Skip to main content

What’s Government’s Role in Making the Web Secure?

web-govThere is no kill switch for the Internet, no secret on-off button in an Oval Office drawer. Yet when a Senate committee was exploring ways to secure computer networks, a provision to give the president the power to shut down Internet traffic to compromised Web sites in an emergency set off alarms.

Corporate leaders and privacy advocates quickly objected, saying the government must not seize control of the Internet. Lawmakers dropped it, but the debate rages on. How much control should federal authorities have over the Web in a crisis? How much should be left to the private sector? It does own and operate at least 80 percent of the Internet and argues it can do a better job.

“We need to prepare for that digital disaster,” said Melissa Hathaway, the former White House cybersecurity adviser. “We need a system to identify, isolate and respond to cyberattacks at the speed of light.”

So far at least 18 bills have been introduced as Congress works carefully to give federal authorities the power to protect the country in the event of a massive cyberattack. Lawmakers do not want to violate personal and corporate privacy or squelching innovation. All involved acknowledge it isn’t going to be easy.

For most people, the Internet is a public haven for free thought and enterprise. Over time it has become the electronic control panel for much of the world’s critical infrastructure. Computer networks today hold government secrets, military weapons specifications, sensitive corporate data, and vast amounts of personal information.

Millions of times a day, hackers, cybercriminals and mercenaries working for governments and private entities are scanning those networks, looking to defraud, disrupt or even destroy.

Just eight years ago, the government ordered planes from the sky in the hours after the Sept. 11 terrorist attacks.

Could or should the president have the same power over the Internet in a digital disaster?

If hackers take over a nuclear plant’s control system, should the president order the computer networks shut down? If there’s a terrorist attack, should the government knock users off other computer networks to ensure that critical systems stay online? And should the government be able to dictate who companies can hire and what they must do to secure the networks that affect Americans’ daily life.

Government officials say the U.S. must improve efforts to share information about cyberthreats with private industry. They also want companies to ensure they are using secure software and hiring qualified workers to run critical systems.

Much like the creation of the Department of Homeland Security, cybersecurity has attracted the interest of a number of House and Senate committees, all hoping to get a piece of the oversight power:

—Bills in the House Homeland Security Committee bills would protect the electric grid and require the department to secure its networks.

—The Senate Homeland Security and Government Reform Committee is writing legislation aimed largely at federal agencies.

—The Senate Commerce, Science and Transportation Committee is working on a bill that promotes public awareness and technical education, raises the planned White House cyberadviser to a Cabinet-level position and calls for professional cyberstandards. An early draft would have given the president the power to shut down compromised federal or critical networks in an emergency.

Bloggers howled that the government was taking over the Internet. Business leaders protested, and Senate aides reworked the bill. Early versions of the second draft are more vague, giving the president only the authority to “direct the national response” to a cyberthreat.

Committee spokeswoman Jena Longo said the bill “will not empower a government shutdown or takeover of the Internet and any suggestion otherwise is misleading and false.”

She said the president has the constitutional authority to protect the American people and direct the response to a crisis — including “securing our national cyberinfrastructure from attack.”

Privacy advocates say the government has not proven it can do a better job securing networks than the private sector.

“The government needs to get its own cybersecurity house in order first before it tries to tell the private sector what to do,” said Gregory T. Nojeim, senior counsel for the Center for Democracy and Technology.

Nojeim said the Senate Commerce Committee bill appears to leave “tough questions to the president, and that isn’t comforting because some presidents will answer those questions in troubling ways.”

U.S. officials acknowledge that their networks are scanned or attacked millions of times a day. Spies have breached the electrical grid. In July, hackers simultaneously brought down several U.S. government Web sites and sites in South Korea.

Home computers are targets, too. A study by security software provider McAfee Inc. says as many as 4 million computers are newly infected each month and turned into “botnets” — armies of computers used by someone without their owners’ knowledge. As many as 10 percent of the world’s computers might be unknowingly infected.

Shutting down a compromised system may sound like a good idea, but “it’s not like the Internet has an on-off switch somewhere you can press,” said Franck Journoud, manager of information security policy for the Business Software Alliance.

Most industries are federally regulated, so the government should work within those systems to plan for disasters, said Journoud, whose group has met with lawmakers and the White House on cyberpolicies.

Rather than setting minimum standards, business groups say the U.S. should endorse existing voluntary industry ones.

Cyberexperts also argue that when hackers infiltrate a critical network, the solution is not to shut down the system, but to isolate and filter out the offending computer codes.

Private companies are willing and able to protect their systems without government mandates, said Tom Reilly, president of ArcSight, a cybersecurity software company. He said the government should concentrate on protecting critical infrastructure and data privacy, and promote education on cybersecurity.

“People want to know if they are one of the 10 percent of the computers that are infected,” he said. “They just don’t know what to do. Most people just hope they’re one of the other nine.”

Editors' Recommendations

Topics
Dena Cassella
Former Digital Trends Contributor
Haole built. O'ahu grown
I found a Chrome extension that makes web browsing bearable again
Google Drive in Chrome on a MacBook.

GDPR cookie consent notices were meant to hand privacy control back to ordinary internet denizens. Instead, they’ve unleashed a tidal wave of deception, with unscrupulous website owners using any means necessary to trick you into letting them harvest your private data for resale and profit.

It wasn’t meant to be like this. But while things might have not gone so well for GDPR, there’s still a way to protect your privacy and banish those annoying pop-ups in one fell swoop. Instead of rage-clicking Accept just to get the damned pop-ups to go away, I’ve found a much better way: the Consent-O-Matic browser extension.

Read more
What is Li-Fi? A faster, more secure wireless internet is just around the corner
Li-Fi transmitters pictured.

Li-Fi technology has the potential to give us faster, more secure wireless internet access, even in busy environments where there is already heavy Wi-Fi coverage. It's not a replacement for Wi-Fi, but an augmenting technology that could work alongside it to offer an additional spectrum for devices to utilize, as well as a way to limit access to the network utilizing the very nature of this light-based technology.

Li-Fi has the potential to revolutionize not only the way we all get online, but it could even replace some of the mountains of cables that make up the backbone of the modern internet.
What is Li-Fi?
Li-Fi is short for Light Fidelity and is a communication system that utilizes light, rather than radio waves to transmit the data. A Li-Fi network uses infrared LED lamps to transmit and receive data, using modulations in the light intensity to create the digital signal which carries the information to and from various networked devices.

Read more
How to make your Mac private and secure
Apple MacBook Pro side view showing keyboard deck and ports.

Mac OS is an inherently secure and private operating system, but that doesn't mean there's nothing you can do to ensure that it's as safe and private as possible. Here's how to make your Mac private and secure in a few different ways.

Read more