• Skip to main content
  • Skip to secondary menu
  • Skip to primary sidebar
  • Skip to footer
  • Home
  • About
    • Our Mission
      • Political Islam
    • Areas of Expertise
      • Economic Warfare
        • Cyber Security
      • U.S. Policy
      • Anti-Corruption
      • Foreign Election Observing
      • Supporting Free Speech
        • Legislation
      • Impact of ACD’s Work
      • Free Speech Celebration, U.S. Senate
    • Board of Directors & Advisors
    • Our Team
    • Contact Us
    • Subscribe
  • Our Impact
    • Endorsements
    • Additional Praise
  • Media
    • Recent Interviews
    • Events
      • Coming Events
    • Radio
    • Television
    • Rumble / Youtube
  • Publications
    • All Posts Archive
    • ACD Presentations
    • Articles
    • Books
    • Papers
    • Recommended Readings
  • Free Speech
    • Legislation & Support
    • Impact of ACD’s Work
      • FREE SPEECH Act Celebration, U.S. Senate, September 20, 2010
      • Some Congressional Testimonies
  • Economic warfare
    • The Impact of Purposeful Interference on U.S. Cyber Interests
    • Cyber/Space, EMP Insecurity- Current and Future Threats
    • The Existential EMP Threat
    • New Strategies to Secure U.S. Economy from Cyber Attacks
    • Economic Warfare Subversions July 9, 2012
    • CyberSpace Security – Papers And Articles
    • Cyber Security
    • Da’esh “lite” North America Islamist – Sources
    • The Muslim Brotherhood and Da’esh “Lite” in North America
  • Support ACD
    • Donate
    • Subscribe
    • Contact
American Center for Democracy

American Center for Democracy

  • facebook
  • twitter
  • youtube
  • linkedin
  • Free Speech
  • U.S. Policy
    • U.S. Foreign Policy
  • Political Islam
    • Canada
    • Hamas
    • Iran
    • Islam
    • Muslim Brotherhood
    • Palestinian
    • United States
  • Narco-Terrorism
  • Middle East Conflicts
    • Iran
    • Israel
  • Global Conflicts
    • China
    • North Korea
    • Russia
    • Ukraine
  • Soros
You are here: Home / ACD/EWI Blog / Cybersecurity and the 114th Congress

Cybersecurity and the 114th Congress

December 29, 2014 by Rachel Ehrenfeld

The Sony hacking served as a national reminder that cybersecurity should be taken more seriously. Thus, the lame-duck 113th Congress passed several cybersecurity acts, which the President signed on December 18.

The new laws include: The National Cybersecurity Protection Act (S. 2519); The Federal Information Security Modernization Act of 2014 (S. 2521); The Critical Infrastructure Research and Development Advancement Act of 2014, or CIRDA Act of 2014 (Public Law No: 113-246); The Homeland Security Cybersecurity Workforce Assessment Act, which was included in the Border Patrol Agent Pay Reform Act of 2014 (S. 1691); and The CyberSecurity Enhancement Act of 2014, which permits the Secretary of Commerce, acting through the Director of the National Institute of Standards and Technology (NIST), to facilitate and support the development of a voluntary, industry-led set of standards and procedures to reduce cyberrisks to critical infrastructure.”  This should help develop “voluntary standards for securing our country’s critical infrastructure with public-private partnerships.”

Until not long ago, the notion behind the House and Senate bills past and present was that government had the greater expertise and manpower to combat cyberattack and therefore should also protect the private sector.  For this, however, public-private information sharing is crucial.  But the private sector did not like the idea of mandatory sharing information on attacks, especially so after Snowdon’s NSA exposes. Also, if the government has the expertise and the means, why then we read with growing frequency that many government agencies are being hacked into?

“What can we do to cope?” asked outgoing Intelligence Committee Chairman Mike Rogers in the Wall Street Journal. “It is not enough to simply exhort American companies to work harder or the government to promulgate new regulations….Congress must update the law to expand the private-sector’s access to government-classified cyberthreat intelligence,” he said. “The law must also be updated to knock down the many barriers, such a concerns about legal liability or action by government regulators, that currently impede or stop companies from sharing cyberthreat information with each other and the government,” he wrote. However, several cybersecurity firms did not wait for the government. Earlier this year they forged alliances and begun sharing cyberthreat information

Rogers, like Obama, is most concerned with state-sponsored cyberattacks, not criminals. And both are worried not only about service denial, but about attacks that aim to spy, steal information and even destroy computers. Therefore, Rogers argued, “The U.S. government has an obligation to help those companies defend themselves by sharing any actionable intelligence the government has to warn them when and where they can expect an attack to come from.”

In May 2010, former National Security Agency Director Keith Alexander lamented, “The scale of compromise, including the loss of sensitive and unclassified data, is staggering,” Miller said. “We’re talking about terabytes of data, equivalent to multiple libraries of Congress.” Since then it has only gotten worse. Yet, the general attitude, even now, is that “cyberattacks are a fact of life.” Not necessarily.

Better security, however, means a different mindset.

Protection against cyberattacks should be among the U.S. government’s highest and most urgent priorities. Since hackers break into government and private systems threatening the economy, the public and national security, the brightest cyber experts in the nation should be invited to participate in a highly secluded “Manhattan Project”-like group.  It should consist experts from government, academia and the private sector, thus gaining the confidence of the public. Better organization and less bureaucracy could be provided by the private sector and funding should be allocated by Congress, as well as the private sector.

Meanwhile, with the latest news being that “the ISC site, home to the world’s most popular Domain Name System program BIND, appears to have been infected with malware,” the minimally prudent thing to do for individuals, companies and certainly most government offices, is to use computers not connected to the Internet.

Filed Under: ACD/EWI Blog, Cyber, Cyber security, CyberAttacks, Latest News, U.S., U.S. Foreign Policy, U.S. Policy

Primary Sidebar

Spotlight

website capture islamist incitement quote by j.woolsey obama signing Rachel's law chemical terrorism transportation terrorism nuclear threats on the rise winning the cyberwar gps concepts and misconceptions libel tourism

Search ACD

Recent Appearances

[5/1/2025] National Talk Radio with Shawn Moore

[3/11/2025] Shaun Thompson Interview

[3/10/2025] Larry Conners Interviews Rachel Ehrenfeld

[2/3/2025] The Truth About George Soros - Grey Matter Podcast

[1/22/2025] Fighting Terrorism Funding - SAM Podcast

[1/8/2025] COUNTER NARRATIVE Interview on PATRIOT.TV

[10/2/2024] The Shaun Thompson Show: Dr. Rachel Ehrenfeld

[9/30/2024] Counter Narrative: Soros Power Grab: Media Takeover & Election Manipulation |

[8/28/2024] SOS Blinken warns U.S. allies that Iran may attack Israel in the next 24-48hrs

[8/9/2024] Purham & Associates Show Special Guest: Rachel Ehrenfeld

[7/26/2024] Dr. Ehrenfeld on The Andy Caldwell Show

[6/12/2024] Dr. Ehrenfeld on The Shaun Thompson Show

[5/29/2024] Interview on Bill Martinez Live

[5/24/2024] CAEF presents "Soros is No Dreyfus: The Soros Agenda to Change America & his Anti-Israel Crusade"

[5/16/2024] Dr. Rachel Ehrenfeld on Jayne Carol Tonight - Portland, OR

[5/9/2024] How deep do the Soros ties go?

[5/6/2024] Dr. Rachel Ehrenfeld: The College Intifada-How Jew Hunting Became a Left Wing Blood Sport On Campus

[4/15/2024] Dr. Rachel Ehrenfeld on The Vic Poricini Show

[4/11/2024] The Andy Caldwell Show

[4/10/2024] Always Right Radio with Bob Frantz

[4/3/2024] Kacee Allen & Rachel Ehrenfeld - The Pelle Neroth Taylor Show

[3/12/2024] Rachel Ehrenfeld | Gunther Rewind - Podcast on iHeart Radio

[2/18/2024] תעלומת ג'ורג' סורוס ותרומתו למאבק נגד ישראל - פוקוס על אמריקה - Podcast on Spotify

תעלומת ג'ורג' סורוס ותרומתו למאבק נגד ישראל - פוקוס על אמריקה | Podcast on Spotify

[2/7/2024] Are We in World War III and Don't Know It? - Laura-Lynn Tyler Thompson

[1/23/2024] The Chris Smith Show - TNTRADIO.LIVE

[1/22/2024] 'Soros Agenda' Author Warns That Global Elites Could Steal '24 Election - One America News

[1/12/2024] Stacy Washington NOW Rachel on from 24:10 – 31:46.

[12/23/2023] Propagaza – Laura-Lynn Tyler Thompson

View ALL

The Soros Agenda

g. soros

Soros: The Man Who Would Be Kingmaker, Part I

Rachel Ehrenfeld & Shawn Macomber

Soros: The Man Who Would Be Kingmaker, Part II

Soros: The Man Who Would be Kingmaker, Part III

Soros: The Man Who Would be Kingmaker, Part IV

More about Soros...
ORDER THE SOROS AGENDA →
Buy The Soros Agenda

Tags

antisemitism Caliphate Canada capital punishment China Christians Daniel Haqiqatjou Dawah Disinformation genocide Hamas Iran ISIS Islam Islamic Party of Ontario Islamic Relief Canada Islamic Relief Worldwide Islamization Islamophobia Israel J. Millard Burr Jews jihad Justin Trudeau LGBT liberalism Muslim Brotherhood Muslims NCCM Norman Bailey Palestine Political Islam Quran Russia Salaheddin Islamic Centre Saudi Arabia Sharia Sol W. Sanders SOROS Syria Terrorism Toronto US USA women's rights

Footer

About ACD

ACD is a New York-based 501(c)(3) not-for-profit organization, which monitors and exposes the enemies of freedom and their modus operandi, and explores pragmatic ways to counteract their methods.

Endorsements

"The ACD/EWI ability to predict future threats is second to none"

- R. James Woolsey, former Director of Central Intelligence

- - - More Endorsements - - -

Follow ACD!

  • facebook
  • twitter
  • youtube
  • linkedin

Copyright © 2025 | The American Center for Democracy is a 501(c)(3) non-profit organization. Your contribution is tax-deductible to the fullest extent of the law.