(1)Revolutionary advancements in computing and communications technology have interconnected government, commercial, scientific, and educational infrastructures—including critical infrastructures for electric power, natural gas and petroleum production and distribution, telecommunications, transportation, water supply, banking and finance, and emergency and government services—in a vast, interdependent physical and electronic network.
(2)Exponential increases in interconnectivity have facilitated enhanced communications, economic growth, and the delivery of services critical to the public welfare, but have also increased the consequences of temporary or prolonged failure.
(3)A Department of Defense Joint Task Force concluded after a 1997 United States information warfare exercise that the results “clearly demonstrated our lack of preparation for a coordinated cyber and physical attack on our critical military and civilian infrastructure”.
(4)Computer security technology and systems implementation lack—
(A)sufficient long term research funding;
(B)adequate coordination across Federal and State government agencies and among government, academia, and industry; and
(C)sufficient numbers of outstanding researchers in the field.
(5)Accordingly, Federal investment in computer and network security research and development must be significantly increased to—
(A)improve vulnerability assessment and technological and systems solutions;
(B)expand and improve the pool of information security professionals, including researchers, in the United States workforce; and
(C)better coordinate information sharing and collaboration among industry, government, and academic research projects.
(6)While African-Americans, Hispanics, and Native Americans constitute 25 percent of the total United States workforce and 30 percent of the college-age population, members of these minorities comprise less than 7 percent of the United States computer and information science workforce.
Pub. L. 107–305, § 1,Nov. 27, 2002, 116 Stat. 2367, provided that: “This Act [enacting this chapter and section
278h of this title, amending sections
7301 of this title and section
1862 of Title
42, The Public Health and Welfare, and redesignating section
278h of this title as 278q of this title] may be cited as the ‘Cyber Security Research and Development Act’.”
The table below lists the classification updates, since Jan. 3, 2012, for this section. Updates to a broader range of sections may be found at the update page for containing chapter, title, etc.
The most recent Classification Table update that we have noticed was Tuesday, August 13, 2013
An empty table indicates that we see no relevant changes listed in the classification tables. If you suspect that our system may be missing something, please double-check with the Office of the Law Revision Counsel.
Description of Change
Statutes at Large
LII has no control over and does not endorse any external Internet site that contains links to or references LII.