Congressional Cybersecurity Oversight: Who’s Who and How It Works

5 Journal of Law and Cyber Warfare 147 (2016)

163 Pages Posted: 2 Aug 2015 Last revised: 20 Aug 2016

See all articles by Lawrence J. Trautman

Lawrence J. Trautman

Prairie View A&M University - College of Business; Texas A&M University School of Law (By Courtesy)

Date Written: September 10, 2015

Abstract

Cybersecurity remains perhaps the greatest challenge to the economic and physical well being of governments, individuals, and business worldwide. During recent months the United States has witnessed many disruptive and expensive cyber breaches. No single U.S. governmental agency or congressional committee maintains primary responsibility for the numerous issues related to cybersecurity. Good oversight stands at the core of good government. Oversight is Congress’s way of making sure that the administration is carrying out federal law in the way Congress intended. So many aspects of cybersecurity have the potential for use by: terrorists; by foreign entities as a tool to conduct industrial espionage against U.S. business; and by nation state adversaries, or others intent upon creating serious disruption. These various threats mean that cybersecurity policy in many ways must be treated just like the strategic and operational plans of a country at war.

The purpose of this article is to provide a road map of the various congressional committees exercising jurisdiction over matters relating to cybersecurity. First, a few thoughts are offered about the role of Congressional oversight. Second, for perspective, a brief outline of how the executive branch, in the absence of legislation between 2002 and December 2014, handled responsibility for all things cyber. Next, a discussion of Congressional cybersecurity oversight for the 114th Congress is provided, including an analysis of committee jurisdiction, leadership, membership, and key staff. Finally, the important role contributed by professional congressional staff, the Government Accountability Office, Congressional Budget Office, and the Library of Congress Congressional Research Service (CRS) is covered. My hope is that this article will add to the important discussion and foster greater understanding about Congressional oversight of cybersecurity.

Keywords: Administrative Law, Congress, Congressional Committees, Cybersecurity, Foreign Policy, Intelligence, Legislatures, Library of Congress, National Security, Oversight, Separation of Powers, Technology, U.S. House of Representatives, U.S. Senate

JEL Classification: D6, D72, D73, D74, D78, D82, G18, H1, H2, H3, H4, H11, H56, K23, K4, L2, L32, L86, L98

Suggested Citation

Trautman, Lawrence J., Congressional Cybersecurity Oversight: Who’s Who and How It Works (September 10, 2015). 5 Journal of Law and Cyber Warfare 147 (2016), Available at SSRN: https://ssrn.com/abstract=2638448 or http://dx.doi.org/10.2139/ssrn.2638448

Lawrence J. Trautman (Contact Author)

Prairie View A&M University - College of Business ( email )

Prairie View, TX
United States

Texas A&M University School of Law (By Courtesy) ( email )

1515 Commerce St.
Fort Worth, TX Tarrant County 76102
United States

Do you have negative results from your research you’d like to share?

Paper statistics

Downloads
571
Abstract Views
3,607
Rank
89,366
PlumX Metrics