Democratic Underground Latest Greatest Lobby Journals Search Options Help Login
Google

does anybody know anything about a Cyber Security Act, SB 773?

Printer-friendly format Printer-friendly format
Printer-friendly format Email this thread to a friend
Printer-friendly format Bookmark this thread
This topic is archived.
Home » Discuss » Archives » General Discussion (1/22-2007 thru 12/14/2010) Donate to DU
 
Kali Donating Member (1000+ posts) Send PM | Profile | Ignore Sun Aug-30-09 10:57 AM
Original message
does anybody know anything about a Cyber Security Act, SB 773?
Got an e-mail from someone that leans right, and most of what google is turning up seems similar but I'm not familiar with all the "sources" or blogs that are commenting on it - is this just a case of the right only getting paranoid that giving too much power to the executive branch is not a good idea when it's not your guy, or is it something EVERYBODY should be concerned about?
Printer Friendly | Permalink |  | Top
pinto Donating Member (1000+ posts) Send PM | Profile | Ignore Sun Aug-30-09 11:21 AM
Response to Original message
1. Here's some of the pending bill info. ( from http://thomas.loc.gov)
S.773

Title: A bill to ensure the continued free flow of commerce within the United States and with its global trading partners through secure cyber communications, to provide for the continued development and exploitation of the Internet and intranet communications for such purposes, to provide for the development of a cadre of information technology specialists to improve and maintain effective cybersecurity defenses against disruption, and for other purposes.

Sponsor: Sen Rockefeller, John D., IV (introduced 4/1/2009) Cosponsors (3)

Latest Major Action: 4/1/2009 Referred to Senate committee. Status: Read twice and referred to the Committee on Commerce, Science, and Transportation.

<snip>

SEC. 2. FINDINGS.

The Congress finds the following:

(1) America's failure to protect cyberspace is one of the most urgent national security problems facing the country.

(2) Since intellectual property is now often stored in digital form, industrial espionage that exploits weak cybersecurity dilutes our investment in innovation while subsidizing the research and development efforts of foreign competitors. In the new global competition, where economic strength and technological leadership are vital components of national power, failing to secure cyberspace puts us at a disadvantage.

(3) According to the 2009 Annual Threat Assessment, `a successful cyber attack against a major financial service provider could severely impact the national economy, while cyber attacks against physical infrastructure computer systems such as those that control power grids or oil refineries have the potential to disrupt services for hours or weeks' and that `Nation states and criminals target our government and private sector information networks to gain competitive advantage in the commercial sector.'.

(4) The Director of National Intelligence testified before the Congress on February 19, 2009, that `a growing array of state and non-state adversaries are increasingly targeting-for exploitation and potentially disruption or destruction-our information infrastructure, including the Internet, telecommunications networks, computer systems, and embedded processors and controllers in critical industries' and these trends are likely to continue.

(5) John Brennan, the Assistant to the President for Homeland Security and Counterterrorism wrote on March 2, 2009, that `our nation's security and economic prosperity depend on the security, stability, and integrity of communications and information infrastructure that are largely privately-owned and globally-operated.'.

(6) Paul Kurtz, a Partner and chief operating officer of Good Harbor Consulting as well as a senior advisor to the Obama Transition Team for cybersecurity, recently stated that the United States is unprepared to respond to a `cyber-Katrina' and that `a massive cyber disruption could have a cascading, long-term impact without adequate co-ordination between government and the private sector.'.

(7) The Cyber Strategic Inquiry 2008, sponsored by Business Executives for National Security and executed by Booz Allen Hamilton, recommended to `establish a single voice for cybersecurity within government' concluding that the `unique nature of cybersecurity requires a new leadership paradigm.'.

(8) Alan Paller, the Director of Research at the SANS Institute, testified before the Congress that `the fight against cybercrime resembles an arms race where each time the defenders build a new wall, the attackers create new tools to scale the wall. What is particularly important in this analogy is that, unlike conventional warfare where deployment takes time and money and is quite visible, in the cyber world, when the attackers find a new weapon, they can attack millions of computers, and successfully infect hundreds of thousands, in a few hours or days, and remain completely hidden.'.

(9) According to the February 2003 National Strategy to Secure Cyberspace, `our nation's critical infrastructures are composed of public and private institutions in the sectors of agriculture, food, water, public health, emergency services, government, defense industrial base, information and telecommunications, energy, transportation, banking finance, chemicals and hazardous materials, and postal and shipping. Cyberspace is their nervous system--the control system of our country' and that `the cornerstone of America's cyberspace security strategy is and will remain a public-private partnership.'.

(10) According to the National Journal, Mike McConnell, the former Director of National Intelligence, told President Bush in May 2007 that if the 9/11 attackers had chosen computers instead of airplanes as their weapons and had waged a massive assault on a U.S. bank, the economic consequences would have been `an order of magnitude greater' than those cased by the physical attack on the World Trade Center. Mike McConnell has subsequently referred to cybersecurity as the `soft underbelly of this country.'.

(11) The Center for Strategic and International Studies report on Cybersecurity for the 44th Presidency concluded that (A) cybersecurity is now a major national security problem for the United States, (B) decisions and actions must respect privacy and civil liberties, and (C) only a comprehensive national security strategy that embraces both the domestic and international aspects of cybersecurity will make us more secure. The report continued stating that the United States faces `a long-term challenge in cyberspace from foreign intelligence agencies and militaries, criminals, and others, and that losing this struggle will wreak serious damage on the economic health and national security of the United States.'.

(12) James Lewis, Director and Senior Fellow, Technology and Public Policy Program, Center for Strategic and International Studies, testified on behalf of the Center for Strategic and International Studies that `the United States is not organized and lacks a coherent national strategy for addressing' cybersecurity.

(13) President Obama said in a speech at Purdue University on July 16, 2008, that `every American depends--directly or indirectly--on our system of information networks. They are increasingly the backbone of our economy and our infrastructure; our national security and our personal well-being. But it's no secret that terrorists could use our computer networks to deal us a crippling blow. We know that cyber-espionage and common crime is already on the rise. And yet while countries like China have been quick to recognize this change, for the last eight years we have been dragging our feet.' Moreover, President Obama stated that `we need to build the capacity to identify, isolate, and respond to any cyber-attack.'.

(14) The President's Information Technology Advisory Committee reported in 2005 that software is a major vulnerability and that `software development methods that have been the norm fail to provide the high-quality, reliable, and secure software that the IT infrastructure requires. . . . Today, as with cancer, vulnerable software can be invaded and modified to cause damage to previously healthy software, and infected software can replicate itself and be carried across networks to cause damage in other systems.'.

<snip>

SUMMARY AS OF:
4/1/2009--Introduced.

Cybersecurity Act of 2009 - Directs the President to establish or designate a Cybersecurity Advisory Panel to advise the President.

Defines "cyber" as: (1) any process, program, or protocol relating to the use of the Internet or an intranet, automatic data processing or transmission, or telecommunication via the Internet or an intranet; and (2) any matter relating to, or involving the use of, computers or computer networks.


Directs the Secretary of Commerce to: (1) develop and implement a system to provide cybersecurity status and vulnerability information regarding all federal information systems and networks managed by the Department of Commerce; and (2) provide financial assistance for the creation and support of Regional Cybersecurity Centers for small and medium sized U.S. businesses.

Requires the National Institute of Standards and Technology (NIST) to establish cybersecurity standards for all federal government, government contractor, or grantee critical infrastructure information systems and networks.

Makes NIST responsible for U.S. representation in all international cybersecurity standards development.

Directs the Secretary to develop or coordinate a national licensing, certification, and recertification program for cybersecurity professionals and makes it unlawful to provide certain cybersecurity services without being licensed and certified.

Requires Advisory Panel approval for renewal or modification of a contract related to the operation of the Internet Assigned Numbers Authority.

Requires development of a strategy to implement a secure domain name addressing system.

Requires the National Science Foundation (NSF) to support specified types of research and to establish a program of grants to higher education institutions to establish cybersecurity testbeds.

Amends the Cybersecurity Research and Development Act to expand the purposes of an existing program of computer and network security research grants.

Requires the NSF to establish a Federal Cyber Scholarship-for-Service program.

Requires NIST to establish cybersecurity competitions and challenges to recruit talented individuals for the federal information technology workforce and stimulate innovation.

Requires the Department of Commerce to serve as the clearinghouse of cybersecurity threat and vulnerability information. Grants the Secretary access to all relevant data concerning such networks notwithstanding any law or policy restricting access.

Directs the President to: (1) develop and implement a comprehensive national cybersecurity strategy; (2) on a quadrennial basis, complete a review of the cyber posture of the United States; and (3) work with representatives of foreign governments to develop norms, organizations, and other cooperative activities for international engagement to improve cybersecurity.

Requires the Director of National Intelligence and the Secretary of Commerce to submit to Congress an annual report on cybersecurity threats to and vulnerabilities of critical national information, communication, and data network infrastructure.

Establishes a Secure Products and Services Acquisitions Board to review and approve high value products and services acquisition and establish validation standards for software to be acquired by the federal government.


--------------------------------------------------------------------------------
MAJOR ACTIONS: ***NONE***


--------------------------------------------------------------------------------
ALL ACTIONS: 4/1/2009:
Read twice and referred to the Committee on Commerce, Science, and Transportation.

--------------------------------------------------------------------------------
TITLE(S): (italics indicate a title for a portion of a bill)
***NONE***


--------------------------------------------------------------------------------
COSPONSORS(3), ALPHABETICAL : (Sort: by date)

Sen Bayh, Evan - 4/2/2009 Sen Nelson, Bill - 4/1/2009
Sen Snowe, Olympia J. - 4/1/2009

--------------------------------------------------------------------------------
COMMITTEE(S):

Committee/Subcommittee: Activity:
Senate Commerce, Science, and Transportation Referral, In Committee


more at http://thomas.loc.gov
Printer Friendly | Permalink |  | Top
 
Kali Donating Member (1000+ posts) Send PM | Profile | Ignore Sun Aug-30-09 03:49 PM
Response to Reply #1
2. saw that, thanks
I was kind of wondering what people's feelings were in regards to the power to control (shut down) being "given" to the president.
Printer Friendly | Permalink |  | Top
 
Shandris Donating Member (1000+ posts) Send PM | Profile | Ignore Sun Aug-30-09 04:08 PM
Response to Reply #2
3. From what I understand its a rehashing of power...
...that the President already has, just in a more concrete, written form. Power Grids are the oft-used example, if a sufficiently-large and threatening attack were originating from a particular place they could order it sealed off to cease the attack, for instance. That's part of protecting the nation. However, with that said I'm somewhat of a person who doesn't like expanding power, and the vagueness of this and most internet-related bills often falls far from the intended mark.

So my final take on it for the moment is this: Be aware of it, be ready for it, and watch it as it passes through committee. I'm sure large chunks will get rewritten/pared down/removed, but what emerges mustn't contain vagaries of language that a future President can...'interpret'...in clever ways.
Printer Friendly | Permalink |  | Top
 
Kali Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Aug-31-09 12:16 PM
Response to Reply #3
4. that was my impression and your take on it is about what I would say, too.
thanks
Printer Friendly | Permalink |  | Top
 
thecrow Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Aug-31-09 01:16 PM
Response to Reply #4
5. President Clinton had a committe on security
and cyber security was part of that.
I sort of know John Powers, who was the head of FEMA for awhile and he was on the commission, called PCCIP or the
President's Commission of Critical Infrastructure Protection and it was formed to ward off or be able to fix attacks
by terrorism or natural disasters on our infrastructure.
You can find information on the commission at Google:
http://www.google.com/search?sourceid=navclient&aq=1&oq=pccip&ie=UTF-8&rlz=1T4GFRE_enUS324US324&q=pccip+report

Obama's iniative is similar to this PCCIP.
Printer Friendly | Permalink |  | Top
 
DU AdBot (1000+ posts) Click to send private message to this author Click to view 
this author's profile Click to add 
this author to your buddy list Click to add 
this author to your Ignore list Mon Apr 29th 2024, 02:03 PM
Response to Original message
Advertisements [?]
 Top

Home » Discuss » Archives » General Discussion (1/22-2007 thru 12/14/2010) Donate to DU

Powered by DCForum+ Version 1.1 Copyright 1997-2002 DCScripts.com
Software has been extensively modified by the DU administrators


Important Notices: By participating on this discussion board, visitors agree to abide by the rules outlined on our Rules page. Messages posted on the Democratic Underground Discussion Forums are the opinions of the individuals who post them, and do not necessarily represent the opinions of Democratic Underground, LLC.

Home  |  Discussion Forums  |  Journals |  Store  |  Donate

About DU  |  Contact Us  |  Privacy Policy

Got a message for Democratic Underground? Click here to send us a message.

© 2001 - 2011 Democratic Underground, LLC