Obama; The First Cyber President

Published On February 23, 2015 | By Tom Huskerson | Now You Know

Official_portrait_of_Barack_ObamaPresident Obama can lay claim to the title of America’s first cyber president. Since his first election victory as our Commander-in-Chief the president has demonstrated the power of cyber space and using social media to connect with voters, raise money and address issues. As president he has stepped up to address cybersecurity issues facing the nation.

Beginning with his first presidential campaign the Obama camp seized cyber space high ground by using social media to connect with younger voters and spark grass root movements.

 The Obama campaign had the advantage from the beginning by hiring 24 year old Chris Hughes, co-founder of Facebook,  as a key social media strategist.  Hughes’ social media strategy was simply unstoppable from social networking sites to podcasting and mobile messaging.

Candidate Obama was rarely seen without his BlackBerry throughout the campaign. The Obama campaign leveraged every possible social media platform including Facebook, YouTube, MySpace, Twitter, Flickr, Digg, BlackPlanet, LinkedIn, AsianAve, MiGente, Glee, and many others. In the new era of cyber and social media campaigns McCain never had a chance.

Against Romney the Obama campaign had an established social media machine. The Romney campaign was not as inept as McCain’s but they could not achieve the traction that the Democrats had. The Romney campaign required as many as 22 approvals for a single Twitter message. Contrast that with the Obama campaign that used Twitter quickly and creatively.

In his first administration President Obama stepped up to the plate to recognize the need for cybersecurity and protection of American prosperity. In his May 2009 speech the president showed he was solidly focused on cyber security.  

“America’s economic prosperity in the 21st century will depend on cybersecurity.”

President Obama-2009

Under the president’s leadership the administration has moved the nation toward enhancing cybersecurity through the following initiatives;

  • 2009, 60-day Cyberspace Policy Review, spearheaded by Melissa Hathaway, who recommended a number of ways to enhance U.S.cybersecurity efforts. One of which was the creation of a Cybersecurity Coordinator position within the White House.
  • 2009, Obama  named Howard Schmidt to the position.
  • U.S. Cyber Command was established in June of 2009. U.S. Cyber Command (CYBERCOM) is responsible for America’s defensive and offensive cyberwar capabilities. Under President Obama the unit is expected to see a 500% manpower increase from 2014 through 2016.
  • The FBI has started to embed cyber investigators abroad with foreign police units in the Ukraine, Estonia, and Holland.
  • 2009, President Obama initiated a 60-day interagency cyber security review to develop a strategic framework to ensure the Comprehensive National Cybersecurity Initiative (CNCI) is being appropriately integrated, resourced, and coordinated with Congress and the private sector.
  • 2009, Homeland Security Department released a draft of a government plan to designate the roles and responsibilities of agencies and industry in responding to cyber incidents.
  • 2010 Senator Joe Lieberman (D, CT) introduced the Cyberspace as a National Asset Act. It became known as President Obama’s Internet kill switch. The bill would permit President Obama, at his discretion, to declare a “national cyber-emergency.”  This authority would include limiting or even cutting off connections to the World Wide Web for up to 30 days. The bill is extremely controversial and has not been signed into law even though it has bi-partisan support.
  • 2013 President Obama signs Executive Order 13636, Improving Critical Infrastructure Cybersecurity.
  • 2014 President Obama signs five cyber security bill into law
    • Federal Information Modernization Act
    • Border Patrol Agent Pay Reform Act.
    • Cyber Security Workforce Assesement Act.
    • National Cybersecurity Protection Act.
    • Cybersecurity Enhancement Act.
  • 2015 President Obama establishes the Cyber Threat Intelligence Integration Center to combat cyber attacks. Its mission will be to fuse intelligence from around the government when a crisis occurs.

Just last week President Obama gave the keynote address at the White House Summit on Cybersecurity and Consumer Protection at Stanford University. The president called cybersecurity the most serious economic national security challenge the country faces today.

President Obama presented his basic principles for dealing with threats to cybersecurity, consumer privacy and emphasized the importance of the government and private sectors working together to eliminate the threat.

The President presented a number of policy proposals and asked Congress to pass legislation including finally establishing a national data breach notification standard. If passed Americans will be notified within 30 days if their information has been stolen. He also proposed the Student Digital Privacy Act and a Consumer Privacy Bill of Rights that would give Americans a baseline of protections, like the right to decide what personal data companies collect and the right to know how companies are using that information. Finally the President signed an Executive Order Promoting Private Sector Cybersecurity Information Sharing.  

From his first day on the presidential campaign trail to last week’s cyber summit President Obama has shown he understands the incredible impact of the Internet as a communications and economic tool. There is no doubt that his campaign strategy will be studied by political strategist far into the future.Historians will also consider his election the turning point of election communications.  History will remember him as not only the first African-American president but also the first cybersecurity president. 

Now you know

See also; President Obama Launches Cyber Offensive , Part 2 & Part 3

Like this Article? Share it!

About The Author

Tom Huskerson Bio Born in Richmond Virginia Tom Huskerson is a military veteran who settled in California after his discharge. Tom attended Santa Barbara City College where he began his writing career as a campus reporter. He worked as an intern news reporter for the Santa Barbara News-Press writing feature stories before moving on to San Francisco. At San Francisco State University Tom studied broadcast communications and began to focus on the Internet. He completed his graduate thesis on Internet advertising. Tom was the first student to ever focus on the Internet as a graduate student at San Francisco State University. After graduation he went to work for Zona Research in California’s Silicone Valley. As a research associate Tom supported senior analyst writing on the latest developments in the Internet industry. During the dot com boom Tom worked for several web businesses as a market researcher and analyst. As a writer and researcher Tom has authored various technical works including a training program for Charles Schwab security. Other projects included professional presentations on workplace violence and hiring security contractors. Tom has also written both fiction and non-fiction works and blogging for a travel website. He has published two books of short stories and completed two novels. Tom is the owner of Scribe of Life Literature and EbonyCandle.com. Tom is not the chief editor for the OnTechStreet. com. A news and information blog that focuses on tech news for African-Americans. The blog is the result of his desire to inform the African American community of the dangers and benefits of the cyber age. In his blog Tom reports on information security, new and analysis, scams and hoaxes, legal happenings and various topics that arise from the age of information. Tom believes that technology is a necessary tool for black people and they should know what is happening. Tom writes believing that techno speak is for the professional and that valuable information can be communicated using plain language. As a result he has embraced the motto, Less Tech, More Knowledge.

Comments are closed.