Sen. Feinstein urges Obama to issue executive order on cybersecurity
Measure needed to protect critical assets against cyber attacks, says top Democrat
Computerworld - A senior Democratic lawmaker is urging President Barack Obama to issue an executive order aimed at protecting the nation's critical infrastructure against cyber threats.
In an open letter to the President on Tuesday, Sen. Dianne Feinstein (D-Calif.) called on Obama to use his authority to get government agencies and critical infrastructure owners to implement better controls for protecting their computer networks.
"While efforts to reach consensus continue, I fear that the Congress will be unable to pass meaningful cybersecurity legislation this year," said Feinstein, who is the chairman of the Senate Intelligence Committee. "Therefore, I believe the time has come for you to use your full authority to protect the U.S. economy and the networks we depend on from future cyber attack."
The letter is unlikely to do much to bridge the growing divide between Republicans and the Democrats on the issue of national cybersecurity legislation.
The White House-backed Cybersecurity Act is currently stalled in the Senate because of opposition from Republican lawmakers who see it as too regulatory.
Earlier this year, a group of Republican lawmakers proposed an alternative bill called SECURE IT. Like the Cybersecurity Act, the Republican bill, too, aims to bolster cybersecurity by making it easier for private industry and government to share critical cyber threat information.
The Republicans have claimed their bill is better suited for the task because it focuses on collaboration and voluntary participation rather than government-enforced regulation. They also noted that their version of the bill offers better liability protection for companies that participate in voluntary sharing of threat information.
The White House has already expressed its frustration over the continued bickering between the two sides and has said it is considering an executive order to address the issue.
Efforts to pass a national cybersecurity bill have been going on for several years. The stalled Democrat-backed legislation has already been heavily revised to accommodate Republican concerns, but still appears to be going nowhere. The same is true with the Republican alternative.
Both sides have blamed each other for the stalemate. Earlier this month, several GOP senators expressed support for a bilateral approach to the issue, while accusing the Democrats of adopting a "take-it-or-leave-it" approach to the legislation.
Feinstein's letter meanwhile blamed Republicans for the impasse. "Despite good faith efforts to reach a compromise and major concessions on our part, those opposed to the legislation were able to defeat progress on the bill," she wrote.
Security analysts are divided on the need for legislation. Some have accused both sides of making cybersecurity a political issue during an election year and have noted that many of the measures being proposed as new have been in place for years.
Jaikumar Vijayan covers data security and privacy issues, financial services security and e-voting for Computerworld. Follow Jaikumar on Twitter at @jaivijayan or subscribe to Jaikumar's RSS feed . His e-mail address is firstname.lastname@example.org.
Read more about Cybercrime and Hacking in Computerworld's Cybercrime and Hacking Topic Center.
- Best iPhone, iPad Business Apps for 2014
- 14 Tech Conventions You Should Attend in 2014
- 10 Desktop Apps to Power Your Windows PC
- How to Add New Job Skills Without Going Back to School
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Who's Spying on You? You're aware of the threats of malware to your business but what about the ever-changing ground rules? Cybercriminals today are launching attacks against...
Red Hat Enterprise Linux - The Original Cloud Operating System
Linux adoption is growing against a number of measures, such as the
number of supercomputers that run Linux and the size of the contributing...
- OpenStack Hype vs. Reality: CIO Quick Pulse Open-source architecture can enable IT departments to build infrastructure-as-a-service (IaaS) clouds running on standard hardware.
- Building a Bridge to the Next Generation Data Center Selecting a widely adopted operating system is a foundational component of a standardization strategy.
- Webinar: Building a Big Data solution that's production-ready Big data solutions are no longer just a nice-to-have.
- Meg Whitman presents Unlocking IT with Big Data During this Web Event you will hear Meg Whitman, President and CEO, HP discuss HAVEn - the #1 Big Data platform, as well... All Cybercrime and Hacking White Papers | Webcasts