The Failed Cybersecurity Act of 2012

http://www.ewi.info/print/2169

EastWest Institute
Published on EastWest Institute (http://www.ewi.info)
Home > The Failed Cybersecurity Act of 2012

The Failed Cybersecurity Act of 2012

Posted By: Thomas Lynch

Date: August 8, 2012

With cyber threats in the news almost daily, there are growing demands for legislative action—but so far little consensus on what kind of measures are needed.

The Cybersecurity Act of 2012 [2] (CSA), the most significant legislative undertaking on cybersecurity issues in the United States to date, was blocked from proceeding to a vote in the Senate on August 2. The CSA is now left to languish as members of Congress return to their districts to prepare for the fall campaign.

In a July 19th Wall Street Journal op-ed [3] supporting the bill, President Barack Obama maintained that “the cyber threat to our nation is one of the most serious economic and national security challenges we face.”  

On that point, members of both parties and most of the policy community agree—but on little else. Critics of the recent bill, which changed substantially from its original form, raised objections to the bill’s implications for both privacy and government regulation of businesses.

Civil liberties groups raised an outcry over provisions in the bill that called for increased information sharing between businesses and government. Warning of the potential for misuse of personal information especially by defense-related organizations, the American Civil Liberties Union claimed that an early version of the bill would “unnecessarily threaten our privacy [4].”

A group of Republicans, led by Senator John McCain of Arizona, voiced opposition to the original CSA provision allowing the government to enforce minimum standards on critical infrastructure services such as power plants and dams. Charging that this part of the law imposes new regulatory burdens on businesses, McCain said in a statement that the solution isn’t “adding more bureaucrats or forcing industries to comply with government red tape.”

Both of these concerns were addressed in a later version of the CSA. The mandatory standards were changed to optional recommendations, and the information-sharing provisions were made fully transparent and revised to exclude non-civilian agencies. The result is a bill that partially addresses a number of major concerns, but fails to update the country’s infrastructure to adequately face the consequences of an attack.

To address cyber threats, any future bill must impose substantive changes to infrastructure management while simultaneously satisfying the concerns of pro-business and civil liberties groups. Unfortunately, given the heightened polarization of today’s Congress, such an outcome appears unlikely.

Now that the bill has failed, there are a number of options the Obama administration can consider. In an interview with BankInfoSecurity.com [5], EWI Board Member Melissa Hathaway explained that the president could engage with existing advisory panels as well as “industry leaders and/or key companies that have been breached” to galvanize voluntary reforms.

Additionally, in a recent statement that fueled speculation about an impending executive order [6], White House Press Secretary Jay Carney said that the president “is determined to do absolutely everything we can to better protect our nation against today’s cyber threats.”

Whatever unfolds legislatively, it is becoming increasingly clear that new measures are needed to ensure the security of critical infrastructure—and that a crisis situation in one country is more than likely to reverberate elsewhere. Much as the recent blackouts in India had unprecedented international repercussions [7], a cyber attack on the United States would severely impact the global economy. The price for inaction could be very high.

For further information on how the global community can co-create solutions to these challenges, visit the website for the EastWest Institute’s 3rd Worldwide Cybersecurity Summit in New Delhi [8], to be held on October 30-31, 2012.

Authors: 
Thomas Lynch
Date Published: 
Wed, 2012-08-08
Image: 
Related Programs and Projects: 


Links:
[1] http://www.ewi.info/system/files/images/capitol%20inside_0.png
[2] http://www.google.com/url?sa=t&rct=j&q=cybersecurity%20act%20of%202012&source=web&cd=4&ved=0CHAQFjAD&url=http%3A%2F%2Fwww.hsgac.senate.gov%2Fdownload%2Fthe-cybersecurity-act-of-2012-s-2105&ei=dGshUIeSC6fI0QGniIH4CQ&usg=AFQjCNFcINkBdUwgbIBbiJsbGRZNk6fXJg
[3] http://online.wsj.com/article/SB10000872396390444330904577535492693044650.html
[4] http://www.aclu.org/blog/national-security-technology-and-liberty/next-round-cybersecurity-battle-senate
[5] http://www.bankinfosecurity.com/interviews/hathaway-i-1616
[6] http://thehill.com/blogs/hillicon-valley/technology/242227-with-defeat-of-cybersecurity-bill-obama-weighs-executive-order-option
[7] http://www.ewi.info/harry-raduege-securing-critical-infrastructure
[8] http://www.cybersummit2012.com
[9] http://www.ewi.info/usa
[10] http://www.ewi.info/worldwide-cybersecurity-initiative

//

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s