Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
Government The Internet

A Guide To the 5 Cybersecurity Bills Now Before Congress 17

blottsie writes: At press time, the House had passed two cybersecurity bills, one Senate bill had been passed out of committee and reported to the full chamber for a final vote, and a third House bill and a second Senate bill were awaiting review by the appropriate committee. The two House bills that passed earlier this week will be combined and sent to the Senate, but the Senate won't take up them up directly; instead, it will vote on its own two bills. It's complicated, so here's a quick breakdown of the key details.
This discussion has been archived. No new comments can be posted.

A Guide To the 5 Cybersecurity Bills Now Before Congress

Comments Filter:
  • TLDR (Score:5, Insightful)

    by xxxJonBoyxxx ( 565205 ) on Saturday April 25, 2015 @01:58PM (#49551321)

    That's the "short" version? Yeesh. Anyway, here's what that article was trying to say:

    Two things are likely to pass:
    1) Cybersecurity Information Sharing Act: Lets Homeland Security invent regulations to let companies and governments at all levels share data about people. Good for law enforcement, bad for privacy and civil rights, good for corporations who share too much trying to please the government (because of a liability shield).
    2) Something else similar with some provisions keeping the NSA at arms length to molify the public, but I lost interest exactly what it was because the article was pretty confusing.

    • by AHuxley ( 892839 )
      A digital Berlin wall to find whistleblowers on any network and a new generation of private company boondoggle funding.
      Contractors and mil systems that once faced the Soviet Union are now invited in for domestic use via new "portals".
      Some Freedom of Information Act provision might allow for talking about projects historically but less of the secure in papers, and effects, against unreasonable searches domestically.
      The collective agencies are free from antitrust scrutiny, liability and are free use the cy
  • by Crashmarik ( 635988 ) on Saturday April 25, 2015 @02:07PM (#49551347)

    The word cyber has been abused to the point where it means little if anything.*

    *Of course to be fair nobody really understood what Norbert Weiner when he coined it to talk about self regulating control systems

  • Either way (Score:4, Funny)

    by ITRambo ( 1467509 ) on Saturday April 25, 2015 @02:15PM (#49551373)
    I hope that the elected officials in Congress, that promised to serve the public, actually read the bills before voting on them.
    • Re:Either way (Score:4, Insightful)

      by ATMAvatar ( 648864 ) on Saturday April 25, 2015 @02:27PM (#49551405) Journal
      Why bother? As long as they have the right letter (D or R) next to their name, the voting public couldn't care less what they do in office. The re-election rate of Congressmen has been over 90% for most election cycles in the last half century, and it never once dropped below 80% during that period.
    • by Chas ( 5144 )

      I hope that the elected officials in Congress, that promised to serve the public, actually read the bills before voting on them.

      AHAHAHAHAHAHA!!!

      That's funny.

      Basically, officials care about three things:

      1) Did THEY get money out of it?
      2) Is one of their pork projects rider'ed in on the bill?
      3) Was primary authorship of said bill under the proper wing of the US Political Monoparty?

  • Here is an outline of the response to this week's congressional activity from the Open Technology Institute at the New America Foundation:

    http://www.newamerica.org/oti/house-passes-second-flawed-cybersecurity-information-sharing-bill/

    To be completely transparent, I worked at OTI and think they are great.

    Will

  • Just great. We already share vulnerability reports through Mitre's CVE database. Mitre might as well be the DoD. The Pentagon already hosts several cyber warfare organizations. They seem to play well with NIST and its _National_ Vulnerabilities Database. We already have rules and regulations on submitting vulnerability data, and our customer will sue us if we reveal _any_ personal identifying information. We certainly aren't going to reveal any when publishing a vulnerability.

    So now Congress wants to

E = MC ** 2 +- 3db

Working...