Contact Us

Error: Contact form not found.

Client Login

Select a platform below to log in

TraceCSO
TraceInsight

The Effects of Cybersecurity Executive Order 13694 & 14144

two men in computer room tracesecurity effects of executive order 13694 & 14144

A Critical Amendment

On June 6, 2025, President Donald Trump amended Executive Order 13694 and Executive Order 14144 to proactively secure and mitigate the future cybersecurity risks in America. According to The Whitehouse, “The Order amends problematic elements of Obama and Biden-era Executive Orders. (1)” These amendments directly affect and protect foreign and domestic infrastructure in a rapidly evolving cybersecurity climate. From artificial intelligence to quantum computing, there are new threats emerging regularly that could affect and destabilize critical systems if not addressed thoughtfully and proactively.

Undocumented Immigration

Immigration is a complex and nuanced process often categorized on a case-by-case basis. Although not all undocumented immigrants utilize digital IDs, this amendment will eliminate the mandate for digital IDs for undocumented immigrants. This will remove digital provisions entirely. The White House states, “The Order strips away inappropriate measures outside of core cybersecurity focus. (1)” This reflects an effort to ensure public policy compliance by preventing fraudulent documentation while guiding undocumented immigrants into formal systems. Formal systems will rely on preexisting document processing practices to identify and secure public aid for immigration benefit distribution, requiring greater administrative effort.

The Effect on Immigration

Although this change aims to address fraud and distribute public benefits to those who need them most, it could have several effects on how undocumented immigrants obtain public benefits. The amendment could create a larger administrative burden and challenges with streamlining accessibility to public services. Undocumented immigrants could face longer wait times and more lengthy verification processes when aiming to obtain public benefits. The amendment aims to create more robust overall security measures for aliens looking to integrate by ensuring benefits go to those who need them most. The policy shift underscores a balancing act between fraud prevention and accessibility of services.

Mitigating the Security Risk of Quantum Computing

Quantum computing is leveraged by supercomputers capable of solving mathematical equations much faster than classical computers. This immense reserve of computing power poses a risk to systems currently used to secure communications. Due to the growing risk of secure communication decryption, government agencies are scaling up post-quantum cryptography initiatives. Inside Privacy states, “The Order retains only a requirement for CISA to maintain a list of product categories where PQC-enabled tools are widely available. (2)” In an effort to protect systems next generation compute architectures, the order will adopt the newest encryption protocols, specifying quantum computing for department and agency levels only. These changes will standardize PQC (Post Quantum Computing) algorithms as a proactive measure for security.

The Integration of Post-Quantum Computing Algorithms

Government agencies are planning for the transition from current cryptographic standards like RSA (Rivest-Shamir-Adleman) and ECC (Elliptic Curve Cryptography) to quantum-resistant standards before quantum computing poses a significant threat. This shift will ensure long-term confidentiality and integrity. Standards and compliance agencies like NIST and CISA will be working on standardizing PQC to curb cryptographic threats and exercise proactive security measures in a rapidly developing quantum computing climate. Companies and government agencies will need to address critical systems that rely on encryption by identifying critical systems that rely on vulnerable encryption to ensure a smooth transition across the public and private sectors.

Foreign and Domestic Security

Efficiency in cybersecurity threat management poses a significant threat on both foreign and domestic fronts. The Cyber Security Executive Order aims to address “foreign malicious actors” while also “clarifying that sanctions do not apply to election-related activities.” The focus is now on core cybersecurity measures. Consequently, critical infrastructure that may be vulnerable will need to comply with updated regulations and security measures, leaving post-quantum security regulation to government agencies. Companies will now need to create a roadmap to become quantum-resistant. Now focusing on “genuine foreign adversaries (1),” the amended Executive Orders aim to strengthen international cybersecurity efforts while emboldening infrastructural fortitude.

The International Implications

Due to the shift of focus, Inside Privacy writes,” the accompanying Fact Sheet does not provide any additional information about whether the amendments are intended to exempt foreign cyber operations directed at U.S. election activities. (2)” These changes in policy may strengthen international cybersecurity efforts and create greater political neutrality. The amendments intend to prevent the misuse of cyber sanctions as a tool against domestic rivals. This balance aims to protect domestic political processes.

Conclusion

This amendment will significantly reshape how government agencies, private companies, and technological infrastructures address cybersecurity. By prioritizing national security, safeguarding critical infrastructure, and anticipating emerging threats, these changes reflect an urgency to modernize defenses. Addressing evolving technologies like quantum computing and AI requires coordinated adaptation, and these Executive Orders underscore the need for clear, future-focused policy. Ultimately, the revisions to EO 13694 and EO 14144 emphasize resilience, regulatory clarity, and preparedness for an increasingly complex cyber landscape.

Feel free to share our content.