Egyptian Actions Highlight Dangers in U.S. Cybersecurity Proposals

The Egyptian regime’s shutdown of the Internet in an attempt to preserve its political power highlights the dangers of any government having unchecked power over our Internet infrastructure, and puts a fine point on the risks to democracy posed by recent Congressional proposals to give the President a broad mandate to dictate how our internet service providers respond to cyber-emergencies.

While the 2010 Senate Cybersecurity bill (sponsored by Senators Lieberman, Collins, and Carper) was an improvement on its draconian predecessors, the lesson of Egypt is that no one, not even the President of the United States, should be given the power to turn off the Internet.

Any proposal to give the President the ability to interfere with Internet access of Americans— whether to address cyber-attacks or for any other reason—must be tightly circumscribed. It must be limited to situations where there are serious and demonstrable external security threats and must be strongly checked by both Congressional and court review, to ensure that Internet users’ rights to freely and privately publish and communicate over the Internet are protected.

The U.S. Constitution has no provision suspending our rights during emergencies and Congress shouldn’t try to create one either. EFF and a host of other organizations raised these and other concerns about the 2010 Cybersecurity Bill, and we will continue to raise them as the 2011 Congress takes up cybersecurity again.

This commentary was written by Cindy Cohn, and was first published on Electronic Frontier Foundation.

Related Posts

Google’s Lack of Transparency and Openness in the Android Market Will Hurt More Than... The vast open landscape for users, developers, and industry that Google announced with the release of Android has been growing narrower and more opaqu...
Protect the API Keys to your Cloud Kingdom API keys to become first class citizens of security policies, just like SSL keys Much lip service is paid to protecting information in the Cloud, b...
CAPTCHAs With Chaos: Strong Protection for Weak Passwords The passwords of the future could become more secure and, at the same time, simpler to use. Researchers at the Max Planck Institute for the Physics...
EFF’s Guide to Protecting Electronic Devices and Data at the U.S. Border Amid recent reports that security researchers have experienced difficulties at the United States border after traveling abroad, we realized that it's ...
CYOD, BYOD In the CYOD world, users are given a choice between several, purposefully selected Operating Systems. Depending on the environment, iOS and Android ar...
Benefits of the MeeGo Software Platform The MeeGo open source project is unique in that it offers benefits to everyone in the ecosystem starting from the developer all the way up to the oper...

We Recommend These Vendors and Free Offers

ContainerizeThis 2016 is a free, 2-day conference for all things containers and big data. Featured, will be presentations and free, hands-on workshops. Learn more at

Launch an SSD VPS in Europe, USA, Asia & Australia on Vultr's KVM-based Cloud platform starting at $5:00/month (15 GB SSD, 768 MB of RAM).

Deploy an SSD Cloud server in 55 seconds on DigitalOcean. Built for developers and starting at $5:00/month (20 GB SSD, 512 MB of RAM).

Want to become an expert ethical hacker and penetration tester? Request your free video training course of Online Penetration Testing and Ethical Hacking

Whether you're new to Linux or are a Linux guru, you can learn a lot more about the Linux kernel by requesting your free ebook of Linux Kernel In A Nutshell.

One Comment

  1. Pingback: Tweets that mention Egyptian Actions Highlight Dangers in U.S. Cybersecurity Proposals --

Leave a Comment

Your email address will not be published. Required fields are marked *