Critical infrastructure protection: Maybe thinking good thoughts will make us safe
Network World - Joe Lieberman (I-Conn.) retired in January after quite a colorful two-dozen years in the U.S. Senate. One of the major issues he pushed for during his last few years in office was protection of the U.S. critical infrastructure. Along with Sen. Susan Collins (R-Maine), Lieberman put forth a series of bills aimed at requiring some level of protection for such infrastructure, the last of these being voted down in November.A
President Obama has now issued a "Presidential Policy Directive" on "Critical Infrastructure Security and Resilience." This directive was accompanied by an Executive Order on "Improving Critical Infrastructure Cybersecurity." Sadly, the president's efforts may turn out to be about as useful as Lieberman's.
[ RELATED: Obama signs cybersecurity order ]
The senator's efforts ultimately failed because 2012 was an election year. But the big beef against his bill was that it actually called for companies to take responsibility for the risks that they had created. Sen. John McCain (R-Ariz.) headed the attacks saying, "unelected bureaucrats at the DHS could promulgate prescriptive regulations on American businesses, which own roughly 90% of critical cyber infrastructure."
I will admit that the fact that the Lieberman/Collins bill would have put the Department of Homeland Security -- you know, the people that bring you the security theater that is the TSA -- in charge of protecting critical infrastructure made it a lot harder to take the proposal seriously. But the McCain assumption that the folks that run our power plants, hospitals, transportation and financial networks will suddenly wake up on their own and start protecting the infrastructures they have so carelessly and assiduously left exposed strains credibility.
The Obama executive order says that the "critical infrastructure" of concern is "where a cybersecurity incident could reasonably result in catastrophic regional or national effects on public health or safety, economic security, or national security." OK, you got me at "catastrophic ... effects." According to the dictionary that came with my Mac, "catastrophic" means "involving or causing sudden great damage or suffering." The type of things that Joel Brenner wrote about in his book "America the Vulnerable." Lots of people dying, the economy collapsing -- fun things like that.
Right now there is no actual legal requirement that the controls for a power company's plants be secure from hacking. There is also no personal liability for anyone working at the power company if they do not exercise common sense to try to protect against vendor stupidity that builds in security vulnerabilities. Nor is there any liability for a vendor that purposefully decides to make its products insecure and fails to tell customers.A
There are regulations that require hospitals to protect medical records and universities to protect student educational records, but there are none that require a power company to protect its generating capacity or a hospital to protect its physical plant -- which is just as important to patient care as are the records. Imagine, if you will, what might happen to critically ill patients in a hospital in Dallas if the AC was turned off in mid-August. In this case the hacker went to jail, but what about the hospital engineers who installed the AC controllers in such a way that they were accessible over the Internet? In my opinion, they should share the blame.
The Obama effort bows to those in Congress who care less about protecting our health and safety than they do about protecting the pocketbooks of their campaign donors. That is not only sad, but it is a clear and present danger to us all. Prediction: Real requirements and liability will be established in law only after a major example of why it has been needed for years -- i.e., the Federal Aviation Administration style of fatality-based regulating.
Disclaimer: In spite of Harvard's feeling of self-importance I am not sure that any of its facilities would meet an objective definition of critical infrastructure. In any case, I have heard no opinions from the university on this topic, so the above lament about administration and congressional impotence is my own.
Read more about wide area network in Network World's Wide Area Network section.
- The 20 Best iPhone/iPad Games of 2013 So Far
- 9 Steps to Build Your Personal Brand (and Your Career)
- 7 Consumer Technologies Coming to an Enterprise Near You
- 11 Signs Your IT Project is Doomed
- A walking tour: 33 questions to ask about your company's security
- 15 social media scams
- The 7 elements of a successful security awareness program
- IT Certification Study Tips
- Register for this Computerworld Insider Study Tip guide and gain access to hundreds of premium content articles, cheat sheets, product reviews and more.
- Federal IT Innovation Caught in a Catch-22
- Fed resources shoring up old infrastructure, holding back new technologies.
- Harness IT -- An Introduction to Business Intelligence Solutions
- Learn the key selection criteria required to provide your organization with the capability to address structured data, unstructured data and mobile demands so...
- Business Intelligence Shows its Smarts
- Today's Business Intelligence (BI) tools provide a new way to think about data with self-service capabilities and user-friendly analytics that can be used...
- Proactive Planning for Big Data
- Big data is less about the terabytes and more about the query tools and business intelligence needed to make sense of massive amounts...
- Inquiry Spotlight: Consumer-Facing Identity
- The challenges of consumer-facing identity management, access management, and authentication differ in ways subtle and dramatic from those of the employee-facing variety. All Government IT White Papers
- Becoming An Analytics Driven Organization
- Join us on Tuesday, June 18, 2013, 11:00 AM EDT and learn how your agency can create an analytics culture that will enable...
- 3 Reasons Why Sepaton is the World's Fastest Backup Solution
- Leading analyst, Storage Switzerland learns how Sepaton backs up and deduplicates massive data volumes while maintaining the industry's fastest performance - all in...
- Enterprise File Sharing: All You Need to Know
- Security. Scalability. Control. These are just some of the many benefits of enterprise cloud file-sharing that you'll discover in this KnowledgeVault, packed with...
- Bridging HTTP and FTP with FileXpress Internet Server
- What if you could take an FTP server on your internal network, and allow external users (partners or customers) to securely access it...
- MFT and FileXpress - An Overview
- Business users and applications exchange files on a regular basis. File transfer is a core part of the flow of business activity. All Government IT Webcasts