SlideShare a Scribd company logo
Michael Fertik on KTRH Houston<br />Oct 26, 2009<br />The Cybersecurity Act of 2009 gives the President the power to declare a “cyber emergency” and to shut down servers in the private sector to prevent “cyber attacks.” ReputationDefender CEO Michael Fertik discusses why the 55-page bill is too vague and what additions could improve it.<br />KTRH Houston: A bill that spells out the President’s authority to act decisively in the event of a cyber attack is stirring up controversy. The bill gives the President authority to seize control over the Internet and disconnect private sector computers from the World Wide Web during an emergency that involves cyber attacks. Internet entrepreneur and CEO of ReputationDefender, Michael Fertik, is joining us now live to talk more about this. Does this strike you as something the President needs to have in his quiver of, I guess you would say, national defense arrows?<br />Michael Fertik: Well, you know it does seem reasonable to have protection against and a device to fight against cyber attacks, which are a real threat, but this bill is too vague as to what constitutes a cyber threat, and that’s the controversial part of the bill. <br />Let me begin by describing the non-controversial part of the bill. So, the bill encourages and requires the federal agencies, for example, to improve their cyber security. We all want that to happen, the Veterans Administration and other federal agencies have had problems with data loss and identity theft in the recent past, and we’re a little bit behind the ball and out to lunch on our national cyber security for the federal agencies. That’s the part, among others, that is not controversial in this legislation. The part that is worrisome is that the bill gives very broad power to the President to declare a cyber emergency and then to direct Internet traffic, to unplug certain parts of private access to the Internet, and otherwise to examine data packets that are travelling through the web almost without review, and to do so when the President considers there to be a cyber emergency. The bill does not define what constitutes a threat grave enough to declare an emergency. <br />So there’s a big omission here. There have been, in the past, times when Congress has declared emergencies that have allowed the President to take very extraordinary action to protect vital assets to the military or to the economy. For example, in World War I and World War II certain assets like railroads and coal mines were declared to be vital and therefore subject to certain public control during the course of the war, and therefore the President’s control. This bill, by contrast, gives the President sole and unreviewed authority to declare a cyber emergency, and that makes the civil libertarian in me uncomfortable.<br />KTRH Houston: So it needs some more thought. Thanks for talking with us about this. This is an Internet entrepreneur and CEO of ReputationDefender, Michael Fertik.<br />

More Related Content

What's hot

Bashar H. Malkawi, The Forum on National Security Law
Bashar H. Malkawi, The Forum on National Security LawBashar H. Malkawi, The Forum on National Security Law
Bashar H. Malkawi, The Forum on National Security Law
Bashar H. Malkawi
 
Legal Issues in Mobile Security Research
Legal Issues in Mobile Security ResearchLegal Issues in Mobile Security Research
Legal Issues in Mobile Security Research
London School of Cyber Security
 
Proposal - Border Wall (1)
Proposal - Border Wall (1)Proposal - Border Wall (1)
Proposal - Border Wall (1)Austin Stewart
 
Is open, co-created, hyperlocal democracy really democratic? - a #Notwestmins...
Is open, co-created, hyperlocal democracy really democratic? - a #Notwestmins...Is open, co-created, hyperlocal democracy really democratic? - a #Notwestmins...
Is open, co-created, hyperlocal democracy really democratic? - a #Notwestmins...
Local Democracy Bytes
 
Why Are We Being Watched?
Why Are We Being Watched?Why Are We Being Watched?
Why Are We Being Watched?
Crystal Miller
 
On the cybercrime act
On the cybercrime actOn the cybercrime act
On the cybercrime act
CP-Union
 
A US Cybersecurity Strategy for 2030
A US Cybersecurity Strategy for 2030A US Cybersecurity Strategy for 2030
A US Cybersecurity Strategy for 2030Scott Dickson
 
Where next for encryption regulation?
Where next for encryption regulation?Where next for encryption regulation?
Where next for encryption regulation?
blogzilla
 
Wild West or gulag: models for policing cyberspace
Wild West or gulag: models for policing cyberspaceWild West or gulag: models for policing cyberspace
Wild West or gulag: models for policing cyberspaceblogzilla
 
Privacy post-Snowden
Privacy post-SnowdenPrivacy post-Snowden
Privacy post-Snowden
blogzilla
 
Awn Abrar - Patriot Act
Awn Abrar - Patriot ActAwn Abrar - Patriot Act
Awn Abrar - Patriot Actawnabrar
 
Legal Aspect of the Cloud by Giuseppe Vaciago
Legal Aspect of the Cloud by Giuseppe VaciagoLegal Aspect of the Cloud by Giuseppe Vaciago
Legal Aspect of the Cloud by Giuseppe Vaciago
Tech and Law Center
 
Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011hassanzadeh20
 
Consumer Rights IS THE NEW Civil Rights
Consumer Rights IS THE NEW Civil RightsConsumer Rights IS THE NEW Civil Rights
Consumer Rights IS THE NEW Civil Rights
Arthit Suriyawongkul
 
Turkey aside
Turkey asideTurkey aside
Turkey aside
Dina Beer
 
Digital security act (DSA)
Digital security act (DSA)Digital security act (DSA)
Digital security act (DSA)
Md.Azizul hakim Anik
 
051309 Federal Interest And Social Security Metanomics Transcript
051309 Federal Interest And Social Security Metanomics Transcript051309 Federal Interest And Social Security Metanomics Transcript
051309 Federal Interest And Social Security Metanomics Transcript
Remedy Communications
 
Internet censorship by ronak
Internet censorship by ronakInternet censorship by ronak
Internet censorship by ronak
Ronak Karanpuria
 

What's hot (20)

Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Bashar H. Malkawi, The Forum on National Security Law
Bashar H. Malkawi, The Forum on National Security LawBashar H. Malkawi, The Forum on National Security Law
Bashar H. Malkawi, The Forum on National Security Law
 
Legal Issues in Mobile Security Research
Legal Issues in Mobile Security ResearchLegal Issues in Mobile Security Research
Legal Issues in Mobile Security Research
 
After 9 11
After 9 11After 9 11
After 9 11
 
Proposal - Border Wall (1)
Proposal - Border Wall (1)Proposal - Border Wall (1)
Proposal - Border Wall (1)
 
Is open, co-created, hyperlocal democracy really democratic? - a #Notwestmins...
Is open, co-created, hyperlocal democracy really democratic? - a #Notwestmins...Is open, co-created, hyperlocal democracy really democratic? - a #Notwestmins...
Is open, co-created, hyperlocal democracy really democratic? - a #Notwestmins...
 
Why Are We Being Watched?
Why Are We Being Watched?Why Are We Being Watched?
Why Are We Being Watched?
 
On the cybercrime act
On the cybercrime actOn the cybercrime act
On the cybercrime act
 
A US Cybersecurity Strategy for 2030
A US Cybersecurity Strategy for 2030A US Cybersecurity Strategy for 2030
A US Cybersecurity Strategy for 2030
 
Where next for encryption regulation?
Where next for encryption regulation?Where next for encryption regulation?
Where next for encryption regulation?
 
Wild West or gulag: models for policing cyberspace
Wild West or gulag: models for policing cyberspaceWild West or gulag: models for policing cyberspace
Wild West or gulag: models for policing cyberspace
 
Privacy post-Snowden
Privacy post-SnowdenPrivacy post-Snowden
Privacy post-Snowden
 
Awn Abrar - Patriot Act
Awn Abrar - Patriot ActAwn Abrar - Patriot Act
Awn Abrar - Patriot Act
 
Legal Aspect of the Cloud by Giuseppe Vaciago
Legal Aspect of the Cloud by Giuseppe VaciagoLegal Aspect of the Cloud by Giuseppe Vaciago
Legal Aspect of the Cloud by Giuseppe Vaciago
 
Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011
 
Consumer Rights IS THE NEW Civil Rights
Consumer Rights IS THE NEW Civil RightsConsumer Rights IS THE NEW Civil Rights
Consumer Rights IS THE NEW Civil Rights
 
Turkey aside
Turkey asideTurkey aside
Turkey aside
 
Digital security act (DSA)
Digital security act (DSA)Digital security act (DSA)
Digital security act (DSA)
 
051309 Federal Interest And Social Security Metanomics Transcript
051309 Federal Interest And Social Security Metanomics Transcript051309 Federal Interest And Social Security Metanomics Transcript
051309 Federal Interest And Social Security Metanomics Transcript
 
Internet censorship by ronak
Internet censorship by ronakInternet censorship by ronak
Internet censorship by ronak
 

Similar to Michael Fertik on KTRH Houston -- 10/26/09

Metanomics: Federal Interest in Virtual Worlds and Cybersecurity
Metanomics: Federal Interest in Virtual Worlds and CybersecurityMetanomics: Federal Interest in Virtual Worlds and Cybersecurity
Metanomics: Federal Interest in Virtual Worlds and Cybersecurity
Doug Thompson
 
Bill Would Give President Emergency Control Of Internet
Bill Would Give President Emergency Control Of  InternetBill Would Give President Emergency Control Of  Internet
Bill Would Give President Emergency Control Of Internet
john.niemela
 
Chapter 1Provided a high-level overview of the need for a .docx
Chapter 1Provided a high-level overview of the need for a .docxChapter 1Provided a high-level overview of the need for a .docx
Chapter 1Provided a high-level overview of the need for a .docx
walterl4
 
When the World Wide Web Becomes the World Wild Web: PIPA, SOPA, OPEN Act, CIS...
When the World Wide Web Becomes the World Wild Web: PIPA, SOPA, OPEN Act, CIS...When the World Wide Web Becomes the World Wild Web: PIPA, SOPA, OPEN Act, CIS...
When the World Wide Web Becomes the World Wild Web: PIPA, SOPA, OPEN Act, CIS...
Thomas O. Dubuisson
 
take a look at the latest Presidential Order that relates to str.docx
take a look at the latest Presidential Order that relates to str.docxtake a look at the latest Presidential Order that relates to str.docx
take a look at the latest Presidential Order that relates to str.docx
perryk1
 
Understanding the Methods behind Cyber Terrorism
Understanding the Methods behind Cyber TerrorismUnderstanding the Methods behind Cyber Terrorism
Understanding the Methods behind Cyber Terrorism
Maurice Dawson
 
Cyberlaw An Overview
Cyberlaw   An OverviewCyberlaw   An Overview
Cyberlaw An Overview
Talwant Singh
 
Take a look at the latest Presidential Order that relates to strengt
Take a look at the latest Presidential Order that relates to strengtTake a look at the latest Presidential Order that relates to strengt
Take a look at the latest Presidential Order that relates to strengt
lisandrai1k
 
2600 v19 n1 (spring 2002)
2600 v19 n1 (spring 2002)2600 v19 n1 (spring 2002)
2600 v19 n1 (spring 2002)
Felipe Prado
 
Battlefield Cyberspace: Exploitation of Hyperconnectivity and Internet of Things
Battlefield Cyberspace: Exploitation of Hyperconnectivity and Internet of ThingsBattlefield Cyberspace: Exploitation of Hyperconnectivity and Internet of Things
Battlefield Cyberspace: Exploitation of Hyperconnectivity and Internet of Things
Maurice Dawson
 
Evaluate the Presidential Order that relates to strengthening cy
Evaluate the Presidential Order that relates to strengthening cyEvaluate the Presidential Order that relates to strengthening cy
Evaluate the Presidential Order that relates to strengthening cy
galinagrabow44ms
 
ArticlesPublic-Private CybersecurityKristen E. Eichens.docx
ArticlesPublic-Private CybersecurityKristen E. Eichens.docxArticlesPublic-Private CybersecurityKristen E. Eichens.docx
ArticlesPublic-Private CybersecurityKristen E. Eichens.docx
rossskuddershamus
 
The CFAA and Aarons Law
The CFAA and Aarons LawThe CFAA and Aarons Law
The CFAA and Aarons Law
Thomas Jones
 
UMUC .docx
UMUC                                                          .docxUMUC                                                          .docx
UMUC .docx
willcoxjanay
 
Ac breaking cyber-sharinglogjam_web
Ac breaking cyber-sharinglogjam_webAc breaking cyber-sharinglogjam_web
Ac breaking cyber-sharinglogjam_web
atlanticcouncil
 
An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)
Chetan Bharadwaj
 
Hacking Municipal Government Best Practices for Protection of Sensitive Loc...
Hacking Municipal Government  Best Practices for Protection of  Sensitive Loc...Hacking Municipal Government  Best Practices for Protection of  Sensitive Loc...
Hacking Municipal Government Best Practices for Protection of Sensitive Loc...Ben Griffith
 

Similar to Michael Fertik on KTRH Houston -- 10/26/09 (19)

Metanomics: Federal Interest in Virtual Worlds and Cybersecurity
Metanomics: Federal Interest in Virtual Worlds and CybersecurityMetanomics: Federal Interest in Virtual Worlds and Cybersecurity
Metanomics: Federal Interest in Virtual Worlds and Cybersecurity
 
Bill Would Give President Emergency Control Of Internet
Bill Would Give President Emergency Control Of  InternetBill Would Give President Emergency Control Of  Internet
Bill Would Give President Emergency Control Of Internet
 
Chapter 1Provided a high-level overview of the need for a .docx
Chapter 1Provided a high-level overview of the need for a .docxChapter 1Provided a high-level overview of the need for a .docx
Chapter 1Provided a high-level overview of the need for a .docx
 
When the World Wide Web Becomes the World Wild Web: PIPA, SOPA, OPEN Act, CIS...
When the World Wide Web Becomes the World Wild Web: PIPA, SOPA, OPEN Act, CIS...When the World Wide Web Becomes the World Wild Web: PIPA, SOPA, OPEN Act, CIS...
When the World Wide Web Becomes the World Wild Web: PIPA, SOPA, OPEN Act, CIS...
 
take a look at the latest Presidential Order that relates to str.docx
take a look at the latest Presidential Order that relates to str.docxtake a look at the latest Presidential Order that relates to str.docx
take a look at the latest Presidential Order that relates to str.docx
 
Understanding the Methods behind Cyber Terrorism
Understanding the Methods behind Cyber TerrorismUnderstanding the Methods behind Cyber Terrorism
Understanding the Methods behind Cyber Terrorism
 
Cyberlaw An Overview
Cyberlaw   An OverviewCyberlaw   An Overview
Cyberlaw An Overview
 
Take a look at the latest Presidential Order that relates to strengt
Take a look at the latest Presidential Order that relates to strengtTake a look at the latest Presidential Order that relates to strengt
Take a look at the latest Presidential Order that relates to strengt
 
2600 v19 n1 (spring 2002)
2600 v19 n1 (spring 2002)2600 v19 n1 (spring 2002)
2600 v19 n1 (spring 2002)
 
Cyber Legislation
Cyber LegislationCyber Legislation
Cyber Legislation
 
Battlefield Cyberspace: Exploitation of Hyperconnectivity and Internet of Things
Battlefield Cyberspace: Exploitation of Hyperconnectivity and Internet of ThingsBattlefield Cyberspace: Exploitation of Hyperconnectivity and Internet of Things
Battlefield Cyberspace: Exploitation of Hyperconnectivity and Internet of Things
 
Evaluate the Presidential Order that relates to strengthening cy
Evaluate the Presidential Order that relates to strengthening cyEvaluate the Presidential Order that relates to strengthening cy
Evaluate the Presidential Order that relates to strengthening cy
 
American College of California Emerging Threats and Countermeasures Paper.pdf
American College of California Emerging Threats and Countermeasures Paper.pdfAmerican College of California Emerging Threats and Countermeasures Paper.pdf
American College of California Emerging Threats and Countermeasures Paper.pdf
 
ArticlesPublic-Private CybersecurityKristen E. Eichens.docx
ArticlesPublic-Private CybersecurityKristen E. Eichens.docxArticlesPublic-Private CybersecurityKristen E. Eichens.docx
ArticlesPublic-Private CybersecurityKristen E. Eichens.docx
 
The CFAA and Aarons Law
The CFAA and Aarons LawThe CFAA and Aarons Law
The CFAA and Aarons Law
 
UMUC .docx
UMUC                                                          .docxUMUC                                                          .docx
UMUC .docx
 
Ac breaking cyber-sharinglogjam_web
Ac breaking cyber-sharinglogjam_webAc breaking cyber-sharinglogjam_web
Ac breaking cyber-sharinglogjam_web
 
An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)
 
Hacking Municipal Government Best Practices for Protection of Sensitive Loc...
Hacking Municipal Government  Best Practices for Protection of  Sensitive Loc...Hacking Municipal Government  Best Practices for Protection of  Sensitive Loc...
Hacking Municipal Government Best Practices for Protection of Sensitive Loc...
 

Recently uploaded

AI and Covert Influence Operations: Latest Trends
AI and Covert Influence Operations: Latest TrendsAI and Covert Influence Operations: Latest Trends
AI and Covert Influence Operations: Latest Trends
CI kumparan
 
Sharjeel-Imam-Judgement-CRLA-215-2024_29-05-2024.pdf
Sharjeel-Imam-Judgement-CRLA-215-2024_29-05-2024.pdfSharjeel-Imam-Judgement-CRLA-215-2024_29-05-2024.pdf
Sharjeel-Imam-Judgement-CRLA-215-2024_29-05-2024.pdf
bhavenpr
 
Do Linguistics Still Matter in the Age of Large Language Models.pptx
Do Linguistics Still Matter in the Age of Large Language Models.pptxDo Linguistics Still Matter in the Age of Large Language Models.pptx
Do Linguistics Still Matter in the Age of Large Language Models.pptx
Slator- Language Industry Intelligence
 
Hindustan Insider 2nd edition release now
Hindustan Insider 2nd edition release nowHindustan Insider 2nd edition release now
Hindustan Insider 2nd edition release now
hindustaninsider22
 
01062024_First India Newspaper Jaipur.pdf
01062024_First India Newspaper Jaipur.pdf01062024_First India Newspaper Jaipur.pdf
01062024_First India Newspaper Jaipur.pdf
FIRST INDIA
 
Draft-1-Resolutions-Key-Interventions-.pdf
Draft-1-Resolutions-Key-Interventions-.pdfDraft-1-Resolutions-Key-Interventions-.pdf
Draft-1-Resolutions-Key-Interventions-.pdf
bhavenpr
 
Codes n Conventionss copy (1).paaaaaaptx
Codes n Conventionss copy (1).paaaaaaptxCodes n Conventionss copy (1).paaaaaaptx
Codes n Conventionss copy (1).paaaaaaptx
ZackSpencer3
 
03062024_First India Newspaper Jaipur.pdf
03062024_First India Newspaper Jaipur.pdf03062024_First India Newspaper Jaipur.pdf
03062024_First India Newspaper Jaipur.pdf
FIRST INDIA
 
What Ukraine Has Lost During Russia’s Invasion
What Ukraine Has Lost During Russia’s InvasionWhat Ukraine Has Lost During Russia’s Invasion
What Ukraine Has Lost During Russia’s Invasion
LUMINATIVE MEDIA/PROJECT COUNSEL MEDIA GROUP
 
Resolutions-Key-Interventions-28-May-2024.pdf
Resolutions-Key-Interventions-28-May-2024.pdfResolutions-Key-Interventions-28-May-2024.pdf
Resolutions-Key-Interventions-28-May-2024.pdf
bhavenpr
 
31052024_First India Newspaper Jaipur.pdf
31052024_First India Newspaper Jaipur.pdf31052024_First India Newspaper Jaipur.pdf
31052024_First India Newspaper Jaipur.pdf
FIRST INDIA
 
Letter-from-ECI-to-MeiTY-21st-march-2024.pdf
Letter-from-ECI-to-MeiTY-21st-march-2024.pdfLetter-from-ECI-to-MeiTY-21st-march-2024.pdf
Letter-from-ECI-to-MeiTY-21st-march-2024.pdf
bhavenpr
 
2024 is the point of certainty. Forecast of UIF experts
2024 is the point of certainty. Forecast of UIF experts2024 is the point of certainty. Forecast of UIF experts
2024 is the point of certainty. Forecast of UIF experts
olaola5673
 
Hogan Comes Home: an MIA WWII crewman is returned
Hogan Comes Home: an MIA WWII crewman is returnedHogan Comes Home: an MIA WWII crewman is returned
Hogan Comes Home: an MIA WWII crewman is returned
rbakerj2
 
Preview of Court Document for Iseyin community
Preview of Court Document for Iseyin communityPreview of Court Document for Iseyin community
Preview of Court Document for Iseyin community
contact193699
 

Recently uploaded (15)

AI and Covert Influence Operations: Latest Trends
AI and Covert Influence Operations: Latest TrendsAI and Covert Influence Operations: Latest Trends
AI and Covert Influence Operations: Latest Trends
 
Sharjeel-Imam-Judgement-CRLA-215-2024_29-05-2024.pdf
Sharjeel-Imam-Judgement-CRLA-215-2024_29-05-2024.pdfSharjeel-Imam-Judgement-CRLA-215-2024_29-05-2024.pdf
Sharjeel-Imam-Judgement-CRLA-215-2024_29-05-2024.pdf
 
Do Linguistics Still Matter in the Age of Large Language Models.pptx
Do Linguistics Still Matter in the Age of Large Language Models.pptxDo Linguistics Still Matter in the Age of Large Language Models.pptx
Do Linguistics Still Matter in the Age of Large Language Models.pptx
 
Hindustan Insider 2nd edition release now
Hindustan Insider 2nd edition release nowHindustan Insider 2nd edition release now
Hindustan Insider 2nd edition release now
 
01062024_First India Newspaper Jaipur.pdf
01062024_First India Newspaper Jaipur.pdf01062024_First India Newspaper Jaipur.pdf
01062024_First India Newspaper Jaipur.pdf
 
Draft-1-Resolutions-Key-Interventions-.pdf
Draft-1-Resolutions-Key-Interventions-.pdfDraft-1-Resolutions-Key-Interventions-.pdf
Draft-1-Resolutions-Key-Interventions-.pdf
 
Codes n Conventionss copy (1).paaaaaaptx
Codes n Conventionss copy (1).paaaaaaptxCodes n Conventionss copy (1).paaaaaaptx
Codes n Conventionss copy (1).paaaaaaptx
 
03062024_First India Newspaper Jaipur.pdf
03062024_First India Newspaper Jaipur.pdf03062024_First India Newspaper Jaipur.pdf
03062024_First India Newspaper Jaipur.pdf
 
What Ukraine Has Lost During Russia’s Invasion
What Ukraine Has Lost During Russia’s InvasionWhat Ukraine Has Lost During Russia’s Invasion
What Ukraine Has Lost During Russia’s Invasion
 
Resolutions-Key-Interventions-28-May-2024.pdf
Resolutions-Key-Interventions-28-May-2024.pdfResolutions-Key-Interventions-28-May-2024.pdf
Resolutions-Key-Interventions-28-May-2024.pdf
 
31052024_First India Newspaper Jaipur.pdf
31052024_First India Newspaper Jaipur.pdf31052024_First India Newspaper Jaipur.pdf
31052024_First India Newspaper Jaipur.pdf
 
Letter-from-ECI-to-MeiTY-21st-march-2024.pdf
Letter-from-ECI-to-MeiTY-21st-march-2024.pdfLetter-from-ECI-to-MeiTY-21st-march-2024.pdf
Letter-from-ECI-to-MeiTY-21st-march-2024.pdf
 
2024 is the point of certainty. Forecast of UIF experts
2024 is the point of certainty. Forecast of UIF experts2024 is the point of certainty. Forecast of UIF experts
2024 is the point of certainty. Forecast of UIF experts
 
Hogan Comes Home: an MIA WWII crewman is returned
Hogan Comes Home: an MIA WWII crewman is returnedHogan Comes Home: an MIA WWII crewman is returned
Hogan Comes Home: an MIA WWII crewman is returned
 
Preview of Court Document for Iseyin community
Preview of Court Document for Iseyin communityPreview of Court Document for Iseyin community
Preview of Court Document for Iseyin community
 

Michael Fertik on KTRH Houston -- 10/26/09

  • 1. Michael Fertik on KTRH Houston<br />Oct 26, 2009<br />The Cybersecurity Act of 2009 gives the President the power to declare a “cyber emergency” and to shut down servers in the private sector to prevent “cyber attacks.” ReputationDefender CEO Michael Fertik discusses why the 55-page bill is too vague and what additions could improve it.<br />KTRH Houston: A bill that spells out the President’s authority to act decisively in the event of a cyber attack is stirring up controversy. The bill gives the President authority to seize control over the Internet and disconnect private sector computers from the World Wide Web during an emergency that involves cyber attacks. Internet entrepreneur and CEO of ReputationDefender, Michael Fertik, is joining us now live to talk more about this. Does this strike you as something the President needs to have in his quiver of, I guess you would say, national defense arrows?<br />Michael Fertik: Well, you know it does seem reasonable to have protection against and a device to fight against cyber attacks, which are a real threat, but this bill is too vague as to what constitutes a cyber threat, and that’s the controversial part of the bill. <br />Let me begin by describing the non-controversial part of the bill. So, the bill encourages and requires the federal agencies, for example, to improve their cyber security. We all want that to happen, the Veterans Administration and other federal agencies have had problems with data loss and identity theft in the recent past, and we’re a little bit behind the ball and out to lunch on our national cyber security for the federal agencies. That’s the part, among others, that is not controversial in this legislation. The part that is worrisome is that the bill gives very broad power to the President to declare a cyber emergency and then to direct Internet traffic, to unplug certain parts of private access to the Internet, and otherwise to examine data packets that are travelling through the web almost without review, and to do so when the President considers there to be a cyber emergency. The bill does not define what constitutes a threat grave enough to declare an emergency. <br />So there’s a big omission here. There have been, in the past, times when Congress has declared emergencies that have allowed the President to take very extraordinary action to protect vital assets to the military or to the economy. For example, in World War I and World War II certain assets like railroads and coal mines were declared to be vital and therefore subject to certain public control during the course of the war, and therefore the President’s control. This bill, by contrast, gives the President sole and unreviewed authority to declare a cyber emergency, and that makes the civil libertarian in me uncomfortable.<br />KTRH Houston: So it needs some more thought. Thanks for talking with us about this. This is an Internet entrepreneur and CEO of ReputationDefender, Michael Fertik.<br />