In the last 24 hours, a fresh draft of President Obama’s potential executive order on the issue of cybersecurity has been leaked, and widely critiqued.
As you will surely recall, TNW dove into the first draft of the order that was also leaked. However, that draft came as there was still a sliver of dawn left in the eyes of those who were pulling yet for a Congressional solution to the issue; the order was therefore almost a stick waved over the issue, looking for an arse to switch.
So. Much. Tech.
Some of the biggest names in tech are coming to TNW Conference in Amsterdam this May.
Congress failed. For a more granular look at the issue, this article will catch you up. The short version is that key differences in perspective from the two parties in chambers of Congress led to an impasse in the Senate, and a bill passed in the House that was awarded a promised veto. Congress Congress’d, in short.
Now, past the election, the President is back on the dime with the issue, floating another draft of the order. It’s almost as if they want to check our temperature a second time on the matter. The White House, if it so chooses, is expected to put forth the order in the next 60 to 90 days.
Now, to the content of the order. TNW is not going to drag you through the text on a paragraph by paragraph basis. If the order appears to be heading towards inaction, expect a unkindly specific breakdown of its tenets. For now, however, we turn to two publications for their expert take on the changes contained in the new draft.
The Hill is succinct in explaining what could be privacy changes to the order, which could blunt or dodge criticism that has been a key instigator of publuc outrage concerning Internet-bills of late:
The latest set of edits come after White House officials have met with the various tech trade associations and the influential U.S. Chamber of Commerce over the last few weeks about recommendations they have for the executive order.
Once key privacy advocates have had more time to pore over the text, we’ll have more on the temperature of response to those changes.
Next we turn to the sharp-tongued TechDirt which has been a critical voice in the cybersecurity debate. Their acerbic summary of the bill is worthy:
It’s basically more of the same. It insists that there’s a problem without providing any real evidence of that. Much of the order focuses on increasing information sharing among and between different government agencies. As expected, it’s designed to encourage private companies, who are “owners and operators of critical infrastructure” to “participate, on a voluntary basis, in the Enhanced Cybersecurity initiative.” This is part of what had people so concerned about the various bill proposals: whether or not companies would get broadly defined as “owners and operators of critical infrastructure” and then be forced or pressured into sharing private information, all in the name of “cybersecurity!”
It’s worth comparing the beltway perspective of The Hill to the more renegade TechDirt’s tone.
For now it is safe to bet that we’re dealing with something that is a bit more than a trial balloon. Movement on this issue is likely.
Top Image Credit: Mark Skrobola