Capitol Hill was repeatedly rocked last year by news concerning two of the worst cyberattacks in American history—the Russian government’s hacking and disinformation campaign to influence the 2016 presidential election, and the theft of nearly 150 million Americans’ sensitive data from credit-rating agency Equifax.
The attacks and their ongoing fallout sparked a series of fist-pounding congressional hearings, along with a deluge of cybersecurity legislation designed to address shortcomings in both the civilian and national security sectors. But as midterm elections loom and lawmakers jockey over fast-evaporating floor time, it’s increasingly clear that Congress is unlikely to pass meaningful cybersecurity provisions before the end of this legislative cycle.
Andrew Howell, a cybersecurity lobbyist at Monument Policy Group, puts those chances at around 10 percent. Howell said he had hoped the sheer magnitude of the Equifax hack would cause lawmakers and business interests to unite on a comprehensive data-breach-notification bill.
“I think if people had wanted to change data-breach rules, they could have turned Equifax into a pivot point,” he said. “But instead they chose to have the same old fight again, and expect a different outcome.”
It’s not just Equifax. Legislation to protect critical infrastructure from cyberattack, to strengthen protections around the “Internet of Things,” to update financial cybersecurity requirements and to bolster the security of election systems have all been proposed and debated during this Congress. And several lawmakers have repeatedly harangued the White House and national-defense agencies to develop a coherent cyberstrategy that prevents and deters the electronic aggression emanating from Russia and other foreign adversaries.
All of those efforts—so far, at least—continue to come up short.
Crafting significant legislation in any policy space is no easy task, particularly in a political climate riven by partisanship. But experts and lawmakers alike believe that when it comes to cybersecurity, a unique confluence of factors has combined to make the issue particularly unmanageable in Congress.
Overlapping committee jurisdiction is perhaps the primary reason why cybersecurity provisions so frequently snarl on Capitol Hill. Issues such as health care, finance, homeland security, energy, commerce, and defense all play into questions on cybersecurity, and the heads of the committees covering those subjects will jealously guard their right to weigh in on proposed legislation.
The result can be an ungainly, time-consuming mess. Industry-focused cybersecurity bills are sent to die in up to a half-dozen committees, while defense cyberstrategy sessions bog down under the weight of too many lawmakers clamoring to be heard.
“It’s one of the major things I would change around here if I could,” said Democratic Rep. Jim Langevin, whose bill to create a national data-breach-notification standard has seen little movement since he introduced it following the Equifax hack last fall.
“I would have one primary committee in charge of cybersecurity, and drastically reduce the number of committees and subcommittees that have some jurisdiction over cyber,” Langevin said. “There’s too many right now, and it really limits our ability to get things done in a timely fashion.”
Sen. Ben Sasse, a Republican member of the Senate Armed Services Committee, echoed that assertion. In a confirmation hearing for the new head of U.S. Cyber Command last week, Sasse voiced his frustration that the White House and Pentagon still have not developed a comprehensive strategy to push back against foreign aggression in cyberspace.
In an interview with National Journal, Sasse said one of the chief reasons for that paralysis is an overstuffed intelligence community—as well as the lawmakers who enable it.
“One of the reasons why we have 17 intelligence agencies—and everybody knows there are too many—is that a whole bunch of jack wagons over here want to maintain all their prerogatives by keeping all their committees,” Sasse said. “We have too many intelligence-community bureaucracies, and we have too many oversight committees. Of course we should be rethinking a lot of that jurisdiction.”
Some experts see a lack of technical expertise as another hurdle. Cybersecurity’s emergence as a major policy arena is still ongoing, and the technology and networks that underpin it continue to shift and evolve. That can make it difficult for industry experts to understand—and near-impossible for those lawmakers who rarely even use the internet.
“I think we’re still behind the curve in terms of getting that expertise about cybersecurity on the Hill,” said Betsy Cooper, a cybersecurity researcher at the University of California (Berkeley). “It’s not due to a lack of interest. It’s just due to a lack of having the same vocabulary and being able to understand what particular pieces of legislation would do in practice.”
Some experts even question whether Congress really wants to increase cybersecurity, at least on the civilian side. American spies and signals analysts need those vulnerabilities in software and hardware in order to surveil foreign targets effectively. If Congress were to close too many of those loopholes, it could limit the intelligence community’s ability to exploit them.
“There’s no way we have many of these offensive capabilities unless operating systems aren’t secure, widespread web-based applications aren’t secure, mobile apps and mobile devices aren’t secure,” said Daniel Castro, vice president of the Information Technology and Innovation Foundation. “We have a fundamentally broken policy.”
Finally, there’s the apathy of the voters themselves. Despite the headlines, there’s not much evidence to indicate that Americans are particularly riled up by Russia’s cybermeddling or ongoing breaches like Equifax. Unlike health care or immigration, there’s no natural constituency for cybersecurity—or at least, it’s a very small constituency.
That dynamic almost certainly makes a difference when lawmakers calculate the risks versus the rewards of pursuing cybersecurity legislation. “It’s hard for members of Congress and their staffers to see this as an issue that’s incredibly urgent,” said Castro.
“Look at the Equifax hack,” Castro added. “If something of that magnitude had happened in Europe, people would be losing their jobs in Congress, and there would be such an outcry. And there isn’t here.”
What We're Following See More »
"The U.K. is sharing secret intelligence about the nerve agent attack on a former spy with key allies, in an effort to persuade them to expel Russian diplomats across Europe, people familiar with the matter said. ... May will deliver a hard-hitting warning over the threat posed to the whole of Europe by Vladimir Putin’s government during a dinner with fellow leaders at the EU summit in Brussels on Thursday."
President Trump is planning to announce new sanctions against Chinese technology companies Thursday, and China may respond "by targeting U.S. agricultural exports from Farm Belt states," including "soybeans, sorghum and live hogs ... The U.S. is among the top suppliers of these products to China." The Chinese sanctions are being calibrated to target states "that helped elect Donald Trump in 2016."
"Federal prosecutors have dropped charges against 11 of 15 members of Turkish President Recep Tayyip Erdogan’s security team who were accused in connection with the beating of protesters during their visit to Washington last year, the latest twist in a case that caused a diplomatic rift between the U.S. and Turkey. The decision by the U.S. to prosecute the 15 men added to political strains as the Trump administration was trying to reset relations with Turkey, a key U.S. ally in the fight against Islamic State. Prosecutors first asked a judge in November to dismiss charges against four members of Mr. Erdogan’s security detail. Then they dropped charges against seven others on Feb. 14, the day before Secretary of State Rex Tillerson flew to Ankara for a meeting with Mr. Erdogan meant to ease tensions."