Obama’s Power To Set Cybersecurity Standards Is Limited

Analysts at the National Cybersecurity & Communications Integration Center prepare for an exercise

J. Scott Applewhite/AP

AA Font size + Print

Analysts at the National Cybersecurity & Communications Integration Center prepare for an exercise

For the last three years, President Obama has been unable to get a cybersecurity bill through Congress. By Matthew Cooper

As President Obama readies to strike the Syrian regime, it’s worth thinking about that other defense problem—cybersecurity—and what it says about Washington in the Obama era.

On Wednesday, the capital will be consumed by the March on Washington, as well it ought, and the looming battle with Syria—although not at the same time, for surely the missiles won’t fly at the very moment Obama salutes nonviolence.

But the country’s efforts to beef up cybersecurity are stymied, even after thefts at the National Security Agency and the Army have made Edward Snowden and Chelsea (nee Bradley) Manning emblems of computer vulnerability. This week shows why.

On Wednesday, while the marchers march and the Pentagon plans, a federal agency in Maryland called theNational Institute for Standards and Technology will be issuing a draft report for cybersecurity standards—basically a list of best practices for businesses and other institutions to follow as they try to protect their networks.

NIST, as it’s called, is the much-admired scientific agency that runs the atomic clock and comes up with standards for everything from weights and measures to medical devices. It doesn’t regulate, but it’s been around in some form since the early days of the Republic and its word is listened to closely by industry and government.

For the last three years, Congress has been unable to come up with a cybersecurity bill that the president could sign. And to be fair, it’s been over honest disagreements rather than raw obstructionism, such as filibuster abuse. The House has passed a bill with overwhelming GOP support and a considerable number of Democrats that would enable information sharing between companies and the government in an effort to shut down hackers. Opponents on the left and right have offered up civil-liberties arguments, saying that’s a license to abuse private data. Throw in some classic questions about corporate liability and you have a stalemate—but at least the old-fashioned kind built around ideas (and lobbying of course), rather than gun-to-the-head threats like the debt ceiling.

The cyber stalement is why the president issued an executive order earlier this year asking NIST to come up with a voluntary framework for reducing cyber risks to critical infrastructure. (His order also opened up more information sharing in the government.) And so the agency’s worked diligently on it and will issue best practices tomorrow. But while they would certainly improve security if acted on, none of them are likely to provide the degree of protection that can only be afforded by legislative action, nor does anyone expect them to. One insider calls them “no brainers,” likening them to use-a-secure-password bromides. (You can read more about where NIST is planning here and about the legislative stalemate here.) Whether you believe in the House bill’s information-sharing approach or a heavier regulatory regime, everyone’s pretty much agreed that NIST isn’t enough.

And this is where it comes back to Obama. For those who think a president has extraordinary executive powers to lead, here’s a case where he’s pretty much tapped out. The problem is grave enough that Congress may eventually give the president something that he’s willing to sign. Until then this is about the best he can do—a conspicuous limitation of presidential power in a week where he’s likely to flex his strongest muscles by making speeches and making war.

Close [ x ] More from DefenseOne
 
 

Thank you for subscribing to newsletters from DefenseOne.com.
We think these reports might interest you:

  • Software-Defined Networking

    So many demands are being placed on federal information technology networks, which must handle vast amounts of data, accommodate voice and video, and cope with a multitude of highly connected devices while keeping government information secure from cyber threats. This issue brief discusses the state of SDN in the federal government and the path forward.

    Download
  • Military Readiness: Ensuring Readiness with Analytic Insight

    To determine military readiness, decision makers in defense organizations must develop an understanding of complex inter-relationships among readiness variables. For example, how will an anticipated change in a readiness input really impact readiness at the unit level and, equally important, how will it impact readiness outside of the unit? Learn how to form a more sophisticated and accurate understanding of readiness and make decisions in a timely and cost-effective manner.

    Download
  • Cyber Risk Report: Cybercrime Trends from 2016

    In our first half 2016 cyber trends report, SurfWatch Labs threat intelligence analysts noted one key theme – the interconnected nature of cybercrime – and the second half of the year saw organizations continuing to struggle with that reality. The number of potential cyber threats, the pool of already compromised information, and the ease of finding increasingly sophisticated cybercriminal tools continued to snowball throughout the year.

    Download
  • A New Security Architecture for Federal Networks

    Federal government networks are under constant attack, and the number of those attacks is increasing. This issue brief discusses today's threats and a new model for the future.

    Download
  • Information Operations: Retaking the High Ground

    Today's threats are fluent in rapidly evolving areas of the Internet, especially social media. Learn how military organizations can secure an advantage in this developing arena.

    Download

When you download a report, your information may be shared with the underwriters of that document.