Feeds

Cybersecurity law would give feds unprecedented net control

For your own good

SANS - Survey on application security programs

US senators have drafted legislation that would give the federal government unprecedented authority over the nation's critical infrastructure, including the power to shut down or limit traffic on private networks during emergencies.

The bill would also establish a broad set of cybersecurity standards that would be imposed on the government and the private sector, including companies that provide software, IT work or other services to networks that are deemed to be critical infrastructure. It would also mandate licenses for all individuals administering to strategically important networks.

The bill, which is being co-sponsored by Senate Commerce Committee chairman John Rockefeller IV and Senator Olympia Snowe, was expected to be referred to a senate committee on Wednesday. Shortly after a working draft of the legislation began circulating, some industry groups lined up to criticize it for giving the government too much control over the internet and the private companies that make it possible.

"This gives the president too much power and there's too little oversight, if there's any at all," said Gregory Nojeim, senior counsel at the Center for Democracy and Technology. "It gives him the power to act in the interest of national security, a vague term that has been broadly defined."

Nojeim was pointing to language in the bill that permits the president to "order the limitation or shutdown of internet traffic to and from any compromised federal government or United States critical infrastructure information system or network" after first declaring a national cybersecurity emergency. A separate provision allows the executive in chief to "order the disconnection of any federal government or United States critical infrastructure information systems or networks in the interest of national security."

"It applies to any critical infrastructure," Nojeim added. "Surely, the internet is one."

The bill would also require NIST, or the National Institute of Standards and Technology, to draft "measurable and auditable cybersecurity standards for all federal government, government contractor, or grantee critical infrastructure information systems and networks." The standards would govern software configuration and security and would apply to vendors, contractors and federal employees who administer nationally vital networks.

Under the legislation, it would also be illegal for employees or contractors providing "cybersecurity services to any federal agency or an information system or network designated by the president, or the president’s designee, as a critical infrastructure information system or network, who is not licensed and certified under the program."

A second bill, also co-sponsored by Rockefeller and Snowe, would establish a national cybersecurity advisor who would report directly to the president. The advisor would serve as the executive branch's lead official on all cyber matters and would coordinate with intelligence officials and civilian agencies. The bill largely codifies recommendations issued in December by more than 60 security experts in government and the private sector.

The Obama administration has outlined a master plan that largely follows those recommendations pending a 60-day review.

The bills are intended to protect a broad range of the nation's infrastructure - including networks for the country's banking industry, utilities, transportation and telecommunications - from cyber attacks.

Few security professionals doubt that critical infrastructure is vulnerable to terrorist sabotage or criminal cyber attacks that could shut down large swaths of the economy. But they also look at the government's track record in defending its own networks and worry the measures could end up making matters worse.

"There's a lot of good stuff in here, but a lot of it is easier said then done," said Tom Parker, director of commercial security services at Alexandria, Virginia-based Securicon. "My concern about the bill in general is around what has not been specified, will be interpreted and implemented. There is a lot of wiggle room in there." ®

Combat fraud and increase customer satisfaction

More from The Register

next story
Parent gabfest Mumsnet hit by SSL bug: My heart bleeds, grins hacker
Natter-board tells middle-class Britain to purée its passwords
Obama allows NSA to exploit 0-days: report
If the spooks say they need it, they get it
Web data BLEEDOUT: Users to feel the pain as Heartbleed bug revealed
Vendors and ISPs have work to do updating firmware - if it's possible to fix this
Samsung Galaxy S5 fingerprint scanner hacked in just 4 DAYS
Sammy's newbie cooked slower than iPhone, also costs more to build
Mounties always get their man: Heartbleed 'hacker', 19, CUFFED
Canadian teen accused of raiding tax computers using OpenSSL bug
Snowden-inspired crypto-email service Lavaboom launches
German service pays tribute to Lavabit
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
prev story

Whitepapers

Designing a defence for mobile apps
In this whitepaper learn the various considerations for defending mobile applications; from the mobile application architecture itself to the myriad testing technologies needed to properly assess mobile applications risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.