Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- Government Perspectives on Mobility and the Cloud
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mitigating Insider Threats in Virtual & Cloud Environments
- Modern Mission Critical Series
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Reimagining the Next Generation of Government
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
McCain again makes his case to increase DoD's cyber role
Thursday - 5/10/2012, 5:56am EDT
McCain responded to Gen. Keith Alexander's April letter, which was in response to the senator's March 29 letter, about concerns over the competing cybersecurity bills going through Congress. Alexander leads the U.S. Cyber Command and is the director of the National Security Agency.
"In previous statements, you have said that 'If the DoD is to defend the nation against cyber attacks originating from outside the United States, it must be able to see those attacks in real time.' To be clear, no piece of cybersecurity legislation before either body of Congress authorizes surveillance, government monitoring or Internet militarization. However, your statement infers a premium should be placed on speed and rapidity of response. I support this notion and therefore fail to see how building additional layers of bureaucracy is consistent with this position or would result in better cybersecurity."
Sen. John McCain (R-Ariz.)
McCain said this approach would erect "walls around information" that needs to be shared.
He also again tried to convince Alexander that having DHS work with critical infrastructure providers to create minimum standards is burdensome.
"It is hardly a choice when the options are to either comply with the DHS regulations or face civil penalties," McCain wrote. "These regulations or standards would have the effect of diverting resources from actual cybersecurity towards compliance with government mandates. These mandates would provide a false sense of security."
McCain asked Alexander to support his cyber bill, the Secure IT of 2012. He said it avoids creating "burdensome regulations" for critical infrastructure owners and operators, and increases the speed at which the government and industry can respond to cyber threats.
"Our odds are much more favorable when we leverage all assets and expertise within the federal government and the private sector to protect our interests and combat against those who seek to harm us," McCain said. "Rather than empowering those with the actual capabilities to defend the homeland from foreign threats, the administration is supporting a policy, which elevates DHS as a regulator and an information broker, at the expense of improved national security and private sector flexibility."
This story is part of Federal News Radio's daily Cybersecurity Update. For more cybersecurity news, click here.