View Single Post
Old 05-30-2009, 08:31 AM   #1 (permalink)
Tully Mars
Living in a Warmer Insanity
 
Tully Mars's Avatar
 
Super Moderator
Location: Yucatan, Mexico
Obama V. cyberattacks

Quote:
WASHINGTON — President Obama declared Friday that the country’s disparate efforts to “deter, prevent, detect and defend” against cyberattacks would now be run out of the White House, but he also promised that he would bar the federal government from regular monitoring of “private-sector networks” and the Internet traffic that has become the backbone of American communications.

Mr. Obama’s speech, which was accompanied by the release of a long-awaited new government strategy, was an effort to balance the United States’ response to a rising security threat with concerns — echoing back to the debates on wiretapping without warrants in the Bush years — that the government would be regularly dipping into Internet traffic that knew no national boundaries.

One element of the strategy clearly differed from that established by the Bush administration in January 2008. Mr. Obama’s approach is described in a 38-page public document being distributed to the public and to companies that are most vulnerable to cyberattack; Mr. Bush’s strategy was entirely classified.

But Mr. Obama’s policy review was not specific about how he would turn many of the goals into practical realities, and he said nothing about resolving the running turf wars among the Pentagon, the National Security Agency, the Homeland Security Department and other agencies over the conduct of defensive and offensive cyberoperations.

The White House approach appears to place a new “cybersecurity coordinator” over all of those agencies. Mr. Obama did not name the coordinator Friday, but the policy review said that whoever the president selects would be “action officer” inside the White House during cyberattacks, whether they were launched on the United States by hackers or governments.

In an effort to silence critics who have complained that the official will not have sufficient status to cut through the maze of competing federal agencies, Mr. Obama said the new coordinator would have “regular access to me,” much like the coordinator for nuclear and conventional threats.

Many computer security executives had been hoping that Mr. Obama’s announcement would represent a turning point in the nation’s unsuccessful effort to turn back a growing cybercrime epidemic. On Friday, several said that while the president’s attention sounded promising, much would depend on whom he chose to fill the role.

James A. Lewis, a director at the Center for Strategic & International Studies, a Washington group that published a bipartisan report last year calling on the president to appoint a cyberczar, said that the White House had now narrowed the list of candidates for the position to fewer than 10, but that choosing the right person would be difficult.

“There aren’t a lot of people who have the policy and the strategy skills and the technological knowledge to carry this out,” Mr. Lewis said. “If you’re talking about missiles and space, there are a lot of people who know policy and technology, but in cyber its such a new field we’re talking about a really small gene pool.”

For the first time, Mr. Obama also spoke of his own brush with cyberattacks, in the presidential campaign. “Between August and October, hackers gained access to e-mails and a range of campaign files, from policy position papers to travel plans,” he said, describing events that were known, though sketchily, at the time.

“It was,” he said, “a powerful reminder: in this information age, one of your greatest strengths — in our case, our ability to communicate to a wide range of supporters through the Internet — could also be one of your greatest vulnerabilities.”

Mr. Obama’s speech delved into technology rarely discussed in the East Room of the White House. He referred to “spyware and malware and spoofing and phishing and botnets,” all different approaches to what he called “weapons of mass disruption.”

Although the president did not discuss details of the expanding role for the military in offensive and pre-emptive cyberoperations, senior officials said Friday that the Pentagon planned to create a new cybercommand to organize and train for digital war, and to oversee offensive and defensive operations.

A lingering disagreement has been how to coordinate that new command with the work of the National Security Agency, home to most of the government’s expertise on computer and network warfare. One plan now under discussion would put the same general in charge of both the new cybercommand and the N.S.A. Currently, the security agency’s director is Lt. Gen. Keith B. Alexander, who would be expected to be the leading contender for the new, dual position.

Industry executives were generally supportive of the initiative Mr. Obama announced, but also cautious.

“There was nothing I was disappointed in,” said Mark Gerencser, a cybersecurity executive at Booz Allen Hamilton, a consulting firm that deals extensively in the government’s cybersecurity strategy.

Mr. Hamilton noted that the United States had separated defense and offense in the cybersecurity arena, while its opponents, including Russia and China, had a more fluid strategy.

“It’s like we’re playing football and our adversaries are playing soccer,” he said.

Thom Shanker contributed reporting from Washington.

Seems like a reasonable thing to be thinking about. But I don't know much about cyber anything.

Think it's a real threat?

Think he can do anything about it if it is?
__________________
I used to drink to drown my sorrows, but the damned things have learned how to swim- Frida Kahlo

Vice President Starkizzer Fan Club
Tully Mars is offline  
 

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360