SlideShare a Scribd company logo
1 of 2
Download to read offline
ARTICLE 4/27/12 
To view the original article please click here. 
CYBERSECURITY BILL PASSES, OBAMA THREATENS VETO 
By David Goldman (CNN) 
NEW YORK (CNNMoney) — The House of Representatives, as expected, approved 
a controversial cybersecurity bill late Thursday, staring down a veto threat. But the fight to 
protect the United States from a cataclysmic cyber attack is far from over. 
The Cyber Intelligence Sharing and Protection Act, which has been revised several times over the 
past week, allows the government and private companies to share information with one another with 
the aim of warding off cyber threats. 
Companies would be incentivized to voluntarily share information with the government, and the 
United States could share crucial attack information with companies. 
The very first step would be to assess the damage that has been done to your personal computer. 
What does that mean? The very first look in the equipment needs to be to ascertain if the computer 
can still boot into Windows. This may alter things. Clearly, if your computer is not going to boot, 
your first priority is to get the computer to boot into Windows.Much of that kind of information 
sharing had previously been banned under existing privacy laws. 
The bill passed with bi-partisan support, with 42 Democrats joining 206 Republicans to pass CISPA 
248-168. That came in spite of the White House’s threat to veto the bill, citing concerns that 
the bill’s language doesn’t go far enough to protect citizens’ privacy. 
What happens next isn’t exactly clear — except for the fact that no action will likely 
happen anytime soon. That’s a concern to security advocates and intelligence officials, who 
stress that the nation remains too vulnerable to cyber threats. 
The government’s top cybersecurity advisors widely agree that cyber criminals or terrorists 
have the capability to take down the country’s critical financial, energy or communications 
infrastructure.
Such a cyber attack was already launched against Iran in the Stuxnet incident, which significantly 
delayed Iran’s nuclear program. The worm ordered the centrifuges in an Iranian nuclear 
facility to spin out of control, ultimately destroying it. 
It’s an example of how cyberwarfare is leveling the playing field. A cyber attack would be 
less difficult to pull off than a 9/11-like attack, considering it could be launched from another 
country and the attacker could remain anonymous. Yet it could have the same devastating impact if 
attackers used cyberspace to take over our infrastructure, turn off our electricity, release toxins, or 
shut down our financial system. 
Venezuela, for instance, would never try to attack the United States militarily, but Venezuelan 
diplomat Livia Antonieta Acosta Noguera launched cyber attacks here in January in an alleged 
Venezuelan plot to disable American nuclear power plants. 
“Not only did Venezuela carry it out, they thought they could get away with it,” said 
Roger Cressey, senior vice president at security consultancy Booz Allen Hamilton, at a Bloomberg 
cybersecurity conference held last week. “That says a lot.” 
If the threat is evident, the path forward is anything but. Getting CISPA or any comprehensive 
cybersecurity law passed soon faces many obstacles. 
The Obama administration prefers the Senate’s version of the bill, sponsored by Sens. Joe 
Lieberman (I-Conn.) and Susan Collins (R-Maine), which takes a regulatory approach. The Senate 
bill mandates minimum cybersecurity performance standards for private companies that control the 
nation’s critical infrastructure. 
CISPA, or one of several other cybersecurity bills passed in the House this week, would likely to be 
reconciled with the Senate bill. Yet that bill isn’t expected to even pass the Senate, let alone 
the House, due to the anti-regulatory mood currently sweeping through Congress. 
Some believe that politics will ultimately stall a bill until after the November presidential election. 
But other cybersecurity experts closely watching the legislative process expect lawmakers to 
ultimately come together in the next few months. They believe politicians can rally behind the core 
elements of the bills, including increased information sharing, enhancing law enforcement’s 
authority and reform of the existing Federal Information Security Management Act. 
“The bill that will eventually reach the president’s desk is not the one that [was passed 
by] the House,” said Larry Clinton, CEO of the Internet Security Alliance. 
“That’s understood and expected. But the core issues have broad support, and if a bill 
addresses all those issues, the president would sign it.”

More Related Content

What's hot

Cybersecurity regulation will be challenging
Cybersecurity regulation will be challengingCybersecurity regulation will be challenging
Cybersecurity regulation will be challengingJoe Orlando
 
Turkey aside
Turkey asideTurkey aside
Turkey asideDina Beer
 
Republic Act 10175 - Cyber Crime Prevention Act of 2012
Republic Act 10175 - Cyber Crime Prevention Act of 2012Republic Act 10175 - Cyber Crime Prevention Act of 2012
Republic Act 10175 - Cyber Crime Prevention Act of 2012armaexen
 
Hass & Associates Online Reviews
Hass & Associates Online ReviewsHass & Associates Online Reviews
Hass & Associates Online Reviewsaleenia23
 
Cyber Surveillance - Honors English 1 Presentation
Cyber Surveillance - Honors English 1 PresentationCyber Surveillance - Honors English 1 Presentation
Cyber Surveillance - Honors English 1 Presentationaxnv
 
Cybercrime law legality report
Cybercrime law legality reportCybercrime law legality report
Cybercrime law legality reportJonan Momo
 
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...Shawn Tuma
 
Need for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure ProtectionNeed for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure ProtectionWilliam McBorrough
 
Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011hassanzadeh20
 
Digital Security Act (DSA) 2018 in Bangladesh
Digital Security Act (DSA) 2018 in BangladeshDigital Security Act (DSA) 2018 in Bangladesh
Digital Security Act (DSA) 2018 in BangladeshMd. Mehedi Al Hasan Rakib
 
Chapter 3 Computer Crimes
Chapter 3 Computer  CrimesChapter 3 Computer  Crimes
Chapter 3 Computer CrimesMar Soriano
 
SM Chamber of Commerce TechTalk: 5 Rules of Reputation Management
SM Chamber of Commerce TechTalk: 5 Rules of Reputation ManagementSM Chamber of Commerce TechTalk: 5 Rules of Reputation Management
SM Chamber of Commerce TechTalk: 5 Rules of Reputation ManagementInternet Law Center
 
Digital security law security of individual or government
Digital security law security of individual or governmentDigital security law security of individual or government
Digital security law security of individual or governmentM S Siddiqui
 

What's hot (20)

Cybersecurity regulation will be challenging
Cybersecurity regulation will be challengingCybersecurity regulation will be challenging
Cybersecurity regulation will be challenging
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Cyber law in bangladesh
Cyber law in bangladeshCyber law in bangladesh
Cyber law in bangladesh
 
Turkey aside
Turkey asideTurkey aside
Turkey aside
 
Republic Act 10175 - Cyber Crime Prevention Act of 2012
Republic Act 10175 - Cyber Crime Prevention Act of 2012Republic Act 10175 - Cyber Crime Prevention Act of 2012
Republic Act 10175 - Cyber Crime Prevention Act of 2012
 
Hass & Associates Online Reviews
Hass & Associates Online ReviewsHass & Associates Online Reviews
Hass & Associates Online Reviews
 
Cyber Surveillance - Honors English 1 Presentation
Cyber Surveillance - Honors English 1 PresentationCyber Surveillance - Honors English 1 Presentation
Cyber Surveillance - Honors English 1 Presentation
 
Tema 5.cybersecurity
Tema 5.cybersecurityTema 5.cybersecurity
Tema 5.cybersecurity
 
Cybercrime law legality report
Cybercrime law legality reportCybercrime law legality report
Cybercrime law legality report
 
Digital security act (DSA)
Digital security act (DSA)Digital security act (DSA)
Digital security act (DSA)
 
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
 
Need for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure ProtectionNeed for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure Protection
 
Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011
 
Digital Security Act (DSA) 2018 in Bangladesh
Digital Security Act (DSA) 2018 in BangladeshDigital Security Act (DSA) 2018 in Bangladesh
Digital Security Act (DSA) 2018 in Bangladesh
 
Cyber2
Cyber2Cyber2
Cyber2
 
Chapter 3 Computer Crimes
Chapter 3 Computer  CrimesChapter 3 Computer  Crimes
Chapter 3 Computer Crimes
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
SM Chamber of Commerce TechTalk: 5 Rules of Reputation Management
SM Chamber of Commerce TechTalk: 5 Rules of Reputation ManagementSM Chamber of Commerce TechTalk: 5 Rules of Reputation Management
SM Chamber of Commerce TechTalk: 5 Rules of Reputation Management
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Digital security law security of individual or government
Digital security law security of individual or governmentDigital security law security of individual or government
Digital security law security of individual or government
 

Similar to ARTICLE 4/27/12

Securing Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay RobertsonSecuring Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay RobertsonEljay Robertson
 
Senate homeland security and commerce
Senate homeland security and commerceSenate homeland security and commerce
Senate homeland security and commerceAbegail Roberts
 
Marriage of Cyber Security with Emergency Management -- NEMA
Marriage of Cyber Security with Emergency Management  --  NEMAMarriage of Cyber Security with Emergency Management  --  NEMA
Marriage of Cyber Security with Emergency Management -- NEMADavid Sweigert
 
A1 - Cibersegurança - Raising the Bar for Cybersecurity
A1 - Cibersegurança - Raising the Bar for CybersecurityA1 - Cibersegurança - Raising the Bar for Cybersecurity
A1 - Cibersegurança - Raising the Bar for CybersecuritySpark Security
 
The Federal Government's Track Record on Cybersecurity and Critical Infrastru...
The Federal Government's Track Record on Cybersecurity and Critical Infrastru...The Federal Government's Track Record on Cybersecurity and Critical Infrastru...
The Federal Government's Track Record on Cybersecurity and Critical Infrastru...- Mark - Fullbright
 
051309 Federal Interest And Social Security Metanomics Transcript
051309 Federal Interest And Social Security Metanomics Transcript051309 Federal Interest And Social Security Metanomics Transcript
051309 Federal Interest And Social Security Metanomics TranscriptRemedy Communications
 
December ISSA Meeting Executive Security Presentation
December ISSA Meeting   Executive Security PresentationDecember ISSA Meeting   Executive Security Presentation
December ISSA Meeting Executive Security Presentationwhmillerjr
 
Cyber Warfare: Can business trust the government to protect them?
Cyber Warfare: Can business trust the government to protect them?Cyber Warfare: Can business trust the government to protect them?
Cyber Warfare: Can business trust the government to protect them?Jason Fernandes
 
The Future of National and International Security on the Internet
The Future of National and International Security on the InternetThe Future of National and International Security on the Internet
The Future of National and International Security on the InternetMaurice Dawson
 
Cyberdefense strategy - Boston Global Forum - 2017
Cyberdefense strategy - Boston Global Forum - 2017Cyberdefense strategy - Boston Global Forum - 2017
Cyberdefense strategy - Boston Global Forum - 2017NgocHaBui1
 
Understanding the Methods behind Cyber Terrorism
Understanding the Methods behind Cyber TerrorismUnderstanding the Methods behind Cyber Terrorism
Understanding the Methods behind Cyber TerrorismMaurice Dawson
 

Similar to ARTICLE 4/27/12 (20)

Terrorist Cyber Attacks
Terrorist Cyber AttacksTerrorist Cyber Attacks
Terrorist Cyber Attacks
 
Securing Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay RobertsonSecuring Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay Robertson
 
Cyber-Terrorism Essay
Cyber-Terrorism EssayCyber-Terrorism Essay
Cyber-Terrorism Essay
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
 
Senate homeland security and commerce
Senate homeland security and commerceSenate homeland security and commerce
Senate homeland security and commerce
 
Marriage of Cyber Security with Emergency Management -- NEMA
Marriage of Cyber Security with Emergency Management  --  NEMAMarriage of Cyber Security with Emergency Management  --  NEMA
Marriage of Cyber Security with Emergency Management -- NEMA
 
Cyber Terrorism Essay
Cyber Terrorism EssayCyber Terrorism Essay
Cyber Terrorism Essay
 
A1 - Cibersegurança - Raising the Bar for Cybersecurity
A1 - Cibersegurança - Raising the Bar for CybersecurityA1 - Cibersegurança - Raising the Bar for Cybersecurity
A1 - Cibersegurança - Raising the Bar for Cybersecurity
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Cyberterrorism Essays
Cyberterrorism EssaysCyberterrorism Essays
Cyberterrorism Essays
 
28658043 cyber-terrorism
28658043 cyber-terrorism28658043 cyber-terrorism
28658043 cyber-terrorism
 
Cyber law and cyber-crime
Cyber law and cyber-crimeCyber law and cyber-crime
Cyber law and cyber-crime
 
The Federal Government's Track Record on Cybersecurity and Critical Infrastru...
The Federal Government's Track Record on Cybersecurity and Critical Infrastru...The Federal Government's Track Record on Cybersecurity and Critical Infrastru...
The Federal Government's Track Record on Cybersecurity and Critical Infrastru...
 
051309 Federal Interest And Social Security Metanomics Transcript
051309 Federal Interest And Social Security Metanomics Transcript051309 Federal Interest And Social Security Metanomics Transcript
051309 Federal Interest And Social Security Metanomics Transcript
 
December ISSA Meeting Executive Security Presentation
December ISSA Meeting   Executive Security PresentationDecember ISSA Meeting   Executive Security Presentation
December ISSA Meeting Executive Security Presentation
 
Cyber Warfare: Can business trust the government to protect them?
Cyber Warfare: Can business trust the government to protect them?Cyber Warfare: Can business trust the government to protect them?
Cyber Warfare: Can business trust the government to protect them?
 
Cyber Warfare
Cyber WarfareCyber Warfare
Cyber Warfare
 
The Future of National and International Security on the Internet
The Future of National and International Security on the InternetThe Future of National and International Security on the Internet
The Future of National and International Security on the Internet
 
Cyberdefense strategy - Boston Global Forum - 2017
Cyberdefense strategy - Boston Global Forum - 2017Cyberdefense strategy - Boston Global Forum - 2017
Cyberdefense strategy - Boston Global Forum - 2017
 
Understanding the Methods behind Cyber Terrorism
Understanding the Methods behind Cyber TerrorismUnderstanding the Methods behind Cyber Terrorism
Understanding the Methods behind Cyber Terrorism
 

ARTICLE 4/27/12

  • 1. ARTICLE 4/27/12 To view the original article please click here. CYBERSECURITY BILL PASSES, OBAMA THREATENS VETO By David Goldman (CNN) NEW YORK (CNNMoney) — The House of Representatives, as expected, approved a controversial cybersecurity bill late Thursday, staring down a veto threat. But the fight to protect the United States from a cataclysmic cyber attack is far from over. The Cyber Intelligence Sharing and Protection Act, which has been revised several times over the past week, allows the government and private companies to share information with one another with the aim of warding off cyber threats. Companies would be incentivized to voluntarily share information with the government, and the United States could share crucial attack information with companies. The very first step would be to assess the damage that has been done to your personal computer. What does that mean? The very first look in the equipment needs to be to ascertain if the computer can still boot into Windows. This may alter things. Clearly, if your computer is not going to boot, your first priority is to get the computer to boot into Windows.Much of that kind of information sharing had previously been banned under existing privacy laws. The bill passed with bi-partisan support, with 42 Democrats joining 206 Republicans to pass CISPA 248-168. That came in spite of the White House’s threat to veto the bill, citing concerns that the bill’s language doesn’t go far enough to protect citizens’ privacy. What happens next isn’t exactly clear — except for the fact that no action will likely happen anytime soon. That’s a concern to security advocates and intelligence officials, who stress that the nation remains too vulnerable to cyber threats. The government’s top cybersecurity advisors widely agree that cyber criminals or terrorists have the capability to take down the country’s critical financial, energy or communications infrastructure.
  • 2. Such a cyber attack was already launched against Iran in the Stuxnet incident, which significantly delayed Iran’s nuclear program. The worm ordered the centrifuges in an Iranian nuclear facility to spin out of control, ultimately destroying it. It’s an example of how cyberwarfare is leveling the playing field. A cyber attack would be less difficult to pull off than a 9/11-like attack, considering it could be launched from another country and the attacker could remain anonymous. Yet it could have the same devastating impact if attackers used cyberspace to take over our infrastructure, turn off our electricity, release toxins, or shut down our financial system. Venezuela, for instance, would never try to attack the United States militarily, but Venezuelan diplomat Livia Antonieta Acosta Noguera launched cyber attacks here in January in an alleged Venezuelan plot to disable American nuclear power plants. “Not only did Venezuela carry it out, they thought they could get away with it,” said Roger Cressey, senior vice president at security consultancy Booz Allen Hamilton, at a Bloomberg cybersecurity conference held last week. “That says a lot.” If the threat is evident, the path forward is anything but. Getting CISPA or any comprehensive cybersecurity law passed soon faces many obstacles. The Obama administration prefers the Senate’s version of the bill, sponsored by Sens. Joe Lieberman (I-Conn.) and Susan Collins (R-Maine), which takes a regulatory approach. The Senate bill mandates minimum cybersecurity performance standards for private companies that control the nation’s critical infrastructure. CISPA, or one of several other cybersecurity bills passed in the House this week, would likely to be reconciled with the Senate bill. Yet that bill isn’t expected to even pass the Senate, let alone the House, due to the anti-regulatory mood currently sweeping through Congress. Some believe that politics will ultimately stall a bill until after the November presidential election. But other cybersecurity experts closely watching the legislative process expect lawmakers to ultimately come together in the next few months. They believe politicians can rally behind the core elements of the bills, including increased information sharing, enhancing law enforcement’s authority and reform of the existing Federal Information Security Management Act. “The bill that will eventually reach the president’s desk is not the one that [was passed by] the House,” said Larry Clinton, CEO of the Internet Security Alliance. “That’s understood and expected. But the core issues have broad support, and if a bill addresses all those issues, the president would sign it.”