Senator urges vote on cyber law before 'cyber 9/11' occurs

The Homeland Security and Governmental Affairs Committee chairman is calling on his congressional colleagues to quickly vote on cybersecurity legislation to protect vulnerable critical networks before a “cyber 9/11" happens.

Following a demonstration by the Homeland Security Department of how easily an adversary can hack into the operating systems of a critical network, Sen. Joseph Lieberman (I-Conn.) urged DHS be granted power to establish minimum cybersecurity standards for critical infrastructure systems.

In his June 13 floor speech, the senator cited an article that described how a "white hat" hacker from overseas was able to compromise the control panel of a South Houston, Texas, water utility in just 10 minutes.

The hacker, who calls himself pr0f, in November 2011 posted screen shots on pastebin.com of his intrusion to “prove his point that our nation’s Internet security is woefully lax and very little skill is needed to penetrate it,” Lieberman said.

The incident exemplifies “the urgent need to pass comprehensive cybersecurity legislation that includes provisions safeguarding our critical infrastructure,” the senator said.

Although the House has passed legislation that makes strides in securing federal information systems, Lieberman said the one he sponsors – the Cybersecurity Act of 2012 -- “is the better bill” because it addresses the need to protect the nation’s critical infrastructure. 

Passing the bipartisan effort needs to happen “so we can go to conference and iron out our differences with the House – and the time remaining to do this is grow¬ing short,” Lieberman said, referring to the lame duck session that is likely to focus on talks to reverse the sweeping budget cuts set to take effect Jan. 2, 2013.

“But we must get started because, I guarantee you Mr. President, that one day in the near future we will pass comprehensive cybersecurity legislation – but I fear it will be after an attack – a ‘cyber 9/11’ – where infrastructure is destroyed and lives lost,” Lieberman said.


 

About the Author

Camille Tuutti is a former FCW staff writer who covered federal oversight and the workforce.

The Fed 100

Read the profiles of all this year's winners.

Featured

  • Then-presidential candidate Donald Trump at a 2016 campaign event. Image: Shutterstock

    'Buy American' order puts procurement in the spotlight

    Some IT contractors are worried that the "buy American" executive order from President Trump could squeeze key innovators out of the market.

  • OMB chief Mick Mulvaney, shown here in as a member of Congress in 2013. (Photo credit Gage Skidmore/Flickr)

    White House taps old policies for new government makeover

    New guidance from OMB advises agencies to use shared services, GWACs and federal schedules for acquisition, and to leverage IT wherever possible in restructuring plans.

  • Shutterstock image (by Everett Historical): aerial of the Pentagon.

    What DOD's next CIO will have to deal with

    It could be months before the Defense Department has a new CIO, and he or she will face a host of organizational and operational challenges from Day One

  • USAF Gen. John Hyten

    General: Cyber Command needs new platform before NSA split

    U.S. Cyber Command should be elevated to a full combatant command as soon as possible, the head of Strategic Command told Congress, but it cannot be separated from the NSA until it has its own cyber platform.

  • Image from Shutterstock.

    DLA goes virtual

    The Defense Logistics Agency is in the midst of an ambitious campaign to eliminate its IT infrastructure and transition to using exclusively shared, hosted and virtual services.

  • Fed 100 logo

    The 2017 Federal 100

    The women and men who make up this year's Fed 100 are proof positive of what one person can make possibile in federal IT. Read on to learn more about each and every winner's accomplishments.

Reader comments

Fri, Jun 15, 2012 Scared

I sincerely hope this is NOT another bill that "we need to pass so we can read what's in it" situation. a badly concieved bill may grant extraordinary powers to DHS or its agencies that violate privacy and basic freedoms and rights of our citizens.

Thu, Jun 14, 2012 Another White Hat Earth

10 minutes my ass! The white hat had to have a team collecting information about the system weeks or months worth of work. If the white hat did not do any research beforehand then he had to have been given information about the system. Infrastructure systems are the most secure on the planet and they are usually compromised by insiders. An outsider would not attempt such a task to cut off his or her own water supply or electricity.

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group