IDG News Service - Three U.S. senators criticized for past legislation that would allow the president to potentially quarantine or shut down parts of the Internet during a major cyberattack have introduced a new bill that would put limits on that authority.
The Cybersecurity and Internet Freedom Act, introduced late Thursday, would explicitly deny the president or other U.S. officials "authority to shut down the Internet."
The legislation, similar in many ways to a controversial 2010 bill, comes after persistent criticism that the bill's sponsors want to give the president a so-called Internet kill switch.
"We want to clear the air once and for all," Sen. Joseph Lieberman (I-Conn.) said in a statement. "There is no so-called 'kill switch' in our legislation because the very notion is antithetical to our goal of providing precise and targeted authorities to the president. Furthermore, it is impossible to turn off the Internet in this country."
In 2010, the bill's sponsors -- Lieberman, Susan Collins (R-Maine) and Tom Carper (D-Del.) -- introduced a wide-ranging cybersecurity bill that would have defined emergency powers that the president could use, including shutting down parts of the Internet, when there's an "ongoing or imminent" cyberattack on the nation's critical infrastructure.
The new legislation has similar language, again allowing the president to take emergency measures to protect critical infrastructure. But the new bill adds language saying that the president, federal cybersecurity officials and other government employees do not have the authority to shut down the Internet.
The three senators, all members of the Senate Homeland Security and Governmental Affairs Committee, argued that the bill would limit broad powers the president has in the Communications Act of 1934 to take over or shut down wired and radio communications during war time. But critics said the bill, which failed to pass through Congress, would give the president broad and ambiguous authority.
Representatives of the Center for Democracy and Technology and the Computer and Communications Industry Association, two critics of the 2010 cybersecurity bill, weren't immediately available for comment on the new legislation.
Some critics say the 2010 bill had a kill switch provision, with comparisons to Internet shutdowns in Egypt and other Middle Eastern countries in recent weeks, even though the legislation did not authorize presidential power to shut down the entire Internet in the U.S.
The persistent kill-switch criticisms were distracting from a serious debate about cybersecurity measures the U.S. needs, Lieberman said.
"The so-called 'Internet kill switch' debate has eclipsed discussion of actual, substantive provisions in this bill that would significantly improve the security of all Americans," he said in a statement.
The new, 221-page bill mirrors parts of the 2010 bill. The new bill would require owners of critical infrastructure to fix vulnerabilties and would create a national center focused on preventing and responding to cyberattacks. The bill also would reform the cybersecurity rules for federal agencies, and it would establish a cybersecurity research and development program in the U.S. Department of Homeland Security.
- Seattle Children's Accelerates Citrix Login Times by 500% with Cross-Tier Insight Seattle Children's is a leading research hospital with a large and growing Citrix XenDesktop deployment. With ExtraHop, the IT team at Seattle Children's...
- McKesson Makes Application Hosting for Hospitals Faster, More Efficient With ExtraHop, McKesson identified the root cause of slow Citrix XenApp application launches and adopted a more intelligent, proactive IT operations model that...
- Maintain Less. Create More. Spend less on maintenance and spend more time creating with Red Hat Enterprise Linux. Read on to learn how Red Hat can help...
- Flying High on the Use of Red Hat Enterprise Linux Flybe was one of the 21 companies that were interviewed for quantitative results on their operations as part of an IDC ROI analysis....
- Keep Servers Up and Running and Attackers in the Dark An SSL/TLS handshake requires at least 10 times more processing power on a server than on the client. SSL renegotiation attacks can readily...
- On Demand: Mastering the Art of Mobile Content Management Mobile device usage in the enterprise has skyrocketed, and it continues to escalate. IT must answer to users who demand access to their... All Gov't Legislation/Regulation White Papers | Webcasts