recommended reading

Cybersecurity bill signing still being delayed

AP file photo

After years of work, backers of the sweeping Cybersecurity Act of 2012 say they’re eager for Senate debate on the bill, but divisions over privacy and regulation show little sign of abating.

This was supposed to be the bill that got everyone on board. But its sponsors are back at the drawing board with Republicans, who say the bill would create too much government regulation; and with civil-liberties groups and some Democrats, who say the proposal could run roughshod over privacy laws.

The Cybersecurity Act was originally supposed to be up in the first working period of 2012. Senate staffers are currently eyeing the second or third week in June for floor debate on the legislation, which has the backing of the White House and Senate Democratic leaders.

The Senate Homeland Security and Governmental Affairs Committee has introduced broad cybersecurity legislation annually for the past several years, with little to show for it. Orchestrated by Majority Leader Harry Reid, D-Nev., a multi-committee, bipartisan working-group process was supposed to break the stalemate and deliver an omnibus bill.

That was the Cybersecurity Act of 2012, rolled out with much fanfare in February. Reid said he wanted it on the floor in the first working weeks of the session, but more than half a dozen GOP committee leaders criticized the measure and the process that produced it.

The act would increase government oversight of some private networks, such as electric grids, water systems, and transportation, that could be at risk from cyberattack. The  Homeland Security Department would decide which businesses should be considered part of critical infrastructure.

Cyberthreats are expanding on a weekly basis, said Homeland Security Committee spokeswoman Leslie Phillips, who pointed to the recently discovered Flame virus as the latest example. “The threat is upon us,” she said. “Congress needs to pass legislation to strengthen the security of vulnerable networks now.”

A chief critic of the legislation, Senate Armed Services Committee ranking member John McCain, R-Ariz., said last week that he has made no headway in resolving disagreements over how far the government should go to protect private networks, and over which government agencies should take the lead.

McCain and other GOP committee leaders introduced their own cybersecurity bill, the Strengthening and Enhancing Cybersecurity by Using Research, Education, Information, and Technology Act, or the Secure IT Act. It would allow businesses to voluntarily share information about cyberthreats; limit liability for companies that take steps to protect their networks; restrict the type of information that can be shared, to protect privacy; and reform federal cybersecurity standards.

On the other side of the aisle, Sen. Ron Wyden, D-Ore., worries that proposals to encourage information-sharing on cyberthreats could undermine privacy and open the door to a “dystopian” system of tracking Internet traffic for future crimes. “These bills allow law-enforcement agencies to mine Internet users’ personal data for evidence of acts entirely unrelated to cybersecurity,” he said in a floor speech last week.

Wyden, who filibustered an online-piracy bill earlier this year, said he hasn’t decided how far he’ll go to protest the provisions in cybersecurity legislation, but his opposition gives a glimpse of the headache that Senate Democrats face as they try to gather votes.

The privacy flap is déjà vu for Homeland Security Chairman Joe Lieberman, I-Conn., and his cosponsors, who are meeting with civil-liberties groups that oppose the Cybersecurity Act on privacy grounds. A year ago, Lieberman and his allies revised another cybersecurity proposal in response to critics who said it could give the president the power to shut down the Internet.

Michelle Richardson, a lawyer with the American Civil Liberties Union, said her group is withholding judgment until it can work out potential changes with members of Congress, but she said she is hoping to see substantial revisions. A limited cybersecurity information-sharing bill, the Cyber Intelligence Sharing and Protection Act, passed the House with a bipartisan vote in April despite privacy concerns. But the White House threatened to veto it, and it is not expected to be considered in the Senate anytime soon.

Threatwatch Alert

Network intrusion / Stolen credentials

85M User Accounts Compromised from Video-sharing Site Dailymotion

See threatwatch report


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security


When you download a report, your information may be shared with the underwriters of that document.