Feeds

Cybersecurity law would give feds unprecedented net control

For your own good

Beginner's guide to SSL certificates

US senators have drafted legislation that would give the federal government unprecedented authority over the nation's critical infrastructure, including the power to shut down or limit traffic on private networks during emergencies.

The bill would also establish a broad set of cybersecurity standards that would be imposed on the government and the private sector, including companies that provide software, IT work or other services to networks that are deemed to be critical infrastructure. It would also mandate licenses for all individuals administering to strategically important networks.

The bill, which is being co-sponsored by Senate Commerce Committee chairman John Rockefeller IV and Senator Olympia Snowe, was expected to be referred to a senate committee on Wednesday. Shortly after a working draft of the legislation began circulating, some industry groups lined up to criticize it for giving the government too much control over the internet and the private companies that make it possible.

"This gives the president too much power and there's too little oversight, if there's any at all," said Gregory Nojeim, senior counsel at the Center for Democracy and Technology. "It gives him the power to act in the interest of national security, a vague term that has been broadly defined."

Nojeim was pointing to language in the bill that permits the president to "order the limitation or shutdown of internet traffic to and from any compromised federal government or United States critical infrastructure information system or network" after first declaring a national cybersecurity emergency. A separate provision allows the executive in chief to "order the disconnection of any federal government or United States critical infrastructure information systems or networks in the interest of national security."

"It applies to any critical infrastructure," Nojeim added. "Surely, the internet is one."

The bill would also require NIST, or the National Institute of Standards and Technology, to draft "measurable and auditable cybersecurity standards for all federal government, government contractor, or grantee critical infrastructure information systems and networks." The standards would govern software configuration and security and would apply to vendors, contractors and federal employees who administer nationally vital networks.

Under the legislation, it would also be illegal for employees or contractors providing "cybersecurity services to any federal agency or an information system or network designated by the president, or the president’s designee, as a critical infrastructure information system or network, who is not licensed and certified under the program."

A second bill, also co-sponsored by Rockefeller and Snowe, would establish a national cybersecurity advisor who would report directly to the president. The advisor would serve as the executive branch's lead official on all cyber matters and would coordinate with intelligence officials and civilian agencies. The bill largely codifies recommendations issued in December by more than 60 security experts in government and the private sector.

The Obama administration has outlined a master plan that largely follows those recommendations pending a 60-day review.

The bills are intended to protect a broad range of the nation's infrastructure - including networks for the country's banking industry, utilities, transportation and telecommunications - from cyber attacks.

Few security professionals doubt that critical infrastructure is vulnerable to terrorist sabotage or criminal cyber attacks that could shut down large swaths of the economy. But they also look at the government's track record in defending its own networks and worry the measures could end up making matters worse.

"There's a lot of good stuff in here, but a lot of it is easier said then done," said Tom Parker, director of commercial security services at Alexandria, Virginia-based Securicon. "My concern about the bill in general is around what has not been specified, will be interpreted and implemented. There is a lot of wiggle room in there." ®

Intelligent flash storage arrays

More from The Register

next story
You really need to do some tech support for Aunty Agnes
Free anti-virus software, expires, stops updating and p0wns the world
Attack reveals 81 percent of Tor users but admins call for calm
Cisco Netflow a handy tool for cheapskate attackers
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
Oi, Europe! Tell US feds to GTFO of our servers, say Microsoft and pals
By writing a really angry letter about how it's harming our cloud business, ta
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
5 critical considerations for enterprise cloud backup
Key considerations when evaluating cloud backup solutions to ensure adequate protection security and availability of enterprise data.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.