Who is ELyssaD™?

Who is ELyssaD™?

I started this private site after my name, ID, medical and financial info was stolen, made public in Pastebin, and sold on T-shirts at the DefCon hackers conference.

I never got one penny for the T-shirts and apparel sold and was never reimbursed for the damage done to my computer equipment and mobile devices as a result of HARD CORE hackers.

I was promised the T-shirts and promo ads would be pulled from the event and the black hat hackers known as Lulz, AntiSec, (Sabu and Co.) would take them down and refrain from using my likeness for promotional purposes.

They were not.

They used my name, my likeness, my photos, my social security number, my ID, my address and more to create a slew of fake social media accounts to post insane bullshit across a variety of platforms. 

They even socially engineered my closest friends and family members in various forums to reinforce the charade.

They claimed the T-shirts were for charity and that $1.00 would be donated for every ELyssaD garment sold.

Not only did I not receive any such monies, I am quite certain these fuckwits have no idea how serious it is to impersonate a 501(c)3.

So not only did they make a profit from exploiting every aspect of my life, they harassed my friends, impersonated an ex-cop who has been one of most trusted allies and confidant; threatened friends who dare to speak up on my behalf by calling them on the phone and identifying themselves as law enforcement. ANOTHER felony.

They made a profit. They offered a reward for tittie pics, had podcasts, comic books and sold a line of women’s apparel to promote their podcasts, show and of course, make money.

They created multiple fake identities on various social media platforms. They pwned my website, social media accounts, linked in, private forums, etc…  harassed my friends and posted my fathers home address on the internet.

They altered personal documents they stole from my private files, altered them, and had the nerve to put the FAKE documents back in to my web albums and made them public.

ONE LOGIN = ONE FELONY

Destruction of evidence (especially records that pertain to employee benefits is a whole other class of crimes)

These individuals are clearly guilty, and have no problem advertising their skills across the hacker community.

They destroyed my professional credibility with disinformation writing posting ridiculous website entries that present my professional certifications as a practicing therapist to make them appear as if I was the patient not the provider.

65 “people” impersonating me on social media platforms?

My friends, sister, brothers, my mother, and even “Agent Daddy” became targets as well.

I started this site hoping for a do-over.  My name is ELyssa. ELyssaD™ and, for he record I’ve never done midget porn!

Just me,

e

@ELyssaD

Who is ELyssaD™?

Who is ELyssaD™?

I started this private site after my name, ID, medical and financial info was stolen, made public in Pastebin, and sold on T-shirts at the DefCon hackers conference.

I never got one penny for the T-shirts and apparel sold and was never reimbursed for the damage done to my computer equipment and mobile devices as a result of HARD CORE hackers.

I was promised the T-shirts and promo ads would be pulled from the event and the black hat hackers known as Lulz, AntiSec, (Sabu and Co.) would take them down and refrain from using my likeness for promotional purposes.

They were not.

They used my name, my likeness, my photos, my social security number, my ID, my address and more to create a slew of fake social media accounts to post insane bullshit across a variety of platforms. 

They even socially engineered my closest friends and family members in various forums to reinforce the charade.

They claimed the T-shirts were for charity and that $1.00 would be donated for every ELyssaD garment sold.

Not only did I not receive any such monies, I am quite certain these fuckwits have no idea how serious it is to impersonate a 501(c)3.

So not only did they make a profit from exploiting every aspect of my life, they harassed my friends, impersonated an ex-cop who has been one of most trusted allies and confidant; threatened friends who dare to speak up on my behalf by calling them on the phone and identifying themselves as law enforcement. ANOTHER felony.

They made a profit. They offered a reward for tittie pics, had podcasts, comic books and sold a line of women’s apparel to promote their podcasts, show and of course, make money.

They created multiple fake identities on various social media platforms. They pwned my website, social media accounts, linked in, private forums, etc…  harassed my friends and posted my fathers home address on the internet.

They altered personal documents they stole from my private files, altered them, and had the nerve to put the FAKE documents back in to my web albums and made them public.

ONE LOGIN = ONE FELONY

Destruction of evidence (especially records that pertain to employee benefits is a whole other class of crimes)

These individuals are clearly guilty, and have no problem advertising their skills across the hacker community.

They destroyed my professional credibility with disinformation writing posting ridiculous website entries that present my professional certifications as a practicing therapist to make them appear as if I was the patient not the provider.

65 “people” impersonating me on social media platforms?

My friends, sister, brothers, my mother, and even “Agent Daddy” became targets as well.

I started this site hoping for a do-over.  My name is ELyssa. ELyssaD™ and, for he record I’ve never done midget porn!

Just me,

e

@ELyssaD

Cleaning out my Closet || Dedicated to Karen #CON

“Cleanin Out My Closet” by Eminem

Where’s my snare?

I have no snare in my headphones – there you go

Yeah… yo, yo

Have you ever been hated or discriminated against?

I have; I’ve been protested and demonstrated against

Picket signs for my wicked rhymes, look at the times

Sick as the mind of the motherfucking kid that’s behind

All this commotion emotions run deep as ocean’s exploding

Tempers flaring from parents just blow ’em off and keep going

Not taking nothing from no one give ’em hell long as I’m breathing

Keep kicking ass in the morning and taking names in the evening

Leave ’em with a taste as sour as vinegar in they mouth

See they can trigger me, but they’ll never figure me out

Look at me now; I bet ya probably sick of me now ain’t you momma?

I’m a make you look so ridiculous now

I’m sorry momma!

I never meant to hurt you!

I never meant to make you cry; but tonight

I’m cleaning out my closet (one more time)

I said I’m sorry momma!

I never meant to hurt you!

I never meant to make you cry; but tonight

I’m cleaning out my closet

Ha! I got some skeletons in my closet

And I don’t know if no one knows it

So before they thrown me inside my coffin and close it

I’m a expose it; I’ll take you back to ’73

Before I ever had a multi-platinum selling CD

I was a baby, maybe I was just a couple of months

My faggot father must have had his panties up in a bunch

Cause he split, I wonder if he even kissed me goodbye

No I don’t on second thought I just fucking wished he would die

I look at Hailie, and I couldn’t picture leaving her side

Even if I hated Kim, I grit my teeth and I’d try

To make it work with her at least for Hailie’s sake

I maybe made some mistakes

But I’m only human, but I’m man enough to face them today

What I did was stupid, no doubt it was dumb

But the smartest shit I did was take the bullets outta that gun

Cause I’da killed him; shit I would’ve shot Kim and him both

It’s my life, I’d like to welcome y’all to “The Eminem Show”

I’m sorry momma!

I never meant to hurt you!

I never meant to make you cry; but tonight

I’m cleaning out my closet (one more time)

I said I’m sorry momma!

I never meant to hurt you!

I never meant to make you cry; but tonight

I’m cleaning out my closet

Now I would never diss my own momma just to get recognition

Take a second to listen for who you think this record is dissing

But put yourself in my position; just try to envision

Witnessing your momma popping prescription pills in the kitchen

Bitching that someone’s always going through her purse and shit’s missing

Going through public housing systems, victim of Munchhausen’s Syndrome

My whole life I was made to believe I was sick when I wasn’t

‘Til I grew up, now I blew up, it makes you sick to ya stomach

Doesn’t it? Wasn’t it the reason you made that CD for me Ma?

So you could try to justify the way you treated me Ma?

But guess what? You’re getting older now and it’s cold when your lonely

And Nathan’s growing up so quick he’s gonna know that your phony

And Hailie’s getting so big now; you should see her, she’s beautiful

But you’ll never see her – she won’t even be at your funeral!

See what hurts me the most is you won’t admit you was wrong

Bitch do your song – keep telling yourself that you was a mom!

But how dare you try to take what you didn’t help me to get

You selfish bitch; I hope you fucking burn in hell for this shit

Remember when Ronnie died and you said you wished it was me?

Well guess what, I am dead – dead to you as can be!

I’m sorry momma!

I never meant to hurt you!

I never meant to make you cry; but tonight

I’m cleaning out my closet (one more time)

I said I’m sorry momma!

I never meant to hurt you!

I never meant to make you cry; but tonight

I’m cleaning out my closet

I’m sorry momma!

I never meant to hurt you!

I never meant to make you cry; but tonight

I’m cleaning out my closet (one more time)

I said I’m sorry momma!

I never meant to hurt you!

I never meant to make you cry; but tonight

I’m cleaning out my closet

Cleaning out my Closet || Dedicated to Karen #CON

“Cleanin Out My Closet” by Eminem

Where’s my snare?

I have no snare in my headphones – there you go

Yeah… yo, yo

Have you ever been hated or discriminated against?

I have; I’ve been protested and demonstrated against

Picket signs for my wicked rhymes, look at the times

Sick as the mind of the motherfucking kid that’s behind

All this commotion emotions run deep as ocean’s exploding

Tempers flaring from parents just blow ’em off and keep going

Not taking nothing from no one give ’em hell long as I’m breathing

Keep kicking ass in the morning and taking names in the evening

Leave ’em with a taste as sour as vinegar in they mouth

See they can trigger me, but they’ll never figure me out

Look at me now; I bet ya probably sick of me now ain’t you momma?

I’m a make you look so ridiculous now

I’m sorry momma!

I never meant to hurt you!

I never meant to make you cry; but tonight

I’m cleaning out my closet (one more time)

I said I’m sorry momma!

I never meant to hurt you!

I never meant to make you cry; but tonight

I’m cleaning out my closet

Ha! I got some skeletons in my closet

And I don’t know if no one knows it

So before they thrown me inside my coffin and close it

I’m a expose it; I’ll take you back to ’73

Before I ever had a multi-platinum selling CD

I was a baby, maybe I was just a couple of months

My faggot father must have had his panties up in a bunch

Cause he split, I wonder if he even kissed me goodbye

No I don’t on second thought I just fucking wished he would die

I look at Hailie, and I couldn’t picture leaving her side

Even if I hated Kim, I grit my teeth and I’d try

To make it work with her at least for Hailie’s sake

I maybe made some mistakes

But I’m only human, but I’m man enough to face them today

What I did was stupid, no doubt it was dumb

But the smartest shit I did was take the bullets outta that gun

Cause I’da killed him; shit I would’ve shot Kim and him both

It’s my life, I’d like to welcome y’all to “The Eminem Show”

I’m sorry momma!

I never meant to hurt you!

I never meant to make you cry; but tonight

I’m cleaning out my closet (one more time)

I said I’m sorry momma!

I never meant to hurt you!

I never meant to make you cry; but tonight

I’m cleaning out my closet

Now I would never diss my own momma just to get recognition

Take a second to listen for who you think this record is dissing

But put yourself in my position; just try to envision

Witnessing your momma popping prescription pills in the kitchen

Bitching that someone’s always going through her purse and shit’s missing

Going through public housing systems, victim of Munchhausen’s Syndrome

My whole life I was made to believe I was sick when I wasn’t

‘Til I grew up, now I blew up, it makes you sick to ya stomach

Doesn’t it? Wasn’t it the reason you made that CD for me Ma?

So you could try to justify the way you treated me Ma?

But guess what? You’re getting older now and it’s cold when your lonely

And Nathan’s growing up so quick he’s gonna know that your phony

And Hailie’s getting so big now; you should see her, she’s beautiful

But you’ll never see her – she won’t even be at your funeral!

See what hurts me the most is you won’t admit you was wrong

Bitch do your song – keep telling yourself that you was a mom!

But how dare you try to take what you didn’t help me to get

You selfish bitch; I hope you fucking burn in hell for this shit

Remember when Ronnie died and you said you wished it was me?

Well guess what, I am dead – dead to you as can be!

I’m sorry momma!

I never meant to hurt you!

I never meant to make you cry; but tonight

I’m cleaning out my closet (one more time)

I said I’m sorry momma!

I never meant to hurt you!

I never meant to make you cry; but tonight

I’m cleaning out my closet

I’m sorry momma!

I never meant to hurt you!

I never meant to make you cry; but tonight

I’m cleaning out my closet (one more time)

I said I’m sorry momma!

I never meant to hurt you!

I never meant to make you cry; but tonight

I’m cleaning out my closet

FBI gives police free tool to convert photos for facial recognition – Trapwire

FBI gives police free tool to convert photos for facial recognition



Thinkstock

Within weeks, police nationwide should be able to obtain free software for matching photos of unidentified suspects against the FBI’s biometric database of 12 million mug shots, according to an Office of the Director of National Intelligence agency.

The FBI and Homeland Security Department are experimenting with facial recognition to determine the real names of illegal immigrants, identify persons of interest in candid photos, and fulfill other law enforcement responsibilities. To make that happen, however, law enforcement agencies at every level of government must share images with compatible technology that they can afford, former FBI officials say.

So, the bureau is offering agencies some of the equipment at no cost.

“Later this summer the FBI will deploy the Universal Face Workstation software, a free-of-charge client application that will provide users with the tools for conducting and managing facial/photo searches with a minimal resource investment,” Kshemendra Paul, program manager for the Information Sharing Environment within the Office of the Director of National Intelligence, wrote in his annual report to Congress.

The document notes the FBI database under development, the $1 billion Next-Generation Identification system, recently began testing facial recognition on images of alleged perpetrators uploaded by several state agencies. Currently, only governments with operational facial recognition technology can participate in the trial.

Those states now have access “to a national gallery of more than 12 million legally collected mug-shot photos to be searched in aid of investigations,” Paul wrote. Facial searches could one day be faster and more accurate than police lineups, advocates say.

This is not the first time the bureau has offered free biometric software to law enforcement partners.

“We provided universal latent workstations for palm prints,” Thomas E. Bush III, who helped develop NGI’s system requirements while assistant director of the FBI’s criminal justice information services division between 2005 and 2009, said earlier this summer. “And we’ll probably do the same thing for face and iris.”

The existing workstation software codes images in a standard format so that authorities can cross-check their photos against pictures in any biometric ID system “from around the neighborhood and around the state to around the nation,” note the software download Web page.

The application accepts scanned images, photos from digital cameras or pictures saved as digital files. The tool then translates each copy into a new file that can be matched against images in NGI, or deposited there for others to search.

Authorized users only need a computer and email connection to the FBI’s database, according to the product specifications.

Related Stories

  • ACLU sues for FBI GPS tracking guidelines
  • FBI is on track to book faces, scars, tattoos in 2014
  • What does your tattoo say about you? The FBI wants to know.
  • Eye on crime: The FBI is building a database of iris scans
  • FBI gives police free tool to convert photos for facial recognition – Trapwire

    FBI gives police free tool to convert photos for facial recognition



    Thinkstock

    Within weeks, police nationwide should be able to obtain free software for matching photos of unidentified suspects against the FBI’s biometric database of 12 million mug shots, according to an Office of the Director of National Intelligence agency.

    The FBI and Homeland Security Department are experimenting with facial recognition to determine the real names of illegal immigrants, identify persons of interest in candid photos, and fulfill other law enforcement responsibilities. To make that happen, however, law enforcement agencies at every level of government must share images with compatible technology that they can afford, former FBI officials say.

    So, the bureau is offering agencies some of the equipment at no cost.

    “Later this summer the FBI will deploy the Universal Face Workstation software, a free-of-charge client application that will provide users with the tools for conducting and managing facial/photo searches with a minimal resource investment,” Kshemendra Paul, program manager for the Information Sharing Environment within the Office of the Director of National Intelligence, wrote in his annual report to Congress.

    The document notes the FBI database under development, the $1 billion Next-Generation Identification system, recently began testing facial recognition on images of alleged perpetrators uploaded by several state agencies. Currently, only governments with operational facial recognition technology can participate in the trial.

    Those states now have access “to a national gallery of more than 12 million legally collected mug-shot photos to be searched in aid of investigations,” Paul wrote. Facial searches could one day be faster and more accurate than police lineups, advocates say.

    This is not the first time the bureau has offered free biometric software to law enforcement partners.

    “We provided universal latent workstations for palm prints,” Thomas E. Bush III, who helped develop NGI’s system requirements while assistant director of the FBI’s criminal justice information services division between 2005 and 2009, said earlier this summer. “And we’ll probably do the same thing for face and iris.”

    The existing workstation software codes images in a standard format so that authorities can cross-check their photos against pictures in any biometric ID system “from around the neighborhood and around the state to around the nation,” note the software download Web page.

    The application accepts scanned images, photos from digital cameras or pictures saved as digital files. The tool then translates each copy into a new file that can be matched against images in NGI, or deposited there for others to search.

    Authorized users only need a computer and email connection to the FBI’s database, according to the product specifications.

    Related Stories

  • ACLU sues for FBI GPS tracking guidelines
  • FBI is on track to book faces, scars, tattoos in 2014
  • What does your tattoo say about you? The FBI wants to know.
  • Eye on crime: The FBI is building a database of iris scans
  • Why everyone is getting hacked these days – Nextgov.com

    Why everyone is getting hacked these days



    Pedro Miguel Sousa/Shutterstock.com

    If it feels like there have been a lot of password hacks this year, it’s because there have been more than usual, and Ars Technica’s Dan Goodin explains why that is. In short: Password hacking has gotten better, while our password making has gotten worse. “The result: security provided by the average password in 2012 has never been weaker,” Goodin writes, which is why it shouldn’t surprise you that this year we have heard about security breaches at LinkedIneHarmonyYahoo Voices, and a personal horror story fromWired‘s Mat Honan. Last year, James Fallows told us about his wife’s security situation in The Atlantic story called “Hacked!” And for all the high profile accounts, there are all the ones we don’t hear about. It’s happening a lot these days.

    But why the sudden uptick? Goodin explains:

    • Our password habits have gotten worse. “The average Web user maintains 25 separate accounts but uses just 6.5 passwords to protect them, according to a landmark study (PDF) from 2007,” he writes. We have more things for which we need to create codes and it takes far too much brain space to store 25 different combos. Having the same passwords for various accounts was what did Fallows’ wife in. Plus, the passwords we pick are stupid, as we learned from the Yahoo Voices hack, in which “123456” was (still!) a popular choice. It takes 10 minutes to crack a lower case 6 character password. To avoid this possible issue, we have before suggested picking dumb passwords for sites that don’t matter. 
    • Password cracking has gotten better. “Now used increasingly for computing, graphics processors allow password-cracking programs to work thousands of times faster than they did just a decade ago on similarly priced PCs that used traditional CPUs alone,” adds Goodin, who details the various tech advancements in hacking. The LinkedIn breach taught us this, leading us to the conclusion that perhaps we need to accept that the modern password isn’t good enough anymore 

    Read more at The Atlantic Wire.

    (Image via Pedro Miguel Sousa/Shutterstock.com)

    UM… I HAVE SOME THOUGHTS ON THIS…

    to be continued…

    Why everyone is getting hacked these days – Nextgov.com

    Why everyone is getting hacked these days



    Pedro Miguel Sousa/Shutterstock.com

    If it feels like there have been a lot of password hacks this year, it’s because there have been more than usual, and Ars Technica’s Dan Goodin explains why that is. In short: Password hacking has gotten better, while our password making has gotten worse. “The result: security provided by the average password in 2012 has never been weaker,” Goodin writes, which is why it shouldn’t surprise you that this year we have heard about security breaches at LinkedIneHarmonyYahoo Voices, and a personal horror story fromWired‘s Mat Honan. Last year, James Fallows told us about his wife’s security situation in The Atlantic story called “Hacked!” And for all the high profile accounts, there are all the ones we don’t hear about. It’s happening a lot these days.

    But why the sudden uptick? Goodin explains:

    • Our password habits have gotten worse. “The average Web user maintains 25 separate accounts but uses just 6.5 passwords to protect them, according to a landmark study (PDF) from 2007,” he writes. We have more things for which we need to create codes and it takes far too much brain space to store 25 different combos. Having the same passwords for various accounts was what did Fallows’ wife in. Plus, the passwords we pick are stupid, as we learned from the Yahoo Voices hack, in which “123456” was (still!) a popular choice. It takes 10 minutes to crack a lower case 6 character password. To avoid this possible issue, we have before suggested picking dumb passwords for sites that don’t matter. 
    • Password cracking has gotten better. “Now used increasingly for computing, graphics processors allow password-cracking programs to work thousands of times faster than they did just a decade ago on similarly priced PCs that used traditional CPUs alone,” adds Goodin, who details the various tech advancements in hacking. The LinkedIn breach taught us this, leading us to the conclusion that perhaps we need to accept that the modern password isn’t good enough anymore 

    Read more at The Atlantic Wire.

    (Image via Pedro Miguel Sousa/Shutterstock.com)

    UM… I HAVE SOME THOUGHTS ON THIS…

    to be continued…

    Obama faces delicate decisions as cyberattack fears rise

    President Barack Ob, ... ]

    White House photo

    At the height of the economic crisis in 2008, Saturday Night Live’s “Weekend Update” comedy news show rolled out the character Oscar Rogers as a faux financial commentator. His advice on how to restore the economy? “Fix it! It needs to be fixed! Now!”

    Four years later, lawmakers are grappling with a cybercrisis, and despite rising concerns, legislative debates over how to secure U.S. networks and infrastructure have often resembled nothing so much as Oscar Rogers yelling “Fix it!”

    Now, with Congress looking unlikely to act anytime soon to fix vulnerabilities in the nation’s computer systems that leave them open to cyberattacks, President Obama is weighing the pros and cons of using anexecutive order to do what Congress hasn’t.

    Experts in government and industry alike report a tide of attacks aimed at stealing information from individuals, companies, and government agencies, potentially making a strong case for presidential action.

    Further bolstering the case are warnings from top national-security officials that a catastrophic attack on a critical system like those that run energy grids or chemical plants could cause damage to the economy or even loss of life.

    But Obama needs to consider his options carefully, because any unilateral steps could invite accusations from his critics of overstepping his authority. As the acrimonious debate over antipiracy legislation illustrated earlier this year, simmering Internet issues can easily explode.

    In the final days before the August recess, the Senate hit an impasse on broad cybersecurity legislation that the White House and national-security and defense leaders support. The bill stalled after businesses and Republicans said the legislation would create burdensome regulations for industry without doing enough to shore up defenses against cyberattacks.

    Top White House counterterrorism aide John Brennan said earlier this month that Obama was looking at the possibility of an executive order but that there is no decision yet.

    Lee Hamilton, a Democratic former House member who sits on a board that advises the Homeland Security Department and who examined government security failures as cochair of the 9/11 Commission, said that Obama is right to consider moving forward on his own. He said the stalemate in Congress is a “serious breakdown” reminiscent of failures before the terrorist attacks on Sept. 11, 2001.

    “The preference would be to work together with Congress, but the threat is serious enough that an executive order is in line,” he said. “There is certainly a lack of urgency in dealing with this, and it’s not a business-as-usual problem. Given the fact that Congress hasn’t acted, the president has the obligation to put together options to secure the country.”

    While the debate in Congress largely broke down along party lines, some prominent Republicans support the cybersecurity standards backed by the White House.

    Top national-security advisers for GOP presidential candidate Mitt Romney, such as former Homeland Security Secretary Michael Chertoff and former National Security Agency and Central Intelligence Agency chief Michal Hayden, differed with Republicans in Congress and publicly called for the Senate to pass provisions that have Obama’s support.

    Romney campaign spokeswoman Andrea Saul declined to elaborate on the Republican candidate’s assertion that more needs to be done to secure American networks, or comment on whether he would favor using an executive order in the absence of legislation. But she reiterated Romney’s promise to make cybersecurity an early priority and didn’t rule out executive action. Romney’s plan would require agencies to begin developing a new national cybersecurity strategy within the first 100 days of his administration. “Once the strategy is formulated he will determine how best it can be implemented,” Saul said in an e-mail.

    Polls show that while Americans express concerns over cyberattacks, they, too, are divided over what should be done.

    Separate surveys published by United Technologies/National Journal and The Washington Post over the summer found that a majority of Americans prefer that the government either not create standards for private companies, or keep any standards voluntary.

    Backers of the White House’s proposals, however, say an executive order could add clarity to the debate and prove to skeptics that the government can play a greater role in protecting American networks without violating privacy or burdening private businesses.

    “I think it’s hard to make things any messier than it was politically,” said James Lewis, an expert at the Center for Strategic and International Studies. “If done right, an executive order could help critics reconsider their arguments.”

    That’s an analysis echoed by University of California (Berkeley) professor Steven Weber who said many people seem to be “sleepwalking” when it comes to the threat of cyberattacks. An executive order, he said, could reform cybersecurity policies before a catastrophic attack galvanizes public opinion.

    An executive order could give Obama the chance to take a strong stand on a rising national-security concern while portraying Republicans in Congress as ditherers.

    But an order is unlikely to accomplish all of the White House’s aims. It couldn’t hand DHS wider authority to ensure that certain private networks are secure. Nor could it entirely ease legal restrictions that prevent businesses from sharing threat information. Even policy changes for some federal network-security policies would likely need congressional action. Additionally, any action would need to avoid inciting privacy watchdogs who fear cybersecurity could be used as an excuse to undermine civil liberties.

    And some analysts said the politics of an executive order could cut both ways for Obama. Presidents often win political debates that pit them against an unpopular Congress, especially one perceived as unable to do anything substantive, said Peter Feaver, a former National Security Council staffer during the Clinton and George W. Bush administrations. But if Obama were to take unilateral action, it would give his critics on the right an opening to paint him as an “imperial” president and to accuse him of saddling business with new regulations, Feaver said.

    “In general, White Houses win in these fights with Congress, but this White House has played this card many times,” Feaver said. “This is an issue where there are bound to be unintended consequences and any cybersecurity measures will need a system to fix and update the provisions down the road. This administration has a hard sell assuring people to trust them to fix things later.”

    Paul Rosenzweig, a consultant and visiting fellow at the conservative Heritage Foundation, said a cybersecurity executive order could play into both the “imperial presidency and do-nothing-Congress” narratives, but said he thinks there is a genuine possibility for a future compromise and unilateral action by Obama would do little to actually help secure private networks

    http://m.nextgov.com/cio-briefing/2012/08/obama-faces-delicate-decisions-cybe…

    Obama faces delicate decisions as cyberattack fears rise

    President Barack Ob, ... ]

    White House photo

    At the height of the economic crisis in 2008, Saturday Night Live’s “Weekend Update” comedy news show rolled out the character Oscar Rogers as a faux financial commentator. His advice on how to restore the economy? “Fix it! It needs to be fixed! Now!”

    Four years later, lawmakers are grappling with a cybercrisis, and despite rising concerns, legislative debates over how to secure U.S. networks and infrastructure have often resembled nothing so much as Oscar Rogers yelling “Fix it!”

    Now, with Congress looking unlikely to act anytime soon to fix vulnerabilities in the nation’s computer systems that leave them open to cyberattacks, President Obama is weighing the pros and cons of using anexecutive order to do what Congress hasn’t.

    Experts in government and industry alike report a tide of attacks aimed at stealing information from individuals, companies, and government agencies, potentially making a strong case for presidential action.

    Further bolstering the case are warnings from top national-security officials that a catastrophic attack on a critical system like those that run energy grids or chemical plants could cause damage to the economy or even loss of life.

    But Obama needs to consider his options carefully, because any unilateral steps could invite accusations from his critics of overstepping his authority. As the acrimonious debate over antipiracy legislation illustrated earlier this year, simmering Internet issues can easily explode.

    In the final days before the August recess, the Senate hit an impasse on broad cybersecurity legislation that the White House and national-security and defense leaders support. The bill stalled after businesses and Republicans said the legislation would create burdensome regulations for industry without doing enough to shore up defenses against cyberattacks.

    Top White House counterterrorism aide John Brennan said earlier this month that Obama was looking at the possibility of an executive order but that there is no decision yet.

    Lee Hamilton, a Democratic former House member who sits on a board that advises the Homeland Security Department and who examined government security failures as cochair of the 9/11 Commission, said that Obama is right to consider moving forward on his own. He said the stalemate in Congress is a “serious breakdown” reminiscent of failures before the terrorist attacks on Sept. 11, 2001.

    “The preference would be to work together with Congress, but the threat is serious enough that an executive order is in line,” he said. “There is certainly a lack of urgency in dealing with this, and it’s not a business-as-usual problem. Given the fact that Congress hasn’t acted, the president has the obligation to put together options to secure the country.”

    While the debate in Congress largely broke down along party lines, some prominent Republicans support the cybersecurity standards backed by the White House.

    Top national-security advisers for GOP presidential candidate Mitt Romney, such as former Homeland Security Secretary Michael Chertoff and former National Security Agency and Central Intelligence Agency chief Michal Hayden, differed with Republicans in Congress and publicly called for the Senate to pass provisions that have Obama’s support.

    Romney campaign spokeswoman Andrea Saul declined to elaborate on the Republican candidate’s assertion that more needs to be done to secure American networks, or comment on whether he would favor using an executive order in the absence of legislation. But she reiterated Romney’s promise to make cybersecurity an early priority and didn’t rule out executive action. Romney’s plan would require agencies to begin developing a new national cybersecurity strategy within the first 100 days of his administration. “Once the strategy is formulated he will determine how best it can be implemented,” Saul said in an e-mail.

    Polls show that while Americans express concerns over cyberattacks, they, too, are divided over what should be done.

    Separate surveys published by United Technologies/National Journal and The Washington Post over the summer found that a majority of Americans prefer that the government either not create standards for private companies, or keep any standards voluntary.

    Backers of the White House’s proposals, however, say an executive order could add clarity to the debate and prove to skeptics that the government can play a greater role in protecting American networks without violating privacy or burdening private businesses.

    “I think it’s hard to make things any messier than it was politically,” said James Lewis, an expert at the Center for Strategic and International Studies. “If done right, an executive order could help critics reconsider their arguments.”

    That’s an analysis echoed by University of California (Berkeley) professor Steven Weber who said many people seem to be “sleepwalking” when it comes to the threat of cyberattacks. An executive order, he said, could reform cybersecurity policies before a catastrophic attack galvanizes public opinion.

    An executive order could give Obama the chance to take a strong stand on a rising national-security concern while portraying Republicans in Congress as ditherers.

    But an order is unlikely to accomplish all of the White House’s aims. It couldn’t hand DHS wider authority to ensure that certain private networks are secure. Nor could it entirely ease legal restrictions that prevent businesses from sharing threat information. Even policy changes for some federal network-security policies would likely need congressional action. Additionally, any action would need to avoid inciting privacy watchdogs who fear cybersecurity could be used as an excuse to undermine civil liberties.

    And some analysts said the politics of an executive order could cut both ways for Obama. Presidents often win political debates that pit them against an unpopular Congress, especially one perceived as unable to do anything substantive, said Peter Feaver, a former National Security Council staffer during the Clinton and George W. Bush administrations. But if Obama were to take unilateral action, it would give his critics on the right an opening to paint him as an “imperial” president and to accuse him of saddling business with new regulations, Feaver said.

    “In general, White Houses win in these fights with Congress, but this White House has played this card many times,” Feaver said. “This is an issue where there are bound to be unintended consequences and any cybersecurity measures will need a system to fix and update the provisions down the road. This administration has a hard sell assuring people to trust them to fix things later.”

    Paul Rosenzweig, a consultant and visiting fellow at the conservative Heritage Foundation, said a cybersecurity executive order could play into both the “imperial presidency and do-nothing-Congress” narratives, but said he thinks there is a genuine possibility for a future compromise and unilateral action by Obama would do little to actually help secure private networks

    http://m.nextgov.com/cio-briefing/2012/08/obama-faces-delicate-decisions-cybe…