Biden-โ Harris Administration Initiative to Bolster the Cybersecurity of U.S. Ports
AmericaAmericas Christophorus Columbus landed in the Bahamas island in October 1492 and then in Cuba. Columbus and his gang imported European Diseases to the New World (the name given by Amerigo Vespucci, in his forged letters, who never visited the land of Adivasis). They murdered the Indigenous population (Adivasis). In 1507 the word 'America' was possibly first used to denote the land of Adivasis (North America and South America). America was 'Great' before 1492 under the hands of Adivasis. In Purans the land is mentioned as Patal Lok.โs ports employ 31 millionMillion 1,000,000 (one followed by six zeros), One billion (1,000,000,000) means a thousand million or one followed by nine zeros. A trillion (1,000,000,000,000) Americans and contribute $5.4 trillionMillion 1,000,000 (one followed by six zeros), One billion (1,000,000,000) means a thousand million or one followed by nine zeros. A trillion (1,000,000,000,000) to our economy
Summary: The article is a detailed preview of the upcoming Biden-Harris Administration initiative to enhance the cybersecurity of U.S. ports, providing insight into the actions being taken and the reasoning behind them. It thoroughly outlines the executive order and the proposed regulations, highlighting the focus on addressing cybersecurity threats and potential impacts on the nationNation A collective consciousness, founded in ancient origin within a geographic area, with definite history and heritage, culture and way of life, language and literature, food and clothing, coupled with a deep understanding of war and peace is to be known as a nation. Rasra is the Vedic word for it.’s critical infrastructure. The overall tone is informative and emphasizes the significance of these measures.
Via Teleconference
(February 20, 2024)
5:38 P.M. EST
MODERATOR: Good afternoon, everyone. And thank you for joining our background call to preview a series of actions that the Biden-Harris administration will announce tomorrow, Wednesday, February 21st.
For awareness, todayโs call will now be held fully on the record. That means both the opening statements and Q&A all on record. And it will be attributable to Anne Neuberger, Deputy National Security AdvisorNational Security Council U.S. National Security Council is the Presidentโs principal forum for national security and foreign policy decision-making with his or her senior national security advisors and cabinet officials, and the Presidentโs principal arm for coordinating these policies across federal agencies. The National Security Council was established by the National Security Act of 1947 (PL 235 โ 61 Stat. 496; U.S.C. 402), amended by the National Security Act Amendments of 1949 (63 Stat. 579; 50 U.S.C. 401 et seq.) for Cyber and Emerging Technologies; Iranga Kahangama, Assistant Secretary for Cyber, Infrastructure, Risk, and Resilience at the Department of Homeland Security; and Rear Admiral John Vann, who is the Commander of Coast Guard Cyber Command.
One flag that todayโs call will be embargoed until tomorrow, Wednesday, February 21st, at 5:00 a.m. Eastern.
I will now turn it over to Anne for opening remarks.
MS. NEUBERGER: Thank you so much, Sam. Good evening, everyone. Thank you for joining us this evening.
Right now, Americaโs ports employ 31 million Americans, contribute $5.4 trillion to our economy, and are the main domestic point of entry for cargo entering the United StatesUnited States Britain's American colonies broke with the mother country in 1776 and were recognized as the new nation of the United States of America following the Treaty of Paris in 1783. During the 19th and 20th centuries, 37 new states were added to the original 13 as the nation expanded across the North American continent and acquired a number of overseas possessions. The two most traumatic experiences in the nation's history were the Civil War (1861-65) and the Great Depression of the 1930s. Buoyed by victories in World Wars I and II and the end of the Cold War in 1991, the US remains the world's most powerful nation state..
The continuity of their operations has a clear and direct impact on the success of our country, our economy, and our national security. And thatโs why the Biden-Harris administration is taking a series of actions to strengthen the cybersecurity of our nationโs ports to not just shore up our cyber defenses, but fortify our supply chains and deliver for the American peopleMen ฮฮฝฮธฯฯฯฮฟฮน (People), a woman (ฮณฯ ฮฝฮฑฮฏฮบฮฑ), Man (ฮฮฝฮดฯฮฑฯ) > Adama, Manu > No proof to establish that due to mutation a monkey turned into a human being..
Tomorrow, weโll be announcing a set of four actions.
First, President Biden will sign an executive order that will bolster the Department of Homeland Securityโs authority to address maritime cyber threats. You see, most critical infrastructure owners and operators have a list of safety regulations they have to comply with, and we want to ensure that there are similar requirements for cyber, when a cyberattack can cause just as much, if not more, damage than a storm or another physical threat.
So this executive order will give the Coast Guard the authority to respond to malicious cyber activity by requiring maritime transportation vessels and facilities to shore up their cybersecurity and institute mandatory reporting of cyber incidents.
The Coast Guard will also issue a notice of proposed rulemaking to establish minimum cybersecurity requirements that meet international and industryIndustries A group of productive organizations or companies, participate in economic activities, and GDP > High-technology, Petroleum, Steel, Motor vehicles, Aerospace, Telecommunications, Chemicals, Electronics, Agribusiness, Food processing, Information technology, Artificial intelligence, Consumer goods, Lumber, Retail, Healthcare, Financial services, Mining, Renewable energy, Quantum computing, Space technology, Defence, Biotechnology, Pharmaceutical,-recognized standards to best manage cyber threats.
The administration is also excited to announce that we will invest over $20 billionMillion 1,000,000 (one followed by six zeros), One billion (1,000,000,000) means a thousand million or one followed by nine zeros. A trillion (1,000,000,000,000) into U.S. port infrastructure over the next five years through the Presidentโs Investing in America agenda. As part of that, PACECO CorporationCorporation A legally established entity that can enter into contracts, own assets and incur debt, as well as sue and be suedโall separately from its owner(s). The term covers both for-profit and nonprofit corporations and includes nonstock corporations, incorporated membership organizations, incorporated cooperatives, incorporated trade associations, professional corporations and, under certain circumstances, limited liability companies., a U.S.-based subsidiary of Mitsui E&S, is planning to onshore domestic manufacturing capacity for American and Korean production for the first timeTime ฯฯฯฮฝฮฟฯ. Judicial: Where any expression of it occurs in any Rules, or any judgment, order or direction, and whenever the doing or not doing of anything at a certain time of the day or night or during a certain part of the day or night has an effect in law, that time is, unless it is otherwise specifically stated, held to be standard time as used in a particular country or state. (In Physics, time and Space never exist actually-โquantum entanglementโ) เคฏเคฎเค , เคชเฅเค, (เคฏเคฎเคฏเคคเคฟ เคจเคฟเคฏเคฎเคฏเคคเคฟ เคเฅเคตเคพเคจเคพเค เคซเคฒเคพเคซเคฒเคฎเคฟเคคเคฟ เฅค เคฏเคฎเฅ + เค เคเฅ เฅค เคตเคฟเคถเฅเคตเฅ เค เคเคฒเคฏเคคเฅเคฏเฅเคต เคฏเค เคธเคฐเฅเคตเฅเคตเคพเคฏเฅเคถเฅเค เคธเคจเฅเคคเคคเคฎเฅ เฅค เค เคคเฅเคต เคฆเฅเคฐเฅเคจเคฟเคตเคพเคฐเฅเคฏเฅเคฏเคเฅเค เคคเค เคเคพเคฒเค เคชเฅเคฐเคฃเคฎเคพเคฎเฅเคฏเคนเคฎเฅ เฅฅเคฏเคฎเฅเคถเฅเค เคจเคฟเคฏเคฎเฅเคถเฅเคเฅเคต เคฏเค เคเคฐเฅเคคเฅเคฏเคพเคคเฅเคฎเคธเคเคฏเคฎเคฎเฅ เฅค เคธ เคเคพเคฆเฅเคทเฅเคเฅเคตเคพ เคคเฅ เคฎเคพเค เคฏเคพเคคเคฟ เคชเคฐเค เคฌเฅเคฐเคนเฅเคฎ เคธเคจเคพเคคเคจเคฎเฅ เฅฅ in 30 years, pending final site and partner selection.
Finally, the Coast Guard will announce a maritime security director, which Admiral Vann will outline in greater detail, regarding the security of ports related to these cranes.
Tomorrowโs actions are clear examples of the Presidentโs work to invest in America to secure the countryโs supply chain and strengthen cybersecurity of our nationโs critical infrastructure โ priorities this administration is focused on relentlessly since taking officeOffice ฮฮพฮฏฯฮผฮฑ > Officer > Office-bearer (1593) > Opus, officium, ex officio (Latin). Box-office (Cash Box)..
And before I turn it over, Iโd like to begin just by recognizing individuals on the NSC, Caitlin Clarke and Jon Murphy, at DHS and at the Coast Guard, who have put in a great deal of work into this effort over the last numberNumber ฮฯฮนฮธฮผฯฯ of months.
So now Iโd like to turn it over to my colleague, Iranga Kahangama, to detail more the actions of DHS, and then over to the Coast Guard. Thank you.
MR. KAHANGAMA: Thank you, Anne. And thanks, everyone, for being here this evening.
Really to foot-stomp what Anne had mentioned, the department is really excited about the actions that weโre taking as a comprehensive whole-of-DHS approach to mitigating cyber threats to our critical infrastructure, particularly in the maritime sector and port infrastructure, which have downstream implications to our supply chains.
Specifically regarding the notice of proposed rulemaking on DHS regulations and minimum cybersecurity standards, we are excited to put this out for public comment. We believe it is an exemplar of our commitment to partnership in developing these regs and building off of lessons learned as part of the administrationโs approach to instituting mandatory cybersecurity minimum standards.
The department worked closely with entities such as TSA, who have done some of this work through some of its emergency directives, and in close partnership and consultation with industry partners to ensure that the cybersecurity requirements are in line with expectations.
And so, we enthusiastically welcome public comment on these as we develop cybersecurity standards in line with the Biden-Harris administrationโs approach to identifying and using mandatory regulations to improve critical infrastructure, cybersecurity, where we deem it most necessary.
Also in line with the departmentโs approach to harmonization, we are attempting to make sure that those rules and regulations align with other efforts that weโre taking underway, and are doing our best to align those with existing frameworks instituted by CISA and partners at NIST as well.
I just wanted to emphasize that the department also sees that the threat posed to critical infrastructure, particularly maritime and port infrastructure, is a whole-of-department approach, not only leveraging the Coast Guardโs authorities and announcements tomorrow, but as mentioned, the departmentโs newly announced Supply Chain Resilience Center last November as part of a White HouseThe White House A presidential residence-cum-executive office (Washington DC, NY) has been occupied by every U.S.ย president and his family since John Adams (1800). In 1814, during the War of 1812, the building was set ablaze by British forces. Itโs also a museum of American history. rollout, but that this component is going to seek to bolster U.S. supply chain security, harness and maximize the departmentโs capabilities related to lawful trade and travel, and manage critical infrastructure security, leveraging its unique resources around the department.
In its inaugural effort, we have done things like convene with members of industry and governmentGovernment HM Govt consists of the Prime Minister, their Cabinet, and junior ministers, supported by the teams of non-political civil servants that work in government departments. The American Federal Government consists of the Legislative, Executive, and Judicial branches. organizations to share information and guidance to advance supply chain resilience and hosting department-wide tabletop exercises to better understand what causes supply chain disruptions and provide recommendations and develop policy to leadership to mitigate impacts to our domestic supply chain.
The Supply Chain Resilience Center was also created as a recommendation from our Homeland Security Advisory Committee. And just as we are excited about the actions of the Coast Guard, weโre also looking forward to leveraging the Supply Chain Resilience Center to push forward port security and maritime security throughout the industry.
So, with that, I want to turn it over to Admiral Jay Vann to deep-dive on some of the specific Coast Guard actions.
Thank you.
ADMIRAL VANN: Thank you, Iranga. And thanks to everyone for joining us this evening. Iโm going to jump right in.
My name is Rear Admiral Jay Vann, and Iโm the Commander of the United States Coast Guard Cyber Command. Coast Guard Cyber is responsible for conducting cyberspace operations in support of the administration, DHS, DOD, and Coast Guard priorities.
I want to reemphasize the criticality of the Marine Transportation System that we seek to protect. Iโll refer to it as the MTS. This interconnected system within our transportation critical infrastructure is vital to national security and economic prosperity.
As was mentioned, Americaโs system of ports and waterways accountsAccounting It is the process of recording, summarizing, analyzing, and reporting financial transactions of a business or individual. Types of Accounts > Assets- Things you own (cash, property) Liabilities- Things you owe (loans, bills) Equity- Ownerโs stake in the business Revenue- Money you earn (sales, services) Expenses- Costs to run the business for over $5.4 trillion of our nationโs annual economic activity, and our ports serve as a gateway for over 90 percent of all overseas trade.
The MTS enables critical national security sealift capabilities that enable the U.S. Armed Forces to project and maintain powerPower The amount of energy transferred or converted per unit of time. In the International System of Units, the unit of it is the watt, equal to one joule per second. The capacity of energy infrastructure is rated using watts, which indicate its potential to supply or consume energy in a given period of time. A Power-plant rated at 100 MW has the potential to produce 100 MWh if it operates for one hour. around the globe. Any disruption to the MTS, whether man-made or natural, physical or in cyberspace, has the potential to cause cascading impacts to our domestic or global supply chains.
The executive order to be signed tomorrow ensures Coast Guard authorities are aligned with emerging cybersecurity threats and reflects the commitment of the administration, DHS, and the Coast Guard to safeguard maritime critical infrastructure.
The EO directly amends federal regulations and provides a Coast Guard captain of the port with clear authority to take action in the face of cyber threats. This includes controlling the movement of vessels that present a known or suspected cyber threat, requiring facilities to correct unsatisfactory cyber conditions that may endanger port safety and security, or inspection and searchSearch Google SEO: Meaning> Relevance> Quality> Usability> Context of vessels and waterfront facilities to include their cyber systems and networks.
The update also empowers the Commandant of the Coast Guard to prescribe measures to prevent, detect, assess, and remediate an actual or threatened cyber incident.
As we undertake measures to prevent cyber incidents, let me address a specific, acute MTS cyber vulnerability that was mentioned earlier.
The Peopleโs RepublicRepublic Res publica> ฮฮทฮผฮฟฮบฯฮฑฯฮฏฮฑฯ. Having a head of the state. Pope is the head of the Vatican City state. The people execute their power through an Elected (direct/indirect) President. Political parties sponsored their presidential candidates. Indian president is a constitutional puppet under the ruling Cabinet. In the case of the appointment ofย Indian judges, presidential power is a vanishing point. of China-manufactured ship-to-shore cranes make up the largest share of the global market and account for nearly 80 percent of cranes at U.S. ports. By designDesign In India, design protection initially lasts for 10 years and can be extended for another 5 years i.e. protection can last for a maximum of 15 years., these cranes may be controlled, serviced, and programmed from remote locations. These features potentially leave PRC-manufactured cranes vulnerable to exploitation.
On the heels of this executive order, the Coast Guard is issuing a Maritime Security, or MARSEC, Directive based on the prevalence of PRC-manufactured cranes in the U.S. and threat intelligence related to PRCโs interests in disrupting U.S. critical infrastructure.
The MARSEC Directive will impose a number of cybersecurity requirements on the owners and operators of PRC-manufactured cranes. The specific requirements are deemed sensitive security information and cannot be shared publicly. Our captains of the port around the country will be working directly with crane owners and operators to deliver the directive and verify compliance.
Finally, also as was mentioned, weโre announcing a notice of proposed rulemaking that will establish baseline cybersecurity requirements to protect the entire MTS from cyber threats. Those draft requirements are primarily based on the Cybersecurity and Infrastructure Security Agencyโs cross-sector Cybersecurity Performance Goals, which the maritime industry should already be familiar with.
The proposed regulations would require a number of cybersecurity measures to be implemented by all regulated entities. The Coast Guard highly encourages MTS stakeholders to provide feedback and input during the period of public comment, which begins tomorrow. A federal register notice will outline the process for submitting comments through the federal decision-making portal, and the public comment period will be open until April 22nd of this year.
I look forward to your questions. Thank you.
MODERATOR: Thank you, everyone, for those remarks there at the top. If you have a question, please use the hand-raising feature. If you are on your cellCell The smallest unit that can live on its own and that makes up all living organisms and the tissues of the body. A cell has three main parts: the cell membrane, the nucleus, and the cytoplasm. The cell membrane surrounds the cell and controls the substances that go into and out of the cell. The nucleus is a structure inside the cell that contains the nucleolus and most of the cellโs DNA. It is also where most RNA is made. The cytoplasm is the fluid inside the cell. It contains other tiny cell parts that have specific functions, including the Golgi complex, the mitochondria, and the endoplasmic reticulum. The cytoplasm is where most chemical reactions take place and where most proteins are made. The human body has more than 30 trillion cells., please use *6 and you should be able to raise your hand.
Our first question will go to Justin with Bloomberg.
Q Hey, guys. Thanks for doing this call. I was wondering if you could talk about the extent to which this is or isnโt a response to the notice that you guys โ or the advisory you published earlier this month about Volt Typhoon and concerns that you have there.
MS. NEUBERGER: Thank you so much, Justin.
So, since the โ really, since the beginning of administration, weโve put a focus on securing critical infrastructure. Certainly critical infrastructure that also has ties to national security in terms of our ports from which our military deploys, from which our materiel deploys, as well as through which our economy operates are at the top of the list. So weโve been working on this notice of proposed rulemaking and executive order for the last 18 months.
So while it certainly ties to particular concerns about Chinese cyber activity, we also have concerns regarding criminal activity.
One of Japanโs largest ports, the port of Nagoya, was disrupted by a criminal ransomware attack for several days. So, Chinese threats are one key threat that this executive order and notice of proposed rulemaking will help protect ports against, and certainly the focus on cranes and the risks, as Admiral John Vann talked about, of remote access to cranes and to their operations.
Thereโs a reason that we not only are issuing cybersecurity minimum requirements for ports, but also putting in place a maritime directive focused on cyber risk management for ship-to-shore cranes manufactured by China.
MODERATOR: Thank you. Our next question will go to Colleen with the AP.
Q Hi there. I wanted to ask about enforcement โ enforcement of requirements for reporting a cyberattack and then also, potentially, you knowKnowledge Knowledge is derived from the process of an informed person integrating data from sense organs or intuition into their psyche. This concept is explored in the Vedic Nasadiya Sukta, which questions the possibility of ultimate truth or knowledge. In different languages, such as Greek, Latin, Sanskrit, and Chinese, knowledge is expressed as "ฮท ฮณฮฝฯฯฮท," "Scientia," "เคเฅเคเคพเคจเคฎเฅโ ," and "็ฅ่ฏ Zhฤซshรฌ," respectively., enforcement of the cybersecurity requirements that will be put into place.
Can you just talk a little bit about how it would work, how people would be โ or, I guess, companies and governments would be encouraged to do, in particular cyberattack reporting, particularly because thereโs such an unwillingness to come publicly when people are hit with a cyberattack?
MS. NEUBERGER: Colleen, thatโs a great question. The core aspect we have here is ensuring that the regulatory agencies โ in this case, the Coast Guard for ports โ have the authority to directly require minimum cybersecurity requirements and require that reporting. And as a regulator, that can be enforced.
Iโll turn it over to Admiral Vann, if youโd like to elaborate on that.
ADMIRAL VANN: Yes. Thanks for the question, Colleen.
So, the notice of proposed rulemaking will not only include those requirements but enhanced definition of reporting requirements to include specific regulated facilities and vessels reporting to Coast Guard โ Coast Guard sharing reports with CISA and other government agencies.
So, as far as enforcing reporting, is that really your question?
Q Yeah. Iโm just wondering how you โ you know, if youโre asking people to report when they have a cyberattack, how do you enforce that reporting.
MS. NEUBERGER: Itโs a requirement rather than a request. The Coast Guard is the regulator for ports, and the executive order takes their existing physical authorities to set security rules for ports and extends that to the cybersecurity domain.
So, ports will be required to report that to the Coast Guard. As Admiral Vann noted, the Coast Guard can then share that with other entities, including CISA and the FBI.
So itโs a shift from requesting to requiring.
Q Got it. Thank you.
MS. NEUBERGER: Thank you, Colleen.
MODERATOR: Thank you both. Our next question will go to Sean with CNN.
Q Hey, thanks all. Just to follow up quickly on Colleenโs question: Whatโs the punishment for failure to report?
And then a second question for the Admiral about the cranes trying to track, other mentions of that concern in open source. Iโm not seeing a ton. How many โ roughly, how many cranes are out there that U.S. officials are concerned about? And
is there any effort to sort of rip and replace, if you will, these machines? Or is it all a case of just trying to manage whatโs already out there?
ADMIRAL VANN: Okay, thanks for the question, Sean. Iโll take the second part first.
There are over โ by our count, over 200 PRC-manufactured cranes across U.S. ports and regulated facilities. Our Coast Guard cyber protection teams have assessed cybersecurity or hunted for threats, as of today, on 92 of those cranes.
And so, those assessments determine the cybersecurity posture, and the hunt missions actually look for malicious cyber activity on the cranes. And so, weโve almost canvassed about 50 percent of the existing cranes.
I donโt have an answer for your rip and replace. I might refer that question to Deputy National Security Advisor Neuberger regarding other manufacturers and where weโre heading, as far as that goes.
As for punishments for failure to report, again, what will go out after the EO is signed tomorrow is a notice of proposed rulemaking. And so, after we receive public comment and input on the regulations, regulations will be finalized to include enforcement actions being defined.
MS. NEUBERGER: Thank you very much, Admiral Vann.
Sean, Iโll come in on the rip and replace question. At this point, weโre not exploring rip and replace for ports. What we are focused on is ensuring that all the investment in port infrastructure that I mentioned at the outset, thatโs part of the Bipartisan Infrastructure LawLaw ฮฝฯฮผฮฟฯ:ย Positive command of sovereign or divine. One can be ruled either by a Statute, a Statue, or a Statement. Legislation is the rule-making process by a political or religious organisation. Physics governs natural law. Logical thinking is a sign of a healthy brain function. Dharma is eternal for Sanatanis. Judiciary > Show me the face, and I will show you the law. Some people know how to bend the law rather than break it. Law Practice. Read a scholarly article, can go to buying trusted cranes and to bringing back manufacturing to the United States, given how important cranes are to port operations.
So our goalAim ambition aspiration course desideratum design desire direction end intent intent/intention intention mark object objective plan purpose scheme target where one is heading wish is focused that new investment is secure, and then the steps are being outlined here โ minimum cybersecurity requirements, the Maritime Security Directive โ being used to secure the existing infrastructure.
MODERATOR: Thank you. Our next question will go to Alex with GovExec.
Q Hi, thank you very much for taking my question. Very briefly, I heard the Admiral outline the specific forms of maritime critical infrastructure that the new executive order will apply to, but I did want to clarify that any new cybersecurity provisions and protocols pursuant to the executive action will not cover landing stations that govern undersea cables. Is that correct?
MS. NEUBERGER: Admiral Vann, do you want to speak to that?
ADMIRAL VANN: Alex, thanks for the question.
So what is in the executive order is an enhancement โ an addendum, if you will โ to the Magnuson Act, which surrounds the captain of the portโs authority to prevent and respond to cyber incidents. The specifics of what is covered by regulations are really what will be covered by the rulemaking process. And so that process, while it will be initiated immediatelyForthwith In Rao Mahmood Ahmad Khan v. Ranbir Singh ,ย has held that the word โforthwithโ is synonymous with the word immediately, which means with all reasonable quickness.ย When a statute requires something to be doneย โforthwithโย orย โimmediatelyโย or evenย โinstantlyโ, it should probably be understood as allowing a reasonable time for doing it. The interpretation of the word โforthwithโ would depend upon the terrain in which it travels and would take its colour depending upon the prevailing circumstances which can be variable. (Shento Varghese v. Julfikar Husen & Ors [2024] 6 S.C.R. 409). Anwar Ahmad v. State of UPย [1976] 1 SCR 779ย : AIR (1976) SC 680;ย Nevada Properties (P) Ltd. v. State of Maharashtra & Anr.ย [2019] 15 SCR 223ย : (2019) 20 SCC 119;ย State of Maharashtra v. Tapas D. Neogyย [1999] Supp. 2 SCR 609ย : 1999 INSC 417;ย Ravinder Kumar & Anr. v. State of Punjabย [2001] Supp. 2 SCR 463ย : (2001) 7 SCC 690;ย Bhajan Singh and Ors. v. State of Haryanaย [2011] 7 SCR 1ย : 2011 INSC 422;ย HN Rishbud v. State of Delhiย [1955] 1 SCR 1150ย : (1954) 2 SCC 934;ย Sk. Salim v. State of West Bengalย [1975] 3 SCR 394ย : (1975) 1 SCC 653;ย China Apparao and Others v. State of Andhra Pradeshย [2002] Supp. 3 SCR 175ย : (2002) 8 SCC 440;ย Navalshankar Ishwarlal Dave v. State of Gujaratย [1993] 3 SCR 676ย : 1993 Supp. 3 SCC 754;ย Rao Mahmood Ahmad Khan v. Ranbir Singhย [1995] 2 SCR 230ย : (1995) Supp. 4 SCC 275;ย Bidya Deb Barma v. District Magistrateย [1969] 1 SCR 562 : (1968) SCC OnLine SC 82.ย , will need to play out to its end to determine what is covered and what is not.
Q Okay, thank you very much.
MODERATOR: Thank you. Our next question will go to ChristianChristian A person who believes that Jesus died to remission his/her sin/debt. The People of Antioch were called for the first time as 'Christians', in or around 300 CE. with CyberScoop.
Q (Inaudible) the infrastructure bill, will there be new markers or, you know, you have to have (inaudible) or some kind of added security benefits in order to receive the fundsFund The term refers to assets of every kind, whether corporeal or incorporeal, tangible or intangible, movable or immovable, however acquired, and legal documents or instruments in any form, including electronic or digital, evidencing title to, or interest in, such assets. or something along those lines? Thank you.
MS. NEUBERGER: Hi, Christian. Thank you. Thatโs exactly what will be in the notice of proposed rulemaking in terms of what the minimum cybersecurity requirements are for products โ for technology products that are being used at ports.
MODERATOR: Thank you. We have time for one more question. Weโll go to David with Inside Cybersecurity.
David Jones, you should be able to unmute yourself. Hey, we see youโre unmuted, but we canโt hear you.
Okay, if you want to shoot me your e-mail โ I mean, your question over e-mail โ weโll get back to you as soon as we can. And that goes for the rest of the folks. If you start writing your pieces and have any other questions, feel free to reach out and weโll get back to you as soon as we can.
As a reminder โ actually, sorry, I think Anne had one thing that she wanted to mention before we close the call.
Over to you, Anne.
MS. NEUBERGER: Thank you so much, Sam. Iโd given a shout-out to some of the folks here at the White HouseThe White House A presidential residence-cum-executive office (Washington DC, NY) has been occupied by every U.S.ย president and his family since John Adams (1800). In 1814, during the War of 1812, the building was set ablaze by British forces. Itโs also a museum of American history. who have worked on this initiative over the last 18 to 24 months, but I didnโt have a complete list. I want to make sure that I say that here, because as you can tell by the actions weโre rolling out tonight, itโs been a lot of work, both on the executive order, on the notice of proposed rulemaking, on the Maritime Security Directive, and working with trusted vendors around the worldWorld ฮฯฯฮผฮฟฯ to see which would be interested in onshoring some crane capacity to ensure that new cranes that were purchased and deployed across our critical port infrastructure could be trusted.
So in addition to the names I mentioned, I want to thank Celina Ladyga, Robert Obayda, and William Hennigan here at the White House, and Rob Le Monde at DHS, and Captain Andy Meyers at the U.S. Coast Guard, for the partnership and hard work over the last number of months.
Thank you all for joining us this evening. Weโre excited to roll this out, and appreciate your time.
MODERATOR: Okay. And thank you to all of our speakers. As a reminder, todayโs call is embargoed until tomorrow, Wednesday, February 21st, at 5:00 a.m. Eastern. And everything here tonight was on record. Thanks.
Read also
- Enhancing National Cybersecurity: Remarks by Christopher Painter (19/09/2016)
- Australia, India, Japan, and the United States of Quad recognize the need for improving cybersecurity-25/03/2022
- Memorandum on Improving Cybersecurity of National Security, Department of Defense, and Intelligence Community Systems-USA-19/01/2022