U.S. Cybersecurity Policy in Context
SOURCE: BigStock Photo
President Barack Obama signed a long-rumored executive order and presidential directive on Tuesday aimed at strengthening the cybersecurity of critical infrastructure.
America’s enemies are “seeking the ability to sabotage our power grid, our financial institutions, and our air traffic control systems … and swipe our corporate secrets,” President Obama said on Tuesday night during his State of the Union address. Indeed, Secretary of Defense Leon Panetta once used the term, “cyber-Pearl Harbor” to describe the looming threat we face.
These threats to both digital and physical infrastructure could not be more real. In 2007 the Department of Homeland Security demonstrated that hackers could take over a 5,000 diesel engine—the kind routinely used as backup generators in our power grid—and, using nothing but computer code, caused the machine to destroy itself. Using a similar technique, U.S. intelligence officials allegedly used a computer virus dubbed “Stuxnet” to sabotage more than 1,000 uranium enrichment centrifuges in Iran in 2010.
Unfortunately, the government’s past responses to these new and developing threats have been piecemeal and lacking in coordination. In the timeline below we outline the major policy initiatives that led us to yesterday’s executive order, and the cyber attack incidents that spurred them.
Yesterday’s actions are designed to accomplish two goals:
- Better collaboration between government and industry in response to cyber threats, such as the one that reportedly compromised email account information at The New York Times on January 31.
- Better coordination within government to create robust cyber protections, in order to patch vulnerabilities such as the ones found in a recent governemnt audit of the Federal Communications Commission’s cyber infrastructure.
Specifically, the order and the directive implement a voluntary program for companies working in sectors that involve critical infrastructure, such as power grids, pipelines, or transportation operations, creates new information sharing programs under the Department of Homeland Security, clarifies the role of various federal agencies in pursuing cyber resiliency, and tasks the National Institute of Standards and Technology with designing and implementing a framework to reduce long-term cyber risks.
In some ways, cyberspace is like the Wild West of our time—dangerous, difficult to police, and still largely unexplored. What is certain is that yesterday’s executive order will not be the end of this story. It is likely only the beginning.
Andrea Peterson is the Social Media and Analytics Editor at the Center for American Progress. Sean Pool is the Managing Editor of Science Progress. Jason Thomas contributed to the research for this timeline.
To speak with our experts on this topic, please contact:
Print: Katie Peters (economy, education, poverty, Half in Ten Education Fund)
202.741.6285 or email@example.com
Print: Anne Shoup (foreign policy and national security, energy, LGBT issues, health care, gun-violence prevention)
202.481.7146 or firstname.lastname@example.org
Print: Crystal Patterson (immigration)
202.478.6350 or email@example.com
Print: Madeline Meth (women's issues, Legal Progress, higher education)
202.741.6277 or firstname.lastname@example.org
Spanish-language and ethnic media: Tanya Arditi
202.741.6258 or email@example.com
TV: Lindsay Hamilton
202.483.2675 or firstname.lastname@example.org
Radio: Chelsea Kiene
202.478.5328 or email@example.com