Originally published: January 27, 2010
Last updated: January 27, 2010 - 7:06pm
With the United States facing threats of cyberattacks from foreign countries, criminal organizations and politically motivated hackers, questions linger about the federal government's approach to cybersecurity.
There are few "penalties for doing bad things" in cyberspace, said James A. Lewis, a senior fellow at the Center for Strategic and International Studies, during a briefing in Washington on Wednesday sponsored by Government Executive. He noted that Secretary of State Hillary Clinton's speech last week calling on Chinese authorities to investigate cyberattacks against Google marked the first time a U.S. leader has spoken out publicly about such an incident. Late last year, President Obama named Howard Schmidt to serve as the government's cyber coordinator, seven months after announcing the creation of the position.
"It would be very interesting to read [Schmidt's] job description," said retired Air Force Lt. Gen. Harry D. Raduege Jr., chairman of the Deloitte Center for Innovation, who spent 35 years in the military working on information systems issues. A lot of people in government, Raduege said, "have responsibility, but no authority." He said Schmidt, who also served as special adviser for cyberspace security for the White House during the George W. Bush administration, has the background and expertise necessary to succeed as cyber coordinator. But Schmidt "will have to use all of his network," Raduege said. "He will have to ask the people who do have authority to carry water for him."
- Unresolved questions dog international cybersecurity policies
- Security lags cyberattack threats in critical industries, report finds
- Now is the time for Congress and the Obama Administration to tackle cybersecurity
- Deterring attackers in cyberspace
- White House Unveils Cybersecurity Legislative Proposal
- For Some Hackers, Goal Is Pranks
- Pressure Builds for Congressional Action on Cybersecurity
- Expert says Chinese government likely behind massive cyberattacks
- Obama Administration Aims to Protect Identities in Cyberspace
- Senators worried about policy gap for new Cyber Command
- Pentagon Plans New Arm to Wage Wars in Cyberspace
- Hackers With Enigmatic Motives Vex Companies
- Military says good cyber offense equals good defense
- A National Program Office for Enhancing Online Trust and Privacy
- Key infrastructure often cyberattack target: survey