Egyptian Actions Highlight Dangers in U.S. Cybersecurity Proposals

The Egyptian regime’s shutdown of the Internet in an attempt to preserve its political power highlights the dangers of any government having unchecked power over our Internet infrastructure, and puts a fine point on the risks to democracy posed by recent Congressional proposals to give the President a broad mandate to dictate how our internet service providers respond to cyber-emergencies.

While the 2010 Senate Cybersecurity bill (sponsored by Senators Lieberman, Collins, and Carper) was an improvement on its draconian predecessors, the lesson of Egypt is that no one, not even the President of the United States, should be given the power to turn off the Internet.

Any proposal to give the President the ability to interfere with Internet access of Americans— whether to address cyber-attacks or for any other reason—must be tightly circumscribed. It must be limited to situations where there are serious and demonstrable external security threats and must be strongly checked by both Congressional and court review, to ensure that Internet users’ rights to freely and privately publish and communicate over the Internet are protected.

The U.S. Constitution has no provision suspending our rights during emergencies and Congress shouldn’t try to create one either. EFF and a host of other organizations raised these and other concerns about the 2010 Cybersecurity Bill, and we will continue to raise them as the 2011 Congress takes up cybersecurity again.

This commentary was written by Cindy Cohn, and was first published on Electronic Frontier Foundation.

Related Posts

No double standards: supporting Google’s push for WebM We've signed up as a supporter of the WebM Project, and we encourage other foundations and organizations to join us—write to webmaster @@@ webmproj...
Does disk encryption really protect your data from unauthorized access? Disk encryption is one of several physical security measures that could be used to protect data on your computer from unauthorized physical access. An...
Wikileaks Mirror Taken Down: Host Buckles Under Demands from Upstream Provider Wikileaks isn't the only site struggling to stay up these days because service providers are pulling their support. It appears that at least one perso...
The Message of Firesheep: “Baaaad Websites, Implement Sitewide HTTPS Now!” The Firesheep Firefox extension has been scaring users across the Internet since its introduction at the Toorcon security conference this past weekend...
He can steal your smart phone’s and tablet’s encryption keys If you think that the encryption keys that your smart phone or tablet computer uses to protect data you want to keep others from accessing is secure, ...
Is the Wuala cloud storage service truly private? Wuala is a cloud storage service by LaCie, a computer storage and display outfit. Like all cloud storage services, Wuala makes it easy for you to back...

We Recommend These Vendors and Free Offers

Launch an SSD VPS in Europe, USA, Asia & Australia on Vultr's KVM-based Cloud platform starting at $5:00/month (15 GB SSD, 768 MB of RAM).

Deploy an SSD Cloud server in 55 seconds on DigitalOcean. Built for developers and starting at $5:00/month (20 GB SSD, 512 MB of RAM).

Want to become an expert ethical hacker and penetration tester? Request your free video training course of Online Penetration Testing and Ethical Hacking

Whether you're new to Linux or are a Linux guru, you can learn a lot more about the Linux kernel by requesting your free ebook of Linux Kernel In A Nutshell.


One Comment

  1. Pingback: Tweets that mention Egyptian Actions Highlight Dangers in U.S. Cybersecurity Proposals -- Topsy.com

Leave a Comment

Your email address will not be published. Required fields are marked *

*