Bill giving Obama power to shut Web takes on new tone
The Senate bill, first introduced in April by Sen. John Rockefeller (D-W. Va.), still includes language that gives Obama the authority to direct responses to cyberattacks and declare a cyber emergency.
The bill also gives the president 180 days, as opposed to one year outlined in the bill's first draft, to implement a cybersecurity strategy from the day the bill is passed, which for now could be a long way off.
But the language in the first draft of the bill, which has yet to make it out of Rockefeller's Senate Committee on Commerce, Science, and Transportation and onto the Senate floor, has been rewritten regarding the President's authority to shut down both public and private networks including Internet traffic coming to and from compromised systems.
Critics contend sweeping presidential power isn't good news since private networks could be shut down by government order. In addition, those same networks could be subject to government mandated security standards and technical configurations.
The original bill included the words: "The President may....order the limitation or shutdown of Internet traffic to and from any compromised Federal government or United States critical infrastructure information system or network."
The second draft, which has not been released publicly, rearranges those words, according to text of the bill posted by CNet.
The second draft contains more convoluted language concerning the president's control over computer networks and deletes references to the Internet.
It qualifies his authority to include "strategic national interests involving compromised Federal Government or United States critical infrastructure information system or network," but says he may "direct the national response to the cyber threat" in coordination with "relevant industry sectors."
The reference to relevant industry sectors is new in the second draft.
The bill still includes language that would have the president directing the "timely restoration of the affected critical infrastructure information system or network."
Earlier this year, critics expressed concern over potentially giving the president power to tell private network operators when they could turn their systems back on after a cybersecurity threat.
Proponents, however, including officials from the Center for Strategic and International Studies (CSIS), are on record as saying the legislation is comprehensive and strong and reflects the need for thorough debate around digital security that is long overdue.
The original bill proposed by Rockefeller, and now co-sponsored by Evan Bayh (D-Ind.) Bill Nelson (D-Fla.) and Olympia Snowe (R-Maine), touched off a storm of debate over how much power the president should have to control the operation of "critical infrastructure."
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- What Datapipe customers need to know about the new PCI DSS 3.0 compliance standard This handy quick reference outlines what PCI DSS 3.0 is, who needs to be compliant and how Alert Logic solutions address the new...
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- The Critical Role of Support in Your Enterprise Mobility Management Strategy Most business leaders underestimate the importance of tech support when they choose an EMM solution. Here's what to put on your checklist.
- Live Webcast Best Practices for the Hyperconverged Enterprise Network To the Age of Constant Connectivity and Information overload
- Live Webcast Unmasking the Differences between Consumer and Enterprise File Sync & Share The consumerization of IT combined with the rapid pace of the modern mobile workplace is forcing enterprise IT teams to evaluate file sync...
- Live Webcast Government Agency Webifies Outdated COBOL Applications Let this CTO tell you how his agency converted 1980s-era green screens into an e-filing portal for the 100,000 cases handled each year...
- The New Way to Work Knowledge Vault This Knowledge Vault focuses on how, in today's increasingly virtual world, it's more important than ever to engage deeply with employees, suppliers, partners,...
- Getting Ready for BlackBerry Enterprise Service 10.2 Find out how BlackBerry® Enterprise Service 10 helps organizations address the full spectrum of EMM challenges, while balancing the needs of both the... All Applications White Papers | Webcasts