Risk
3/9/2009
06:29 PM
Connect Directly
LinkedIn
Twitter
Google+
RSS
E-Mail
50%
50%

U.S. Cybersecurity Director Resigns, Blames NSA

Rod Beckstrom criticizes the NSA's dominance of most of the nation's cybersecurity initiatives.

The government's director of cybersecurity resigned Thursday, warning that the National Security Agency's control of national cybersecurity efforts poses a potential threat to U.S. democratic processes.

Rod Beckstrom, a former Silicon Valley entrepreneur, was appointed in March 2008 to run the National Cybersecurity Center, a group created to oversee government cybersecurity efforts.

In his March 5 resignation letter, a copy of which was published by The Wall Street Journal, Beckstrom criticized the NSA's dominance of most of the nation's cybersecurity initiatives.

"While acknowledging the critical important of the NSA to our intelligence efforts, I believe this is a bad strategy on multiple grounds," he wrote. "The intelligence culture is very different than a network operations or security culture. In addition, the threats to our democratic processes are significant if all top-level government network security and monitoring are handled by one organization (either directly or indirectly)."

Beckstrom said he supports a model that allows for a civilian government cybersecurity capability operating in partnership with the NSA, but not controlled by it. He also made it clear that he was unhappy with the lack of funding at the NCSC, noting that the organization "received only five weeks of funding, due to various roadblocks engineered with the [Department of Homeland Security] and by the Office of Management and Budget."

U.S. Rep. Yvette Clarke, D-NY, who chairs the House Subcommittee on Emerging Threats, Cybersecurity, Science, and Technology, expressed regret over Beckstrom's departure and blamed the Bush administration for hobbling Beckstrom's efforts by withholding funds.

"Mr. Beckstrom's departure is a huge loss for the department," Clarke said in an e-mailed statement. "If the last administration had provided him with the appropriate resources and staffing, he would have been extremely effective."

Previous
1 of 2
Next
Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7441
Published: 2015-05-29
The modern style negotiation in Network Block Device (nbd-server) 2.9.22 through 3.3 allows remote attackers to cause a denial of service (root process termination) by (1) closing the connection during negotiation or (2) specifying a name for a non-existent export.

CVE-2014-9727
Published: 2015-05-29
AVM Fritz!Box allows remote attackers to execute arbitrary commands via shell metacharacters in the var:lang parameter to cgi-bin/webcm.

CVE-2015-0200
Published: 2015-05-29
IBM WebSphere Commerce 6.x through 6.0.0.11 and 7.x before 7.0.0.8 IF2 allows local users to obtain sensitive database information via unspecified vectors.

CVE-2015-0751
Published: 2015-05-29
Cisco IP Phone 7861, when firmware from Cisco Unified Communications Manager 10.3(1) is used, allows remote attackers to cause a denial of service via crafted packets, aka Bug ID CSCus81800.

CVE-2015-0752
Published: 2015-05-29
Cross-site scripting (XSS) vulnerability in Cisco TelePresence Video Communication Server (VCS) X8.5.1 allows remote attackers to inject arbitrary web script or HTML via a crafted URL, aka Bug ID CSCut27635.

Dark Reading Radio
Archived Dark Reading Radio
After a serious cybersecurity incident, everyone will be looking to you for answers -- but you’ll never have complete information and you’ll never have enough time. So in those heated moments, when a business is on the brink of collapse, how will you and the rest of the board room executives respond?