The Government Just Can’t Get Its Act Together on Regulating Cybersecurity

What's to come?
June 19 2014 12:02 PM

Unto the Breach

The FCC chairman shouldn’t make government regulation of cybersecurity seem like a last resort.

Tom Wheeler.
Federal Communications Commission Chairman Tom Wheeler speaks during a meeting on May 15, 2014, at the FCC headquarters in Washington.

Photo by Alex Wong/Getty Images

Is there any part of the U.S. government that is not looking to ramp up its involvement in cybersecurity issues? The latest organization to join the likes of the Department of Defense, Department of Homeland Security, Department of Treasury, Federal Trade Commission, and National Institute of Standards and Technology in the quest to secure cyberspace is the Federal Communications Commission, whose chairman, Tom Wheeler, gave a speech at the American Enterprise Institute on June 12 outlining the need for a “new paradigm for cyber readiness.” There’s a cybersecurity turf war in the making for government departments and agencies, but no one seems to be offering concrete actions, steps, or plans for addressing these issues.

Take the FCC’s “new paradigm”—a “private sector–led effort” that Wheeler said “must be more dynamic than traditional regulation and more measurably effective than blindly trusting the market or voluntary best practices.” He added that it “must be real and meaningful. It has to work.” In other words: It has to be better than what we have now. Now, Wheeler’s not wrong—addressing cybersecurity will require more dynamic defense and a better grasp of security metrics and measurement than we currently have—but so far there are no specifics, no direction, no clear vision for how he, or anyone else in the U.S. government, is planning to achieve those goals. And that’s a pity, because he, and the FCC and the other government actors interested in helping industry protect against cybersecurity threats, are actually in a position to add some pretty vital pieces to this puzzle. But those pieces have nothing to do with abstract concepts of paradigms and frameworks—they have to do with facts and data.

So what should the government’s role—or roles—be here? A government agency that collected data from firms about the threats they face, the security incidents they experience, the vulnerabilities they see exploited, and the techniques and tools they use—both successfully and unsuccessfully—could be a tremendous force for good here. It could use that data to talk in very specific terms about what works and what doesn’t when it comes to preventing and detecting intrusions, about what engineering design decisions might help mitigate the most serious threats and vulnerabilities we see, and where researchers should be focusing their attention.


It’s true that such data collection and analysis efforts could be industry-led, but for that to happen, companies would have to share data voluntarily with their competitors and release information about security incidents that could be embarrassing and even damaging to their reputations. The government could try to facilitate this in a number of ways—anonymizing reported data, acting as an aggregator for data from competing companies, setting a standardized template for what information should be reported and how. Existing and proposed data breach laws tend to focus on notifying and protecting consumers but often do not include measures to help us learn from those incidents about what went wrong and what could be done better next time. Protecting people from credit card fraud and identity theft is important in the wake of a security breach, but so is digging into the root cause of the breach and assessing what defenses were in place when the breach occurred and how they were bypassed or circumvented. Companies may choose to do that analysis individually to learn from their mistakes, but that information has much broader value when it can be pooled with data about breaches at other firms to find trends and inform a wider audience.

There’s a tremendous amount that a government actor like the FCC could potentially contribute in this space, which is why it’s so frustrating to see them instead wielding policy and regulatory interventions as a threat rather than an opportunity. Of course, companies are always reluctant to be regulated, and nothing Wheeler says is likely to change that instinct. All the same, there’s something demoralizing about seeing that perspective so strongly reinforced by the regulators themselves—especially when talking about an area where the government has so much to offer.

Wheeler calls out the “communications sector” as the target of his remarks but doesn’t specify exactly which kinds of firms are included in his message, and whether they go beyond the service providers typically regulated by the FCC. Many companies, across all sectors, are already subject to data breach notification laws in several states, and the Obama administration has pushed for a federal standard governing incident reporting in the wake of the Target breach, but the focus of those efforts has not been on learning about security threats and trends. Instead, they aim to help consumers receive prompt notification when their information may have been released. Speaking to the Senate Judiciary Committee in February to encourage a federal standard, Assistant Attorney General Mythili Raman said: “American consumers should know when they are at risk of identify theft or other harms because of a data security breach.” That’s a valuable role for the government to play, but it’s not the only one—and it’s not the only thing that needs to happen after a security breach.

In encouraging companies—and particularly the large telecommunications companies—to usher in this new paradigm, Wheeler warned: “It has to work. The commission’s commitment to market accountability will help ensure that it does work. And, while I am confident that it will work, we must be ready with alternatives if it doesn’t.” The implied message to industry: You fix this, or we’ll fix it for you. That strategy of scaring companies to force them to act may effectively play to industry’s fear of regulation, but it doesn’t set the stage for a future in which problems are addressed with a mix of private and public solutions. He’s perpetuating the idea that the government has nothing positive to offer industry when it comes to addressing computer security threats and the feeling that industry, rather than being helped along, is being bullied.

Wheeler immediately followed on those comments by cautioning headline writers not to start scrawling “FCC wants to regulate cyber” across the front page. And certainly that’s not the message of his talk—if anything, his comments seem to suggest an FCC that desperately does not want to regulate in this area. But the press did pick up on the threat, and some of the headlines that resulted were not necessarily more encouraging: “FCC: Companies Must Step Up to Improve Cybersecurity or Else... ” or “FCC Throws Down Cyber Gauntlet to Communications Industry.”

There are lots of potentially promising hints in Wheeler’s speech as well—especially in his emphasis on a truly critical question that is often overlooked by public and private actors alike: “How will we measure success or failure” when it comes to assessing cybersecurity efforts?

“This is the toughest and most important question that our stakeholders have to answer,” Wheeler said. He’s right about how tough and how important it is, but he’s wrong about it being the sole responsibility of the FCC’s stakeholders. Any kind of serious measurement endeavor will require considerably more data on the existing threats we face and the effectiveness of the defenses against them than we currently have. If the FCC, or any other government body, wants to drive things forward in this space, it should be thinking about whether there’s an active role for it to play in collecting, aggregating, and analyzing that data—not as a way to terrorize firms, but as a way to help them.

Government participation in this huge national challenge should be a promise, not a threat, and instead of vague paradigms and fuzzy rhetoric, it should be focused on cold, clear data.

This article is part of Future Tense, a collaboration among Arizona State University, the New America Foundation, and Slate. Future Tense explores the ways emerging technologies affect society, policy, and culture. To read more, visit the Future Tense blog and the Future Tense home page. You can also follow us on Twitter.

Josephine Wolff is a Ph.D. candidate in the Engineering Systems Division at the Massachusetts Institute of Technology studying cybersecurity and Internet policy.



Talking White

Black people’s disdain for “proper English” and academic achievement is a myth.

Hong Kong’s Protesters Are Ridiculously Polite. That’s What Scares Beijing So Much.

The One Fact About Ebola That Should Calm You: It Spreads Slowly

Operation Backbone

How White Boy Rick, a legendary Detroit cocaine dealer, helped the FBI uncover brazen police corruption.

A Jaw-Dropping Political Ad Aimed at Young Women, Apparently

The XX Factor
Oct. 1 2014 4:05 PM Today in GOP Outreach to Women: You Broads Like Wedding Dresses, Right?

How Even an Old Hipster Can Age Gracefully

On their new albums, Leonard Cohen, Robert Plant, and Loudon Wainwright III show three ways.

How Tattoo Parlors Became the Barber Shops of Hipster Neighborhoods

This Gargantuan Wind Farm in Wyoming Would Be the Hoover Dam of the 21st Century

Oct. 1 2014 8:34 AM This Gargantuan Wind Farm in Wyoming Would Be the Hoover Dam of the 21st Century To undertake a massively ambitious energy project, you don’t need the government anymore.
  News & Politics
Oct. 1 2014 7:26 PM Talking White Black people’s disdain for “proper English” and academic achievement is a myth.
Buy a Small Business
Oct. 1 2014 11:48 PM Inking the Deal Why tattoo parlors are a great small-business bet.
Oct. 1 2014 6:02 PM Facebook Relaxes Its “Real Name” Policy; Drag Queens Celebrate
  Double X
The XX Factor
Oct. 1 2014 5:11 PM Celebrity Feminist Identification Has Reached Peak Meaninglessness
  Slate Plus
Behind the Scenes
Oct. 1 2014 3:24 PM Revelry (and Business) at Mohonk Photos and highlights from Slate’s annual retreat.
Brow Beat
Oct. 1 2014 9:39 PM Tom Cruise Dies Over and Over Again in This Edge of Tomorrow Supercut
Future Tense
Oct. 1 2014 6:59 PM EU’s Next Digital Commissioner Thinks Keeping Nude Celeb Photos in the Cloud Is “Stupid”
  Health & Science
Oct. 1 2014 4:03 PM Does the Earth Really Have a “Hum”? Yes, but probably not the one you’re thinking.
Sports Nut
Oct. 1 2014 5:19 PM Bunt-a-Palooza! How bad was the Kansas City Royals’ bunt-all-the-time strategy in the American League wild-card game?