GOP platform seeks more aggressive U.S. cyber deterrence policies

Obama Administration's focus on defensive capabilities ineffective, manifesto says

By , Computerworld |  IT Management, cybersecurity

The GOP platform also blasts the Obama Administration's "costly and heavy-handed regulatory approach" toward cyber matters and claimed that such polices would only succeed in curbing innovation in cybersecurity. It acknowledges the need for better cyberthreat information sharing between the government and private industry, but maintained that sharing should be voluntary and collaborative, not something that is enforced through mandate.

The platform also calls for limits on the government's use of unmanned aerial vehicles, or drones, within U.S. airspace.

The Obama Administration earlier this year signed into law a bill that requires the Federal Aviation Administration (FAA) to issue drone licenses for law enforcement, for commercial use and even to private hobbyists. That law has sparked < a href=" http://www.computerworld.com/s/article/9225650/Congress_urged_to_secure_... ">considerable concern among privacy and civil rights advocates who fear it will lead to drones being used for unprecedented surveillance.

"We support pending legislation to prevent unwarranted or unreasonable governmental intrusion through the use of aerial surveillance or flyovers on U.S. soil, with the exception of patrolling our national borders," the GOP platform says. "All security measures and police actions should be viewed through the lens of the Fourth Amendment; for if we trade liberty for security, we shall have neither."

Jaikumar Vijayan covers data security and privacy issues, financial services security and e-voting for Computerworld. Follow Jaikumar on Twitter at @jaivijayan or subscribe to Jaikumar's RSS feed. His e-mail address is jvijayan@computerworld.com.

See more by Jaikumar Vijayan on Computerworld.com.

Read more about cyberwarfare in Computerworld's Cyberwarfare Topic Center.


Originally published on Computerworld |  Click here to read the original story.
Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

Answers - Powered by ITworld

Ask a Question