NPR logo
How Will The Next President Protect Our Digital Lives?
  • Download
  • <iframe src="https://www.npr.org/player/embed/409728807/409939247" width="100%" height="290" frameborder="0" scrolling="no" title="NPR embedded audio player">
  • Transcript
How Will The Next President Protect Our Digital Lives?

How Will The Next President Protect Our Digital Lives?

How Will The Next President Protect Our Digital Lives?
  • Download
  • <iframe src="https://www.npr.org/player/embed/409728807/409939247" width="100%" height="290" frameborder="0" scrolling="no" title="NPR embedded audio player">
  • Transcript
An engineer from Cisco shows live wireless traffic to a FedEx employee during a recent security conference in San Francisco. i

An engineer from Cisco shows live wireless traffic to a FedEx employee during a recent security conference in San Francisco. Marcio Jose Sanchez/AP hide caption

toggle caption Marcio Jose Sanchez/AP
An engineer from Cisco shows live wireless traffic to a FedEx employee during a recent security conference in San Francisco.

An engineer from Cisco shows live wireless traffic to a FedEx employee during a recent security conference in San Francisco.

Marcio Jose Sanchez/AP

As candidates hit the campaign trail, NPR looks at four major issues the next president will face from Day 1 in office.

When President Obama took office back in 2009, "cybersecurity" was not a word that everyday people used. It wasn't debated. Then, mega-breaches against consumers, businesses and the federal government changed that.

The latest came Tuesday, when the Internal Revenue Service said criminals used an online service provided by the agency to access the information of more than 100,000 taxpayers.

Now, the 45th president will have to come into office with a game plan for how to protect us online. The plan could shape up any number of ways because our digital lives — and the attacks against our digital lives — are pretty new. But it's something people care a lot about:

With Edward Snowden, Americans learned they were the target of a mass surveillance program they didn't know about, and that the National Security Agency, a military agency, is porous, vulnerable to insiders hacking and stealing.

With the Sony attack they saw how security breaches can bring big companies to a screeching, embarrassing halt.

And let's not forget the new era of garden-variety crime. Credit card fraud, a la Target, set off a credit monitoring frenzy. And Anthem demonstrated that no institution is sacred. Criminal attacks against health care are the new normal, according to a recent Ponemon Institute study.

(How do hackers even make money from stolen medical records?!)

And then, of course, there are digital crimes of passion. Take revenge porn, a national concern that some states are taking on individually.

Is this starting to feel ... overwhelming?

When it comes to "cybersecurity," the next president of the United States has tough choices to make: Before even getting to solutions, what are the most important problems? And where should the federal government weigh in, or leave it to states or companies? Turns out Americans don't have all that much confidence in any of them:

Back in the 1990s, "we didn't need to worry about security because the market would take care of it," said Jim Lewis, a senior official at the Departments of State and Commerce during the Clinton era. "Consumers would demand security and companies would provide it."

Turns out they were wrong, he says. "That hasn't happened."

Under Clinton, the Internet went from a Pentagon project to a place for companies to play, experiment. And under Obama, Americans saw the smartphone revolution. Lewis says it's time to step back and consider that "just as we have energy policy and space policy and defense policy, maybe we need cyber policy."

It's very hard to regulate technology that's unfolding before our very eyes.

Lewis — who's now a senior fellow with the Center for Strategic and International Studies in Washington, D.C. — names one key issue: consumer protection. And, he says, it's a foreign policy issue.

Certain countries are sanctuaries for cybercriminals. That's often where our personal data is flowing. "Finding out that someone in the Russian mafia has all your credit card information and your Social Security number doesn't make the average voter happy," he said.

Cybersecurity expert Bruce Schneier, a fellow at Harvard's Berkman Center, says another way to protect consumers is corporate accountability.

"What government can do about data breaches is increase the penalties," he says. "Right now your data is not very well protected because the cost of losing it isn't very high to the companies that have it."

Schneier wants to see the next president take on privacy, too — what should police be able to access without a warrant, and what should companies be allowed to store. So far, we've just kind of assumed the answer is ... everything.

For example, the company Uber published a lighthearted blog called Rides of Glory about people using Uber to have flings. Basically they looked at rides happening at night from point A to point B, and rides happening the next morning by the same person back.

Now, Uber didn't publish the names of the people. It was aggregate, Big Data (and interestingly, the company took down the post as well).

But Schneier said, without a federal law on commercial privacy, they could have. "Right now under U.S. law they could do whatever they like with that data. And it is just them being nice that makes them not publish it or sell it to people trying to market to you."

The cybersecurity game plan could tackle any number of topics — data encryption, structural reform of the NSA, the role of Homeland Security. And that's not even counting lightning-rod issues, like whether the next president's Supreme Court nominee believes in changing passwords regularly.

Comments

 

Please keep your community civil. All comments must follow the NPR.org Community rules and terms of use, and will be moderated prior to posting. NPR reserves the right to use the comments we receive, in whole or in part, and to use the commenter's name and location, in any medium. See also the Terms of Use, Privacy Policy and Community FAQ.