Leading Cyber Czar Candidate No Friend of Privacy
June 25, 2009 1:55 PM
comment(s) - last by
The man who journalists and experts expect to be the candidate for the cyber czar position has a sketchy past
President Barack Obama's lead candidate to become the
country's first ever cyber security czar
has some skeletons in his closet that will likely alarm security advocates, recent media reports indicate.
Former Republican Congressman Tom Davis, who is the former head of the Government Reform Committee, has been listed at the leading candidate, and is well known for being tech savvy. However, he has voted to expand the federal government's ability to wiretap and monitor Internet activity, along with helping draft the REAL ID Act.
"Given his role in REAL ID, Tom Davis would not be a good choice for privacy, which is something that President Obama specifically promised to protect in his remarks on the cyber security strategy,” according to Cato Institute director Jim Harper. "Many cyber security planners refer obliquely to ‘authentication’ and ‘identity management’ programs that would devastate privacy, anonymity and civil liberties. Davis would probably work to roll past these issues rather than solve them.”
Davis also helped author the Federal Information Security Management Act in 2002, while also serving as a co-chair on the Congress Information Technology Working Group.
unsure for quite some time
if the president would select a tech guru, a politician, or a politician with an understanding of technology. It's obviously crucial for the cybersecurity czar to understand tech issues, and the cybersecurity issues facing the country today, but a bureaucrat who understands how to get something done in Washington also is important.
If Davis is selected, it's more likely he'll face difficult administrative problems -- not necessarily tech-related issues -- as military and government network defense remains fractured and confusing. The cybersecurity czar would spearhead government defense, and help create new security guidelines on how to protect the country's infrastructure from foreign-based attacks originating in China and Eastern Europe.
Along with Davis, Melissa Hathaway, cyber advisor for President George W. Bush, and Paul Kurtz, Obama adviser and member of the National Security Council, also are two other possible candidates to the job.
This article is over a month old, voting and posting comments is disabled
RE: Oh hell....
6/25/2009 3:52:32 PM
Good point, how do you know who is hiding child porn unless you check to see what everyone is hiding? Privacy is not an issue that lends itself to exceptions or caveats.
RE: Oh hell....
6/25/2009 4:56:48 PM
Those kind of investigations require a warrant if any legal action is to be taken. We know the net is nowhere near private.
The bigger, but hardly mentioned issue, is Obama appointing another Czar. Czars are performing cabinet level functions without Senate approval or oversight. This avoids necessary public scrutiny of those in charge of these programs.
I don't have a problem with the president picking someone to resolve an issue in a predetermined time frame, then, once completed, disbanding it. This, like all of his other Czars, will be around for a very long time unless reigned in by the Congress. The Dems in Congress hold majority power and are directly responsible for oversight of the president and his minions. They are failing in their constitutional obligations under the separations of power requirement.
We don't need more unregulated big brother.
RE: Oh hell....
6/27/2009 1:47:41 AM
The net is in fact private, your first sentence not only contradicts the second, it leaves out the detail that the warrant is needed even without legal action.
ISP customers expect the ISP not to hand out surfing records without a court order, nor can anyone attain them without an order, nor monitor you without one in a more active fashion.
The only thing non-private about the net is what one actively chooses to publish in a public forum, a small minority of net usage for most people unless they are addicted to twitter or similar.
"This is about the Internet. Everything on the Internet is encrypted. This is not a BlackBerry-only issue. If they can't deal with the Internet, they should shut it off." -- RIM co-CEO Michael Lazaridis
New Bill Would Call for National Cybersecurity Advisor
April 3, 2009, 8:00 AM
Dumb Twitter Controversy: Saudis Whine at Michelle Obama's Lack of Head Scarf
January 27, 2015, 4:57 PM
Google Fixes Homophobic "Bug" in its Translator
January 27, 2015, 2:31 PM
Chris Poole Retires From Role as 4Chan After a Decade of Success, Struggles
January 23, 2015, 1:45 PM
Study Shows People are Dumb as Ever With Passwords, Still Using "123456"
January 20, 2015, 3:19 PM
Site for "Glitter as a Service" Mail Pranks, ShipYourEnemiesGlitter, Launches
January 13, 2015, 2:22 PM
OS X Yosemite Compromises Security by Retrieving Embedded Email Images
January 13, 2015, 11:30 AM
Most Popular Articles
Under the Hood: How DirectX 11.3 and 12 Will Supercharge Windows 10 Gaming
January 23, 2015, 12:34 PM
Microsoft Shows Off Latest Windows 10 Build, Preps it for Next Week Release
January 21, 2015, 2:57 PM
BlackBerry CEO Claims Devs are Violating Net Neutrality by Not Supporting BB10
January 22, 2015, 4:37 PM
2016 Cadillac CTS-V Packs 640 hp Punch with 200 mph Reach
January 23, 2015, 3:25 PM
Will Google Become America's Fifth Major Carrier?
January 22, 2015, 12:42 PM
Latest Blog Posts
Sceptre Airs 27", 120 Hz. 1080p Monitor/HDTV w/ 5 ms Response Time for $220
Dec 3, 2014, 10:32 PM
Costco Gives Employees Thanksgiving Off; Wal-Mart Leads "Black Thursday" Charge
Oct 29, 2014, 9:57 PM
"Bear Selfies" Fad Could Turn Deadly, Warn Nevada Wildlife Officials
Oct 28, 2014, 12:00 PM
The Surface Mini That Was Never Released Gets "Hands On" Treatment
Sep 26, 2014, 8:22 AM
ISIS Imposes Ban on Teaching Evolution in Iraq
Sep 17, 2014, 5:22 PM
More Blog Posts
Copyright 2015 DailyTech LLC. -
Terms, Conditions & Privacy Information