U.S. Cybersecurity Policy in Context
SOURCE: BigStock Photo
President Barack Obama signed a long-rumored executive order and presidential directive on Tuesday aimed at strengthening the cybersecurity of critical infrastructure.
America’s enemies are “seeking the ability to sabotage our power grid, our financial institutions, and our air traffic control systems … and swipe our corporate secrets,” President Obama said on Tuesday night during his State of the Union address. Indeed, Secretary of Defense Leon Panetta once used the term, “cyber-Pearl Harbor” to describe the looming threat we face.
These threats to both digital and physical infrastructure could not be more real. In 2007 the Department of Homeland Security demonstrated that hackers could take over a 5,000 diesel engine—the kind routinely used as backup generators in our power grid—and, using nothing but computer code, caused the machine to destroy itself. Using a similar technique, U.S. intelligence officials allegedly used a computer virus dubbed “Stuxnet” to sabotage more than 1,000 uranium enrichment centrifuges in Iran in 2010.
Unfortunately, the government’s past responses to these new and developing threats have been piecemeal and lacking in coordination. In the timeline below we outline the major policy initiatives that led us to yesterday’s executive order, and the cyber attack incidents that spurred them.
Yesterday’s actions are designed to accomplish two goals:
- Better collaboration between government and industry in response to cyber threats, such as the one that reportedly compromised email account information at The New York Times on January 31.
- Better coordination within government to create robust cyber protections, in order to patch vulnerabilities such as the ones found in a recent governemnt audit of the Federal Communications Commission’s cyber infrastructure.
Specifically, the order and the directive implement a voluntary program for companies working in sectors that involve critical infrastructure, such as power grids, pipelines, or transportation operations, creates new information sharing programs under the Department of Homeland Security, clarifies the role of various federal agencies in pursuing cyber resiliency, and tasks the National Institute of Standards and Technology with designing and implementing a framework to reduce long-term cyber risks.
In some ways, cyberspace is like the Wild West of our time—dangerous, difficult to police, and still largely unexplored. What is certain is that yesterday’s executive order will not be the end of this story. It is likely only the beginning.
Andrea Peterson is the Social Media and Analytics Editor at the Center for American Progress. Sean Pool is the Managing Editor of Science Progress. Jason Thomas contributed to the research for this timeline.
To speak with our experts on this topic, please contact:
Print: Liz Bartolomeo (poverty, health care)
202.481.8151 or email@example.com
Print: Tom Caiazza (foreign policy, energy and environment, LGBT issues, gun-violence prevention)
202.481.7141 or firstname.lastname@example.org
Print: Allison Preiss (economy, education)
202.478.6331 or email@example.com
Print: Tanya Arditi (immigration, Progress 2050, race issues, demographics, criminal justice, Legal Progress)
202.741.6258 or firstname.lastname@example.org
Print: Chelsea Kiene (women's issues, TalkPoverty.org, faith)
202.478.5328 or email@example.com
Print: Beatriz Lopez (Center for American Progress Action Fund)
202.741.6255 or firstname.lastname@example.org
Spanish-language and ethnic media: Rafael Medina
202.478.5313 or email@example.com
TV: Rachel Rosen
202.483.2675 or firstname.lastname@example.org
Radio: Sally Tucker
202.481.8103 or email@example.com