin M. Finklea
Specialist in Domestic Security

[phone number scrubbed]

[email address scrubbed]

International trade

[author name scrubbed]
Specialist in International Trade and Finance

[phone number scrubbed]

[email address scrubbed]

National strategy and policy

[author name scrubbed]
Senior Specialist in Science and Technology

[phone number scrubbed]

[email address scrubbed]

National security

[author name scrubbed]
Specialist in National Security Policy and Information Operations

[phone number scrubbed]

[email address scrubbed]

Technological issues

Patricia Maloney Figliola
Specialist in Internet and Telecommunications Policy

[phone number scrubbed]

[email address scrubbed]

Emerging technologies

[author name scrubbed]
Senior Specialist in Science and Technology

[phone number scrubbed]

[email address scrubbed]

Research and development (R&D)

Patricia Maloney Figliola
Specialist in Internet and Telecommunications Policy

[phone number scrubbed]

[email address scrubbed]

Terrorism

John Rollins
Specialist in Terrorism and National Security

[phone number scrubbed]

[email address scrubbed]

Workforce

[author name scrubbed]
Analyst in American National Government

[phone number scrubbed]

[email address scrubbed]

Author Contact Information

[author name scrubbed], Senior Specialist in Science and Technology ([email address scrubbed], [phone number scrubbed])
[author name scrubbed], Analyst in Cybersecurity Policy ([email address scrubbed], [phone number scrubbed])