Obama may start CISPA-style cybersecurity with Executive Order
CISPA, blocked last April in the Senate for overruling privacy protections for citizens, may be put into place by Executive Order.
Last April, the House passed the Cyber Intelligence Sharing and Protection Act, but the Senate blocked it, despite the threat of a White House veto. In the story, “White House circulating draft of executive order on cybersecurity,” in The Hill's Hillicon Valley blog, “two people familiar with the document,” give details of the reborn cybersecurity bill.
The planning started back in the spring immediately after the CISPA bill was stopped. Supporters push the need for better cybersecurity for key systems like the power grid, water supply, and transportation networks. The Department of Homeland Security would lead the effort, although The Hill says DHS, “has a spotty track record when it comes to leading national security efforts.”
Enough people with clout will want to prevent "hackers" from messing with their businesses and will accept whatever line of thinking is promised to deliver them from this evil.
jeremymims on news.ycombinator.com
Sopa, Pippa, Cispa may still take effect due to a New World Order: If you can't have it voted on by House and Senate, or approved by United Nations, jam it down the American's throats with the stroke of President Obama's pen.
TheMissesHelp on thehill.com
Hopefully this’ll at least lead companies to share best practices (although there’s a fair deal of no-brainers here – like not setting default usernames and passwords on your control systems before shipping them).
gogadgetgo on theverge.com
nothing in the Lieberman bill that this EO is patterned on creates enforcement mechanisms for IP and copyright enforcement, or for collecting customer information from ISPs. Of course, neither did the GOP's CISPA bill. That's because neither regulatory effort is about user information.
tptacek on news.ycombinator.com
Outside the public privacy rights issue, do you think American infrastructure is protected from cyber attacks? Explain your answer.