Feeds

Cybersecurity law would give feds unprecedented net control

For your own good

Seven Steps to Software Security

US senators have drafted legislation that would give the federal government unprecedented authority over the nation's critical infrastructure, including the power to shut down or limit traffic on private networks during emergencies.

The bill would also establish a broad set of cybersecurity standards that would be imposed on the government and the private sector, including companies that provide software, IT work or other services to networks that are deemed to be critical infrastructure. It would also mandate licenses for all individuals administering to strategically important networks.

The bill, which is being co-sponsored by Senate Commerce Committee chairman John Rockefeller IV and Senator Olympia Snowe, was expected to be referred to a senate committee on Wednesday. Shortly after a working draft of the legislation began circulating, some industry groups lined up to criticize it for giving the government too much control over the internet and the private companies that make it possible.

"This gives the president too much power and there's too little oversight, if there's any at all," said Gregory Nojeim, senior counsel at the Center for Democracy and Technology. "It gives him the power to act in the interest of national security, a vague term that has been broadly defined."

Nojeim was pointing to language in the bill that permits the president to "order the limitation or shutdown of internet traffic to and from any compromised federal government or United States critical infrastructure information system or network" after first declaring a national cybersecurity emergency. A separate provision allows the executive in chief to "order the disconnection of any federal government or United States critical infrastructure information systems or networks in the interest of national security."

"It applies to any critical infrastructure," Nojeim added. "Surely, the internet is one."

The bill would also require NIST, or the National Institute of Standards and Technology, to draft "measurable and auditable cybersecurity standards for all federal government, government contractor, or grantee critical infrastructure information systems and networks." The standards would govern software configuration and security and would apply to vendors, contractors and federal employees who administer nationally vital networks.

Under the legislation, it would also be illegal for employees or contractors providing "cybersecurity services to any federal agency or an information system or network designated by the president, or the president’s designee, as a critical infrastructure information system or network, who is not licensed and certified under the program."

A second bill, also co-sponsored by Rockefeller and Snowe, would establish a national cybersecurity advisor who would report directly to the president. The advisor would serve as the executive branch's lead official on all cyber matters and would coordinate with intelligence officials and civilian agencies. The bill largely codifies recommendations issued in December by more than 60 security experts in government and the private sector.

The Obama administration has outlined a master plan that largely follows those recommendations pending a 60-day review.

The bills are intended to protect a broad range of the nation's infrastructure - including networks for the country's banking industry, utilities, transportation and telecommunications - from cyber attacks.

Few security professionals doubt that critical infrastructure is vulnerable to terrorist sabotage or criminal cyber attacks that could shut down large swaths of the economy. But they also look at the government's track record in defending its own networks and worry the measures could end up making matters worse.

"There's a lot of good stuff in here, but a lot of it is easier said then done," said Tom Parker, director of commercial security services at Alexandria, Virginia-based Securicon. "My concern about the bill in general is around what has not been specified, will be interpreted and implemented. There is a lot of wiggle room in there." ®

Mobile application security vulnerability report

More from The Register

next story
Yorkshire cops fail to grasp principle behind BT Fon Wi-Fi network
'Prevent people that are passing by to hook up to your network', pleads plod
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
BMW's ConnectedDrive falls over, bosses blame upgrade snafu
Traffic flows up 20% as motorway middle lanes miraculously unclog
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Attackers raid SWISS BANKS with DNS and malware bombs
'Retefe' trojan uses clever spin on old attacks to grant total control of bank accounts
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Reducing security risks from open source software
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.