To read our overview of Democratic candidate Hillary Clinton’s security platform, click here.

Technology issues, and cybersecurity in particular, have taken on a growing role in American politics. In the lead up to the 2016 presidential election, the cybersecurity issue is more pressing than ever. The formal Republican Party platform reflects these concerns, as does the broader discussion of technology and security policy in the U.S.

Trump Security Platform Mirrors GOP Standard

Although the 2016 campaign is unique in many respects, the Donald Trump security platform largely reflects established GOP preferences on specific technology and cybersecurity issues. The platform views government regulation critically while also assigning high priority to national security regulations. On a more granular level, policy preferences regarding specific industry segments unfold among familiar lines.

Cybersecurity in an Insecure World

The Republican platform, as adopted at the party’s national convention in Cleveland, Ohio, has two sections that primarily address the internet, technology and cybersecurity issues.

“Protecting Internet Freedom” sharply criticized what it described as an Obama administration initiative to “impose upon the internet rules devised in the 1930s for the telephone monopoly.” This appears to criticize net neutrality, though that term is not used. The same section also called for action to ensure that “personal data receives full constitutional protection from government overreach.”

The Trump security platform is more directly addressed in “Cybersecurity in an Insecure World.” The section called for an aggressive response to cyberattacks, suggested exploration of a “free market for cyber insurance,” and argued that web users have a right to “deal with hackers as they see fit.” A subsequent section called for action to disable internet firewalls established by authoritarian governments.

Negative on Net Neutrality

As Twice noted, Gary Shapiro, president of the Consumer Technology Association (CTA), issued a statement approving of the technology sections of the GOP platform. He also urged the Trump-Pence campaign to follow up with a “detailed policy agenda” for the tech sector.

The debate over net neutrality is one potentially contentious aspect of such an agenda, not least because it broadly pits two industry segments against each other. Specifically, it pits content providers who tend to favor net neutrality against pipeline providers critical of measures that would regulate their pipelines. This intra-industry battle of alignments has emerged in the past few years as a sharp partisan dividing line within the tech sector.

Right to Self-Defense

Turning more directly to the GOP and Trump security platform, the platform document raised some intriguing questions surrounding topics such as the right of users to defend themselves against cybercriminals. Implicitly, users would have a right to launch counterattacks, such as deploying malware, against malicious actors. The nature of this self-defense right calls for further exploration.

In other respects, the GOP platform illustrated how fast the cybersecurity conversation is moving. While the platform mentioned the ISIS terrorist group several times, it did not specifically address responding to its threat in cyberspace.

This silence should not be a surprise: Concern about the group’s use of cyberspace to spread propaganda entered the broad sphere of public attention so recently that it has not yet become the focus of detailed platform documents.

The rapid pace of development in technology continues to challenge current and prospective policymakers to address issues that, in many cases, have not yet come to light.

More from Government

How the US Government is Fighting Back Against Ransomware

As ransomware-related payments surged toward $600 million in the first half of 2021, the U.S. government knew it needed to do more to fight back against cyber criminals. For many years, the Treasury's Office of Foreign Assets Control (OFAC) had a Specially Designated Nationals and Blocked Persons List (SDN List for people or organizations acting against the national security, foreign policy and sanctions policy objectives of the United States). But since 2021, the U.S. Department of Justice (DOJ) has upped…

What CISOs Want to See From NIST’s Impending Zero Trust Guidelines

Cybersecurity at U.S. federal agencies has been running behind the times for years. It took an executive order by President Joe Biden to kickstart a fix across the agencies. The government initiative also serves as a wake-up call to enterprises lagging in getting zero trust up and running. Several organizations, including the Office of Management and Budget (OMB), the Cybersecurity and Infrastructure Security Agency (CISA) and the National Institute of Standards and Technology (NIST) responded to the president’s order with detailed…

A Response Guide for New NSA and CISA Vulnerabilities

The Cybersecurity and Infrastructure Security Agency (CISA) recently published a report highlighting a range of critical security vulnerabilities requiring attention from organizations of all types. The report was published with input from the National Security Agency (NSA) and similar agencies worldwide. It should be considered essential reading. Many of the vulnerabilities in the report are not new. Instead, the report underscores a new level of awareness regarding how severe they are. Another important point to note is that these are…

The Cost of a Data Breach for Government Agencies

What happens when attackers breach local government, police departments or public health services? What would happen if attackers compromised the U.S. Treasury’s network? These types of incidents happen every month and lead to service interruptions at the very least. More serious problems could occur, such as leakage of classified data or damage to critical infrastructure. What about the cost of a data breach for government agencies? According to the most recent IBM Cost of a Data Breach report, each public…