Cybersecurity and the Role of the President.
- Mr. Maytham & Dr.Smith
- Oct 12, 2016
- 3 min read

Cybersecurity and the role of the President are interesting yet very important subject to discuss. I think that the congress has to pass cohesive Cybersecurity bill but not just a bill. When we talk about technology and information technology and its use, we have to understand that we will be entering a different world. A world that has literally no limitation. A world where information can travel at the speed of light; it can be so useful building goods or terminating nations. Thus, we have to approach this matter from different point of view and the increase in the capability of technology and the flow of information.
Cybersecurity is a space where information can be exchange, travel and or used. Thus, securing it is a vital matter. However, the moment we open the discussion of cybersecurity, the civil liberty and privacy issue rises. It is indispensable from one another. If we want to discuss putting rules and regulations on the cyber space then by definition we will limit the freedom of its use, some may say. Putting it in perspective, we have to ask, when the executive branch wants to regulate the cyberspace, is that including the public or only the government facilities? See, it is become harder and harder for the President or any government agency and or privet sector to control the Cyberspace and the Internet. Some people think that as soon as we put limitations, we will isolate our self and limit our liberties. I think we have to make superior Cybersecurity firewalls and defense system to prevent any breach. In 2016 alone, there were 584 Breaches and 20,525,697 exposed, according to ITRC. That shows us the amount of attempts and the high demand for data and information, thus, the need for Cybersecurity is must. However, without cohesive and collaborative work and real commitments from all the world governments and agencies to develop safe Cyberspace to prevent any breach from happening.
Moreover, internet is global, thus, we have to consider other countries initiatives and regulations. This is an open space with no borders. Therefore, the U.S President has to negotiate straightforwardly with other countries leaders in order to put forward a real Cyberspace and Cybersecurity regulation with tangible firm commitment from all the countries in the world. Other than that, all what we can do is build our high tech advance cybersecurity to prevent any breach. Giving that nature of the political system in U.S, the checks and balance and the bureaucracy, the President has vast job to do in order to develop, convince and make a new legislation for Cybersecurity. For example, when the President signed the executive order in 2013 for Cybersecurity, the Idea was protections. But we saw during this election many Cybersecurity breaches. The DNC had Cyber breach and over 100 officials and groups had been exposed, according to The New York Times article. (Parlapiano, 2016) And by the way the Experian Data Breach Industry Forecast did predict that in 2016 U.S presidential candidates and campaigns will be attractive hacking targets. Also it indicated that 64 percent of registered U.S voters believe that some cyber breach will happen during the presidential campaign. Thus, it is an intricate issue and I think unless we stop seen it as national issue and start address it as Global issue, no U.S or any government president can fix this issue of Cybersecurity alone.
The President has some uncertain elements that includes (the courts, public opinion, media and global issues) on top of his existing limits and constraints such as (time, information, bureaucracy, congress states and local governments, political parties and finally groups and social movements). All these, make the equation rather more complex than easy for the President to take and or shape a decision. For example, George W. Bush respond to 11 Sep attacks and the global war on terror. Here we have to understand that Power is the ability to influence the surrounding environment, according to Rosati text.
Reference:
Data breach industry forecast (2015) Available at: http://www.experian.com/assets/data-breach/white-papers/2016-experian-data-breach-industry-forecast.pdf
(Accessed: 17 August 2016).
Foreign policy Cyber security (2015) Available at: https://www.whitehouse.gov/issues/foreign-policy/cybersecurity
(Accessed: 17 August 2016).
Parlapiano, A. (2016) What we know about the Cyberattack on democratic politicians. Available at: http://www.nytimes.com/interactive/2016/08/16/us/politics/cyberattack-on-democratic-politicians-dnc.html?_r=0
(Accessed: 17 August 2016).
Rosati Jerel A. Cengage Advantage Book: The Political of Unites States Foreign Policy, 6th Edition. Cengage Learning, 20130111. VitalBook file.
(2016) Available at: http://www.idtheftcenter.org/images/breach/ITRCBreachReport2016.pdf
(Accessed: 17 August 2016).
Comments