Yes: Senate Republicans took an unprecedented step yesterday in preventing the invocation of cloture on their former colleague Chuck Hagel's nomination to be the Secretary of Defense. Here's The Hill
, the New York Times
, and the Washington Post
. That's not the only nominee who's getting delayed; there's also four-star Army General Lloyd Austin, the White House's pick to run CENTCOM. Senators have stalled Austin's confirmation, while demanding more details about the U.S. draw-down in Afghanistan, Carlo Munoz of The Hill says
Drone-alia: the FAA this week requested proposals from states interested in establishing experimental test ranges for unmanned aerial systems ("UAS"). The timing is interesting. §332(c) of the 2012 FAA authorization bill
requires the FAA to establish, within 180 days of the law's passage, a program "to integrate unmanned aircraft systems into the national airspace system at 6 test ranges"; and to operationalize any projects at those test ranges no less than 180 days after that project's establishment. But the bill literally does not obligate the FAA to name its test locations by a date certain. Thus, in this September 2012 letter
, FAA Acting Administrator Michael Huerta argued that the agency had established a program in accordance with the authorization bill's timeline. (In this way, he also appeared to challenge claims that the FAA, in not yet naming its test locations, had missed a deadline). So is the agency on time or running behind, test site-wise? Here's the AP
story about the FAA's announcement this week. (On that point, Wells authored a Brookings paper about the UAS provisions in the FAA reauthorization--take a look
Thom Shanker in the Times points out
a significant hurdle for the U.S. military, as it prepares for its 2014 Afghanistan draw-down deadline: removing all of the military equipment.
More and more local jurisdictions are taking a stand against the use of UAS in their airspace; thus, it was only a matter of time before members of Congress did the same. Representatives Ted Poe and Zoe Lofgren offered a bill requiring a warrant prior to using a drone in criminal cases. Here's Keith Laing of The Hill
on their bill
So the cybersecurity executive order is available. How well-timed, then, is this GAO report
suggesting that roles in cybersecurity policy need better definition and more effective implementation? GovInfoSecurity noted
the report's release on the Feast of St. Valentine's. Strengthening cyber policy certainly won't run counter to popular opinion. A survey by Tenable Network Security found that 92% of Americans believe public utilities are vulnerable to cyber attacks. Here's a Mashable story
on the survey's results.
Mark Clayton of the Christian Science Monitor reports
on experts' dissatisfaction with the executive order---the latter say it does not go far enough. At Bloomberg
, an editorial argues to the contrary, insisting that the President's order took sensible steps. The piece translates Obama's cyber-flavored remarks at the State of the Union as follows:
What he meant, but was perhaps too polite to say, was that in light of the ineptitude and cowardice Congress has shown on this matter, year after year, an executive order is probably the best we can hope for right now. As recent cyberattacks on the Federal Reserve, the Department of Energy, half a dozen major banks and a slew of media companies make clear, however, it won’t be adequate for very long.
Score: Europol has taken down what the Times
Raphael Minder calls
"one of the most efficient cybercrime organizations."
Now that Rep. Mike Rogers has confirmed that he plans
to reintroduce his cybersecurity information-sharing bill, privacy advocates are circling the wagons. Jennifer Martinez and Brandon Sasso of The Hill report
on the plans. Meanwhile, PCMag
takes a look at Rogers' bill---you likely know it as CISPA---and compares
the bill with the executive order.
DHS's National Protection and Programs Directorate and the National Institute of Standards and Technology have signed a memorandum of understanding ("MOU") that creates cross-agency working groups to collaborate on cybersecurity issues. Here's the MOU
For more interesting law and security-related articles, follow us on Twitter
and check out the Lawfare News Feed
, visit the Georgetown Center on National Security and the Law’s Security Law Brief
, Syracuse’s Institute for National Security & Counterterrorism’s newsroll
, and Fordham Law’s Center on National Security’s Morning Brief
and Cyber Brief
. Email Raffaela Wakeman
and Ritika Singh
noteworthy articles to include, visit the Lawfare Events Calendar
for upcoming national security events, and check out relevant job openings at the Lawfare Job Board