WASHINGTON: “One of the things I try to tell the work force out there is this is not what is going to define us,” said Adm. Mike Rogers, new head of the National Security Agency and US Cyber Command. After two months in the job — and halfway through this morning’s Q&A at a Bloomberg Government… Keep reading →
WASHINGTON: In a speech that demonstrated just how important SIGINT really is, President Obama issued a new policy directive today that essentially says, we’ll be more careful in the future about containing leaks, making allies mad at us and giving American’s reason to think we might be violating their privacy. Perhaps most importantly, the new… Keep reading →
The U.S. defense industry, being reshaped by declining post-war budgets, globalization, and the increased pace of technological change, must work with the Pentagon and take proactive steps to maintain our historic preeminence on the battlefield. Our industry does not easily embrace change. In fact, history demonstrates that shifts in the defense industry have largely been… Keep reading →
WASHINGTON: The American Civil Liberties Union, those card-carrying folks, have come straight out in opposition to CISPA, the House cybersecurity bill.
The ACLU cited the Obama administration’s “veto threat” in its statement, released soon after the 288-127 bipartisan vote in favor of the bill. But the administration’s veto threat is pretty squishy, if past Obama and Bush threats are any guide. The Office of Management and Budget Statement of Administration Policy says that, “…if the bill, as currently crafted, were presented to the President, his senior advisors would recommend that he veto the bill.” Usually that’s a warning shot meant to influence the final shape of the bill and usually means nothing happens. Keep reading →
WASHINGTON: The nation needs cyber-security legislation to authorize sharing of threat data between industry and government in real time, said Gen. Keith Alexander, chief of both the National Security Agency and the US Cyber Command, and it can be done without any danger to individual privacy. Keep reading →