White House, Lawmakers Discuss New Cybersecurity Bill (CISPA)

Share Button

White House Discusses Cyber Security ThreatsAccording to a February 26, 2013 joint resolution of Congress, the U.S. requires better coordination of cybersecurity research and development efforts between public and private sectors. Reuters reports that that the U.S. House Intelligence Committee and the White House have resumed negotiation on a new cybersecurity bill called the Cyber Intelligence Sharing and Protection Act (CISPA).

The bill is intended to remove legal hurdles that prevent the federal government and private companies from sharing intelligence about cyber threats with each other in real time.

The House passed a similar bill last year, but it failed in the Senate.

Save on VoIP Phone and Internet in Dallas.

US. House Intelligence Committee Chairman Mike Rogers (R-Mich.) said the two sides are “very close” to an agreement over what roles the Department of Homeland Security (DHS) and other government agencies might have in keeping the country safe from cyber threats.

Rogers hopes to wrap up negotiations and draft a bill by April.  Current discussions are informal and no text has been drafted to date. Rogers says a renewed interest in the talks has been generated due to increasing worries about the cost of cyber attacks.  “What helped is that the New York Times, Washington Post and Wall Street Journal were all hacked and they talked about it publicly,” he told Reuters. “It is starting to raise awareness. I can feel movement.”

Additionally, Iran’s denial-of-service attacks against U.S. banks in recent months have also heightened awareness around the need for a new bill. Rogers called such attacks a “probing action” and said additional attacks would likely follow.

According to Rep. Dutch Ruppersberger (D-Md.), one of the sticking points in negotiations is whether or not businesses should be required to strip personally identifiable information from information they share with the government.  “We’re going to try to do what we can to deal with the issue,” he said. “I think if we can resolve this, we can probably get a bill passed. You’re not going to please everybody, but I think we can get a bill.”

Secure your business against cyber threats with managed network services from Vergent.

Both Ruppersberger and Rogers said the U.S. government should also put more pressure on countries like China to stop hacker attacks designed to steal intellectual property from American companies.

House members told Reuters that the country cannot focus on confronting economic espionage from China and other countries until the bill is written and signed into law.





Share Button


  1. I thought voip is supposed to be safer than traditional lines, isnt it? Can voip calls still be intercepted and tapped?

    • All calls can be intercepted and tapped with the right equipment and authorization. But there are different levels of security inherent in different types of VoIP. For example, VoIP over the internet (ie, Skype) is not as secure as VoIP over a private network (ie, as in corporate communications solutions). Hope that answers your question!

      • This is not new here either… We are and have been doing this near the mdldie of 2004.Every piece of electronic information is in storage… That is trillions of tiny pieces… It is preserved and anyone with access can go back and dig up pieces of one’s past, to which even they have no record of…This opens probable cause wide open…Repeat this is not new… I have (although not for a while) illuminated where the access points are, the storage areas are, and the extent of the amount collected.There is a bright spot.. should we suffer an EMP, we could download our past history back into our user files..Without such, almost all learning stored electronically would be lost forever… We might vaguely remember something, but we could not access the detailed knowledge as we do today…We would instantly return to the 1930s,,So in essence even though our privacy can be violated simply at one’s whim, as a scientist, if our society is to maintain it’s current rate of its advanced application to data, this program needs to continue….Many complain about Tom Carper’s move away from his elected values… The answer as to why, is buried in data currently kept hidden for a price…

    • I agree with stopping the cyber egsponaie. I do not agree with building massive firewall like the one china has built with the “ultimate on/off” switch. Nor do I agree with the current government building a massive data collection system that is aimed at collecting information on the citizens in this country. As to businesses in creating and installing IDS and firewall systems, have at it. However Businesses see computer and network security as wasted money that could have been rolled into profits. They do not prioritize security as well as they should. On the flip side, DOD has been following the corporate mindset and planning in it’s latest systems. Their managers take on this is “if it’s good enough for civilian corporate, it’s good enough for us”. Unfortunately this idea of saving money by centralizing and building top-down command and control will be to their undoing. Army G6 is now filled with a lot of young punks that were not around when the network was built for survivability and redundancy. Sad to say the chinese will be eating our lunches because of piss poor planning by those that are too political, don’t understand, don’t care, don’t think it’s a priority.


Submit a Comment

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>