Capitol Hill was repeatedly rocked last year by news concerning two of the worst cyberattacks in American history—the Russian government’s hacking and disinformation campaign to influence the 2016 presidential election, and the theft of nearly 150 million Americans’ sensitive data from credit-rating agency Equifax.
The attacks and their ongoing fallout sparked a series of fist-pounding congressional hearings, along with a deluge of cybersecurity legislation designed to address shortcomings in both the civilian and national security sectors. But as midterm elections loom and lawmakers jockey over fast-evaporating floor time, it’s increasingly clear that Congress is unlikely to pass meaningful cybersecurity provisions before the end of this legislative cycle.
Andrew Howell, a cybersecurity lobbyist at Monument Policy Group, puts those chances at around 10 percent. Howell said he had hoped the sheer magnitude of the Equifax hack would cause lawmakers and business interests to unite on a comprehensive data-breach-notification bill.
“I think if people had wanted to change data-breach rules, they could have turned Equifax into a pivot point,” he said. “But instead they chose to have the same old fight again, and expect a different outcome.”
It’s not just Equifax. Legislation to protect critical infrastructure from cyberattack, to strengthen protections around the “Internet of Things,” to update financial cybersecurity requirements and to bolster the security of election systems have all been proposed and debated during this Congress. And several lawmakers have repeatedly harangued the White House and national-defense agencies to develop a coherent cyberstrategy that prevents and deters the electronic aggression emanating from Russia and other foreign adversaries.
All of those efforts—so far, at least—continue to come up short.
Crafting significant legislation in any policy space is no easy task, particularly in a political climate riven by partisanship. But experts and lawmakers alike believe that when it comes to cybersecurity, a unique confluence of factors has combined to make the issue particularly unmanageable in Congress.
Overlapping committee jurisdiction is perhaps the primary reason why cybersecurity provisions so frequently snarl on Capitol Hill. Issues such as health care, finance, homeland security, energy, commerce, and defense all play into questions on cybersecurity, and the heads of the committees covering those subjects will jealously guard their right to weigh in on proposed legislation.
The result can be an ungainly, time-consuming mess. Industry-focused cybersecurity bills are sent to die in up to a half-dozen committees, while defense cyberstrategy sessions bog down under the weight of too many lawmakers clamoring to be heard.
“It’s one of the major things I would change around here if I could,” said Democratic Rep. Jim Langevin, whose bill to create a national data-breach-notification standard has seen little movement since he introduced it following the Equifax hack last fall.
“I would have one primary committee in charge of cybersecurity, and drastically reduce the number of committees and subcommittees that have some jurisdiction over cyber,” Langevin said. “There’s too many right now, and it really limits our ability to get things done in a timely fashion.”
Sen. Ben Sasse, a Republican member of the Senate Armed Services Committee, echoed that assertion. In a confirmation hearing for the new head of U.S. Cyber Command last week, Sasse voiced his frustration that the White House and Pentagon still have not developed a comprehensive strategy to push back against foreign aggression in cyberspace.
In an interview with National Journal, Sasse said one of the chief reasons for that paralysis is an overstuffed intelligence community—as well as the lawmakers who enable it.
“One of the reasons why we have 17 intelligence agencies—and everybody knows there are too many—is that a whole bunch of jack wagons over here want to maintain all their prerogatives by keeping all their committees,” Sasse said. “We have too many intelligence-community bureaucracies, and we have too many oversight committees. Of course we should be rethinking a lot of that jurisdiction.”
Some experts see a lack of technical expertise as another hurdle. Cybersecurity’s emergence as a major policy arena is still ongoing, and the technology and networks that underpin it continue to shift and evolve. That can make it difficult for industry experts to understand—and near-impossible for those lawmakers who rarely even use the internet.
“I think we’re still behind the curve in terms of getting that expertise about cybersecurity on the Hill,” said Betsy Cooper, a cybersecurity researcher at the University of California (Berkeley). “It’s not due to a lack of interest. It’s just due to a lack of having the same vocabulary and being able to understand what particular pieces of legislation would do in practice.”
Some experts even question whether Congress really wants to increase cybersecurity, at least on the civilian side. American spies and signals analysts need those vulnerabilities in software and hardware in order to surveil foreign targets effectively. If Congress were to close too many of those loopholes, it could limit the intelligence community’s ability to exploit them.
“There’s no way we have many of these offensive capabilities unless operating systems aren’t secure, widespread web-based applications aren’t secure, mobile apps and mobile devices aren’t secure,” said Daniel Castro, vice president of the Information Technology and Innovation Foundation. “We have a fundamentally broken policy.”
Finally, there’s the apathy of the voters themselves. Despite the headlines, there’s not much evidence to indicate that Americans are particularly riled up by Russia’s cybermeddling or ongoing breaches like Equifax. Unlike health care or immigration, there’s no natural constituency for cybersecurity—or at least, it’s a very small constituency.
That dynamic almost certainly makes a difference when lawmakers calculate the risks versus the rewards of pursuing cybersecurity legislation. “It’s hard for members of Congress and their staffers to see this as an issue that’s incredibly urgent,” said Castro.
“Look at the Equifax hack,” Castro added. “If something of that magnitude had happened in Europe, people would be losing their jobs in Congress, and there would be such an outcry. And there isn’t here.”
What We're Following See More »
"Trump is ready to oust Lt. Gen. H.R. McMaster and find a new national security adviser before the North Korea meetings in May, multiple sources told CNN Thursday. The move may be delayed because there's no final decision on a replacement, sources say. The timing of an announcement is unclear -- one source said it could come as soon as Friday, though others say that is unlikely."
"Robert S. Mueller III has subpoenaed the Trump Organization to turn over documents, including some related to Russia, according to two people briefed on the matter. The order is the first known time that the special counsel demanded documents directly related to President Trump’s businesses." The subpoena is proof that the investigation will likely drag on "for at least several more months," and also indicates Mueller may be "broadening his investigation to examine the role foreign money may have played in funding Mr. Trump’s political activities."
"Documents marked 'HIGHLY CONFIDENTIAL PROCEEDING' for the first time tie President Donald Trump’s flagship holding company to the continuing effort to silence a former adult-film actress who says she had an affair with Mr. Trump. A Trump Organization lawyer, Jill A. Martin, is listed as counsel in an arbitration demand for Essential Consultants LLC, a Delaware company formed by Mr. Trump’s personal lawyer and used to pay $130,000 to Stephanie Clifford in exchange for her silence, according to Feb. 22 arbitration documents filed in Orange County, Calif."