From SEC. 2. FINDINGS.
(13) But it’s no secret that terrorists could use our computer networks to deal us a crippling blow. We know that cyber-espionage and common crime is already on the rise. And yet while countries like China have been quick to recognize this change, for the last eight years we have been dragging our feet.’’ Moreover, President Obama stated that ‘‘we need to build the capacity to identify, isolate, and respond to any cyber-attack.’’
...
From SEC. 18. CYBERSECURITY RESPONSIBILITIES AND AUTHORITY.
The President--
(2) may declare a cybersecurity emergency and order the limitation or shutdown of Internet traffic to and from any compromised Federal Government or United States critical infrastructure information system or network;
...
From SEC. 14. PUBLIC-PRIVATE CLEARINGHOUSE.
(b) FUNCTIONS- The Secretary of Commerce--
(1) shall have access to all relevant data concerning such networks without regard to any provision of law, regulation, rule, or policy restricting such access;