Posted on 08/28/2009 12:41:08 PM PDT by antidemoncrat
Details of a revamped version of the Cybersecurity Act of 2009 show the Senate bill could give the president a "kill switch" on the Internet and allow him to shut out private networks from online access.
(Excerpt) Read more at foxnews.com ...
And what event would give cause for Obama to turn off the Internet i wonder ? Or would it even require an event ? America, you had best wake up ! This worm is turning quickly.
1. Cybersecurity Act of 2009 - Directs the President to establish or designate a Cybersecurity Advisory Panel to advise the President.
2. Defines "cyber" as: (1) any process, program, or protocol relating to the use of the Internet or an intranet, automatic data processing or transmission, or telecommunication via the Internet or an intranet; and (2) any matter relating to, or involving the use of, computers or computer networks.
3. Directs the Secretary of Commerce to: (1) develop and implement a system to provide cybersecurity status and vulnerability information regarding all federal information systems and networks managed by the Department of Commerce; and (2) provide financial assistance for the creation and support of Regional Cybersecurity Centers for small and medium sized U.S. businesses.
4. Requires the National Institute of Standards and Technology (NIST) to establish cybersecurity standards for all federal government, government contractor, or grantee critical infrastructure information systems and networks.
5. Makes NIST responsible for U.S. representation in all international cybersecurity standards development.
6. Directs the Secretary to develop or coordinate a national licensing, certification, and recertification program for cybersecurity professionals and makes it unlawful to provide certain cybersecurity services without being licensed and certified.
7. Requires Advisory Panel approval for renewal or modification of a contract related to the operation of the Internet Assigned Numbers Authority.
8. Requires development of a strategy to implement a secure domain name addressing system.
9. Requires the National Science Foundation (NSF) to support specified types of research and to establish a program of grants to higher education institutions to establish cybersecurity testbeds.
10. Amends the Cybersecurity Research and Development Act to expand the purposes of an existing program of computer and network security research grants.
11. Requires the NSF to establish a Federal Cyber Scholarship-for-Service program.
12. Requires NIST to establish cybersecurity competitions and challenges to recruit talented individuals for the federal information technology workforce and stimulate innovation.
13. Requires the Department of Commerce to serve as the clearinghouse of cybersecurity threat and vulnerability information. Grants the Secretary access to all relevant data concerning such networks notwithstanding any law or policy restricting access.
14. Directs the President to: (1) develop and implement a comprehensive national cybersecurity strategy; (2) on a quadrennial basis, complete a review of the cyber posture of the United States; and (3) work with representatives of foreign governments to develop norms, organizations, and other cooperative activities for international engagement to improve cybersecurity.
15. Requires the Director of National Intelligence and the Secretary of Commerce to submit to Congress an annual report on cybersecurity threats to and vulnerabilities of critical national information, communication, and data network infrastructure.
16. Establishes a Secure Products and Services Acquisitions Board to review and approve high value products and services acquisition and establish validation standards for software to be acquired by the federal government.
..... I numbered these above so they could be discussed. #14 seems to come the closest in wording ... but I don't see the power given according to this summary from Thomas. Is it stated somewhere else? I don't like a lot of what I see, but I don't see the "shutdown/takeover" clause, at least not in this summary. (And if it is in the text, it should be in this summary). Maybe its buried in the subtext of #14 above?
Have they forgotten the lessons of GOSIP? The government can mandate any type of scheme it wants to, but it doesn't mean that it will be adopted.
The Internet has grown up in a cooperative, best-of-breed and highly pragmatic manner, and it is unlikely the Kenyan Clown's mandates for any particular scheme will have any more traction than the government's silly mandate that OSI be adopted.
Instead, they should simply provide funding for more research in the area, and forget the strategizing — such strategizing will come around naturally as the community hashes over the possibilities.
We need to buy and bury. That is the answer.
You must be from RI! I have been to Curl Up and Dye.
From rushbaby here:
http://news.cnet.com/8301-13578_3-10320096-38.html
“Bush wanted to intercept phone calls. Left cries foul. Obama wants to shut down the internet. Left says sounds good. What a bunch of frigging morons. Can’t have it both ways you idiots.”
excellent graphic and very, very true
excellent video
every American should watch it, while they are still permitted to
I now live in Georgia but IIRC there was one in both CT and VT when I lived in New England. BTW, God bless New England! Sorry there are so darned many liberals up there.
Like roaches, they move out of the blue cities to the beautiful New England countryside.
You mean spread disinformation don’t you?
What bothers me is this is just one of the powers that are being consolidated under Whitehouse control.
I did a search and did not see this article listed. By the way if you see it more than once, just skip over it. Works for me.
“Not a dang thing republicans can do about it.”
Oh, please.
Bloody revolution here we come!
Please see post 54.
Please see post 54.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.