Leading Cyber Czar Candidate No Friend of Privacy
June 25, 2009 1:55 PM
comment(s) - last by
The man who journalists and experts expect to be the candidate for the cyber czar position has a sketchy past
President Barack Obama's lead candidate to become the
country's first ever cyber security czar
has some skeletons in his closet that will likely alarm security advocates, recent media reports indicate.
Former Republican Congressman Tom Davis, who is the former head of the Government Reform Committee, has been listed at the leading candidate, and is well known for being tech savvy. However, he has voted to expand the federal government's ability to wiretap and monitor Internet activity, along with helping draft the REAL ID Act.
"Given his role in REAL ID, Tom Davis would not be a good choice for privacy, which is something that President Obama specifically promised to protect in his remarks on the cyber security strategy,” according to Cato Institute director Jim Harper. "Many cyber security planners refer obliquely to ‘authentication’ and ‘identity management’ programs that would devastate privacy, anonymity and civil liberties. Davis would probably work to roll past these issues rather than solve them.”
Davis also helped author the Federal Information Security Management Act in 2002, while also serving as a co-chair on the Congress Information Technology Working Group.
unsure for quite some time
if the president would select a tech guru, a politician, or a politician with an understanding of technology. It's obviously crucial for the cybersecurity czar to understand tech issues, and the cybersecurity issues facing the country today, but a bureaucrat who understands how to get something done in Washington also is important.
If Davis is selected, it's more likely he'll face difficult administrative problems -- not necessarily tech-related issues -- as military and government network defense remains fractured and confusing. The cybersecurity czar would spearhead government defense, and help create new security guidelines on how to protect the country's infrastructure from foreign-based attacks originating in China and Eastern Europe.
Along with Davis, Melissa Hathaway, cyber advisor for President George W. Bush, and Paul Kurtz, Obama adviser and member of the National Security Council, also are two other possible candidates to the job.
This article is over a month old, voting and posting comments is disabled
RE: Oh hell....
6/26/2009 11:33:56 PM
Take another look at what I said. "The AUTHORITIES" are the ones who say you can't commit murder, steel or break the laws of society. THE AUTHORITIES have privileges that are needed to accomplish effective citizen protection.
And keep the hate speech going. My president will pass laws allowing people like me to bring up charges against people like you. And just as soon as I get the chance, what you own will belong to me and you will also pay fines.
I keep records of all the things people like you say online. Hehe
RE: Oh hell....
6/27/2009 2:01:01 AM
You are overlooking that "the authorities" are mere mortals, who make errors both accidentally and deliberately for various reasons or motives.
It is not effective citizen protection to decide for the citizens that one thing in their lives is protected but that their freedom, their right to a reasonable level of privacy is not.
Further, if you really believe you have nothing to hide I beg to differ, even good lawyers and judges accidentally run afoul of the law every once in a while without realizing it.
Please understand, I don't want protection from one thing that someone else thinks is more important at the cost of my freedoms to get there, nor do the majority as this is one of the main principles the country is founded upon and cherishes.
Lastly, your record-keeping is a pathetic delusion, if even true, are you on drugs?
RE: Oh hell....
6/27/2009 2:18:42 AM
You need to rethink your privacy concerns. There are a number of privacy issues you are overlooking. Your medical records, financial records and just about anything else you allow other people to monitor are all far from private...even though the public normally doesn't see them.
As I said before, I say again....those who have something to hide will make an issue of the internet privacy concerns...usually the porn indulging kind.
My records are none of your business. But I dare you to speak abusively to me. You seem to want to solve your issues with abuse...if someone doesn't agree with you, they are evil and deserve punishment. That's a child's mentality, to resort to abuse. It shows immaturity in the user of abusive words. It shows that they aren't wise or intelligent enough to debate effectively or find a rational means of banter. To resort to insult shows ignorance.
"Spreading the rumors, it's very easy because the people who write about Apple want that story, and you can claim its credible because you spoke to someone at Apple." -- Investment guru Jim Cramer
New Bill Would Call for National Cybersecurity Advisor
April 3, 2009, 8:00 AM
NSA Spying Won't Impact Huawei's Growth
April 23, 2014, 8:24 PM
Amazon, HBO Team up to Bring HBO Content to Prime Members
April 23, 2014, 11:36 AM
U.S. Wants to Reduce Tension Over Internet Net Neutrality
April 22, 2014, 2:07 PM
AT&T Announces Plans to Expand Ultra-Fast Fiber Internet Network to 100 Cities
April 22, 2014, 9:36 AM
AT&T Takes First Steps in Launching Its Own Online Video Service
April 22, 2014, 9:25 AM
Netflix Opposes Comcast/Time Warner Deal, Says It's Anti-Competitive
April 22, 2014, 8:52 AM
Most Popular Articles
A Bug's Life: Female Cave Bugs Have Penises, Penetrate Males for Three Days
April 17, 2014, 7:20 PM
HTC Hires Former Samsung Marketing Chief Who Developed "Galaxy" Brand
April 18, 2014, 6:00 PM
NASA Finds "Habitable Zone" Planet Sized Similar to Earth
April 18, 2014, 3:13 PM
Mounties Arrest 19-Year-Old Who Delayed Canada's Tax Filing w/ Heartbleed
April 17, 2014, 3:24 PM
Thanks to Government Crackdown, Chinese "Porn Cop" Has Watched 600K Adult Videos
April 21, 2014, 12:00 PM
Latest Blog Posts
Facebook Aims to Provide Internet to "Every Person in the World" with Drones, Satellites
Apr 1, 2014, 10:20 AM
Retail Mobile Sites Experience Outages in Light of Simplexity's Bankruptcy
Mar 14, 2014, 8:48 AM
Tesla vs. BMW: Who Has the Safer EV?
Feb 1, 2014, 2:56 PM
Justice Leaks Details of Next HTC One Two Flagship Phone
Dec 5, 2013, 4:04 PM
Global Cyber Espionage Concerns Reveal Growing Cyber Armies
Nov 29, 2013, 11:04 AM
More Blog Posts
Copyright 2014 DailyTech LLC. -
Terms, Conditions & Privacy Information