recommended reading

GOP Senators assail White House for pushing executive order on cybersecurity

Sens. Saxby Chambliss, R-Ga., and John McCain, R-Ariz., co-wrote the piece with Sen. Kay Bailey Hutchison, R-Texas.

Sens. Saxby Chambliss, R-Ga., and John McCain, R-Ariz., co-wrote the piece with Sen. Kay Bailey Hutchison, R-Texas. // J. Scott Applewhite/AP file photo

Top Republican critics of a White House-backed Senate cybersecurity bill on Thursday criticized the White House’s threat to issue an executive order on the issue.

Sens. John McCain, R-Ariz., Kay Bailey Hutchison, R-Texas, and Saxby Chambliss, R-Ga., penned a Wall Street Journal op-ed decrying White House plans to “tighten the government's grip.”

No final decision on an executive order has been made, but the White House has said issuing one is among the options possible if Congress remains deadlocked on the cybersecurity legislation. “An executive order is one of a number of measures we’re considering as we look to implement the president’s direction to do absolutely everything we can to better protect our nation against today’s cyberthreats,” Caitlin Hayden, spokeswoman for President Obama’s National Security Council, said in a statement.

The White House wants more authority to enforce security standards for a limited number of the most critical private computer networks, like those that control the electric grid or chemical plants, but Republicans say that would lead to cumbersome and expensive regulations for businesses.

“Unilateral action in the form of government mandates on the private sector creates an adversarial relationship instead of a cooperative one,” the GOP senators wrote.

The senators and the White House agree that an executive order couldn’t accomplish everything needed to boost cybersecurity. Legislation is needed to revise privacy laws and allow businesses to share more cyberthreat information with each other and the government.

“Cybersecurity is a priority, but anything less than a strong information-sharing bill, based on policies that enhance national security and the economy, will fall short,” the trio wrote.

Privacy groups have raised concerns about information-sharing provisions considered in Congress, but the Republican critics say Democrats' information-sharing proposals go too far to protect privacy by restricting cyber information from being used for other national-security purposes.

“What the country cannot afford is to build bureaucratic walls around information once it is shared with the federal government,” the senators wrote. “The 9/11 Commission was clear about providing government agencies with the ability to speak to each other about the threats facing all aspects of our security.”

Many Democrats have called on Obama to move forward with an executive order. Thursday’s op-ed was not the first time Republicans have opposed such a move. On Tuesday, the anniversary of the Sept. 11, 2001, terror attacks, Sen. Dan Coats, R-Ind., also criticized the idea of unilateral White House action.

Threatwatch Alert

Network intrusion / Spear-phishing

Researchers: Bank-Targeting Malware Sales Rise in Dark Web Markets

See threatwatch report

JOIN THE DISCUSSION

Close [ x ] More from Nextgov
 
 

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.