{"id":3519,"date":"2011-01-03T10:39:52","date_gmt":"2011-01-03T03:39:52","guid":{"rendered":"http:\/\/mar.acisonline.net\/?p=3519"},"modified":"2022-04-21T10:17:07","modified_gmt":"2022-04-21T10:17:07","slug":"obama-to-name-chief-of-cybersecurity","status":"publish","type":"post","link":"https:\/\/oldsite.acisonline.net\/?p=3519","title":{"rendered":"Obama to Name Chief of Cybersecurity"},"content":{"rendered":"<p><!--:en-->Nearly seven months after highlighting the vulnerability of banking, energy and communications systems to Internet attacks, the White House on Tuesday is expected to name a technology industry veteran to coordinate competing efforts to improve the nation\u2019s cybersecurity in both military and civilian life.<br \/>\nThe decision to appoint Howard A. Schmidt, an industry executive with government experience who served as a cybersecurity adviser in the Bush administration and who also has a military and law enforcement background, is seen as a compromise between factions. Government officials and industry executives say there has been a behind-the-scenes dispute over whether strict new regulations are necessary to protect the network that increasingly weaves together the vast majority of the world\u2019s computers.<br \/>\nMr. Schmidt will report to the\u00a0<a title=\"More articles about National Security Council, U.S.\" href=\"http:\/\/topics.nytimes.com\/top\/reference\/timestopics\/organizations\/n\/national_security_council\/index.html?inline=nyt-org\">National Security Council<\/a>\u00a0\u2014 not both to the council and to the National Economic Council, as previously planned, an administration official said on Monday. Mr. Schmidt will also \u201chave regular access to the president,\u201d said the official, who spoke on the condition of anonymity because he had not been authorized to talk publicly about the appointment.<br \/>\nCybersecurity has taken on new urgency this year in the face of a growing range of cyberattacks and reports of vulnerabilities in business and military computing systems. Indeed, at the May 29 announcement of his administration\u2019s decision to create the position of cybersecurity coordinator, Mr. Obama described how during his presidential campaign computer intruders had \u201cgained access to e-mails and a range of campaign files, from policy position papers to travel plans.\u201d<br \/>\n\u201cIt was,\u201d he said, \u201ca powerful reminder: in this information age, one of your greatest strengths \u2014 in our case, our ability to communicate to a wide range of supporters through the Internet \u2014 could also be one of your greatest vulnerabilities.\u201d<br \/>\nAfter reviewing the nation\u2019s cybersecurity preparedness, the White House said it would create the position of cybersecurity coordinator to harmonize the nation\u2019s various efforts to \u201cdeter, prevent, detect and defend\u201d against cyberattacks.<br \/>\nThe administration\u2019s decision to appoint Mr. Schmidt was slowed by a tug of war among political, military, intelligence and business interests, said people with direct knowledge of the selection process. Industry officials, for example, have expressed concern that new regulations would dampen innovation.<br \/>\nIn recent months the administration has been criticized by lawmakers and others for not moving more quickly to fill the position. Experts on the issue had questioned how effective a cybercoordinator could be if forced to report to two governmental councils without direct access to the president.<br \/>\n\u201cI\u2019ve come away with a strong sense that Vivek Kundra, chief information officer, and Aneesh Chopra, the chief technology officer, and participants at the N.S.C. are aligned on this effort,\u201d said Vinton Cerf, a co-author of the original Internet standards who has been consulted by the administration in choosing a \u201ccyberczar.\u201d<br \/>\nThe White House official also said that criticisms that the administration had been frozen on cybersecurity policies while waiting for the appointment of a cybersecurity chief were inaccurate, citing a range of initiatives now under way at various agencies to improve cybersecurity. In November the White House met with a Russian delegation of cybersecurity officials in an effort to build cooperation on international law enforcement issues.<br \/>\nOne significant difference in the Obama administration\u2019s approach to cybersecurity and that of the previous administration has been the degree of secrecy about strategy and policy issues. In the Bush administration, cybersecurity decisions were made in a highly classified fashion. What remains unclear, however, is how the new administration will balance cybersecurity decisions between military and civilian organizations.<br \/>\nIn May the administration\u2019s cybersecurity review was not specific about transforming the administration\u2019s goals into practical realities. At the time Mr. Obama did not explain how he planned to go about resolving the running turf wars among the Pentagon, the\u00a0<a title=\"More articles about National Security Agency, U.S.\" href=\"http:\/\/topics.nytimes.com\/top\/reference\/timestopics\/organizations\/n\/national_security_agency\/index.html?inline=nyt-org\">National Security Agency<\/a>, the\u00a0<a title=\"More articles about the Homeland Security Department.\" href=\"http:\/\/topics.nytimes.com\/top\/reference\/timestopics\/organizations\/h\/homeland_security_department\/index.html?inline=nyt-org\">Department of Homeland Security<\/a>\u00a0and other agencies over the conduct of defensive and offensive cyberoperations.<br \/>\nMr. Schmidt is the chief executive officer of the Information Security Forum, a nonprofit computer security trade association based in London. He has served as chief information security officer at\u00a0<a title=\"More information about eBay Inc\" href=\"http:\/\/topics.nytimes.com\/top\/news\/business\/companies\/ebay_inc\/index.html?inline=nyt-org\">eBay<\/a>\u00a0and chief security officer at\u00a0<a title=\"More information about Microsoft Corp\" href=\"http:\/\/topics.nytimes.com\/top\/news\/business\/companies\/microsoft_corporation\/index.html?inline=nyt-org\">Microsoft<\/a>. In the Bush administration, he was the vice chairman of the president\u2019s Critical Infrastructure Protection Board and a special adviser for cyberspace security.<br \/>\nHe also served in the Air Force and the Army in computer security roles and led a computer\u00a0<a title=\"More articles about Forensic Science.\" href=\"http:\/\/topics.nytimes.com\/top\/reference\/timestopics\/subjects\/f\/forensic_science\/index.html?inline=nyt-classifier\">forensics<\/a>\u00a0team for the\u00a0<a title=\"More articles about the Federal Bureau of Investigation.\" href=\"http:\/\/topics.nytimes.com\/top\/reference\/timestopics\/organizations\/f\/federal_bureau_of_investigation\/index.html?inline=nyt-org\">Federal Bureau of Investigation<\/a>\u00a0at the National Drug Intelligence Center.<br \/>\n[block-notice]<br \/>\n<a href=\"http:\/\/www.nytimes.com\/2009\/12\/22\/technology\/internet\/22cyber.html?_r=3&amp;\" target=\"_blank\" rel=\"noopener noreferrer\">LINK<\/a><br \/>\n[\/block-notice]<!--:--><!--:th-->Nearly seven months after highlighting the vulnerability of banking, energy and communications systems to Internet attacks, the White House on Tuesday is expected to name a technology industry veteran to coordinate competing efforts to improve the nation\u2019s cybersecurity in both military and civilian life.<br \/>\nThe decision to appoint Howard A. Schmidt, an industry executive with government experience who served as a cybersecurity adviser in the Bush administration and who also has a military and law enforcement background, is seen as a compromise between factions. Government officials and industry executives say there has been a behind-the-scenes dispute over whether strict new regulations are necessary to protect the network that increasingly weaves together the vast majority of the world\u2019s computers.<br \/>\nMr. Schmidt will report to the <a title=\"More articles about National Security Council, U.S.\" href=\"http:\/\/topics.nytimes.com\/top\/reference\/timestopics\/organizations\/n\/national_security_council\/index.html?inline=nyt-org\">National Security Council<\/a> \u2014 not both to the council and to the National Economic Council, as previously planned, an administration official said on Monday. Mr. Schmidt will also \u201chave regular access to the president,\u201d said the official, who spoke on the condition of anonymity because he had not been authorized to talk publicly about the appointment.<br \/>\nCybersecurity has taken on new urgency this year in the face of a growing range of cyberattacks and reports of vulnerabilities in business and military computing systems. Indeed, at the May 29 announcement of his administration\u2019s decision to create the position of cybersecurity coordinator, Mr. Obama described how during his presidential campaign computer intruders had \u201cgained access to e-mails and a range of campaign files, from policy position papers to travel plans.\u201d<br \/>\n\u201cIt was,\u201d he said, \u201ca powerful reminder: in this information age, one of your greatest strengths \u2014 in our case, our ability to communicate to a wide range of supporters through the Internet \u2014 could also be one of your greatest vulnerabilities.\u201d<br \/>\nAfter reviewing the nation\u2019s cybersecurity preparedness, the White House said it would create the position of cybersecurity coordinator to harmonize the nation\u2019s various efforts to \u201cdeter, prevent, detect and defend\u201d against cyberattacks.<br \/>\nThe administration\u2019s decision to appoint Mr. Schmidt was slowed by a tug of war among political, military, intelligence and business interests, said people with direct knowledge of the selection process. Industry officials, for example, have expressed concern that new regulations would dampen innovation.<br \/>\nIn recent months the administration has been criticized by lawmakers and others for not moving more quickly to fill the position. Experts on the issue had questioned how effective a cybercoordinator could be if forced to report to two governmental councils without direct access to the president.<br \/>\n\u201cI\u2019ve come away with a strong sense that Vivek Kundra, chief information officer, and Aneesh Chopra, the chief technology officer, and participants at the N.S.C. are aligned on this effort,\u201d said Vinton Cerf, a co-author of the original Internet standards who has been consulted by the administration in choosing a \u201ccyberczar.\u201d<br \/>\nThe White House official also said that criticisms that the administration had been frozen on cybersecurity policies while waiting for the appointment of a cybersecurity chief were inaccurate, citing a range of initiatives now under way at various agencies to improve cybersecurity. In November the White House met with a Russian delegation of cybersecurity officials in an effort to build cooperation on international law enforcement issues.<br \/>\nOne significant difference in the Obama administration\u2019s approach to cybersecurity and that of the previous administration has been the degree of secrecy about strategy and policy issues. In the Bush administration, cybersecurity decisions were made in a highly classified fashion. What remains unclear, however, is how the new administration will balance cybersecurity decisions between military and civilian organizations.<br \/>\nIn May the administration\u2019s cybersecurity review was not specific about transforming the administration\u2019s goals into practical realities. At the time Mr. Obama did not explain how he planned to go about resolving the running turf wars among the Pentagon, the <a title=\"More articles about National Security Agency, U.S.\" href=\"http:\/\/topics.nytimes.com\/top\/reference\/timestopics\/organizations\/n\/national_security_agency\/index.html?inline=nyt-org\">National Security Agency<\/a>, the <a title=\"More articles about the Homeland Security Department.\" href=\"http:\/\/topics.nytimes.com\/top\/reference\/timestopics\/organizations\/h\/homeland_security_department\/index.html?inline=nyt-org\">Department of Homeland Security<\/a> and other agencies over the conduct of defensive and offensive cyberoperations.<br \/>\nMr. Schmidt is the chief executive officer of the Information Security Forum, a nonprofit computer security trade association based in London. He has served as chief information security officer at <a title=\"More information about eBay Inc\" href=\"http:\/\/topics.nytimes.com\/top\/news\/business\/companies\/ebay_inc\/index.html?inline=nyt-org\">eBay<\/a> and chief security officer at <a title=\"More information about Microsoft Corp\" href=\"http:\/\/topics.nytimes.com\/top\/news\/business\/companies\/microsoft_corporation\/index.html?inline=nyt-org\">Microsoft<\/a>. In the Bush administration, he was the vice chairman of the president\u2019s Critical Infrastructure Protection Board and a special adviser for cyberspace security.<br \/>\nHe also served in the Air Force and the Army in computer security roles and led a computer <a title=\"More articles about Forensic Science.\" href=\"http:\/\/topics.nytimes.com\/top\/reference\/timestopics\/subjects\/f\/forensic_science\/index.html?inline=nyt-classifier\">forensics<\/a> team for the <a title=\"More articles about the Federal Bureau of Investigation.\" href=\"http:\/\/topics.nytimes.com\/top\/reference\/timestopics\/organizations\/f\/federal_bureau_of_investigation\/index.html?inline=nyt-org\">Federal Bureau of Investigation<\/a> at the National Drug Intelligence Center.<br \/>\n[block-notice]<br \/>\n<a href=\"http:\/\/www.nytimes.com\/2009\/12\/22\/technology\/internet\/22cyber.html?_r=3&amp;\" target=\"_blank\" rel=\"noopener noreferrer\">LINK<\/a><br \/>\n[\/block-notice]<!--:--><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Nearly seven months after highlighting the vulnerability of banking, energy and communications systems to Internet attacks, the White House on Tuesday is expected to name a technology industry veteran to coordinate competing efforts to improve the nation\u2019s cybersecurity in both military and civilian life.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[37],"tags":[59],"table_tags":[],"class_list":["post-3519","post","type-post","status-publish","format-standard","hentry","category-press","tag-cybersecurity"],"_links":{"self":[{"href":"https:\/\/oldsite.acisonline.net\/index.php?rest_route=\/wp\/v2\/posts\/3519","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/oldsite.acisonline.net\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/oldsite.acisonline.net\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/oldsite.acisonline.net\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/oldsite.acisonline.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=3519"}],"version-history":[{"count":1,"href":"https:\/\/oldsite.acisonline.net\/index.php?rest_route=\/wp\/v2\/posts\/3519\/revisions"}],"predecessor-version":[{"id":9412,"href":"https:\/\/oldsite.acisonline.net\/index.php?rest_route=\/wp\/v2\/posts\/3519\/revisions\/9412"}],"wp:attachment":[{"href":"https:\/\/oldsite.acisonline.net\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=3519"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/oldsite.acisonline.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=3519"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/oldsite.acisonline.net\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=3519"},{"taxonomy":"table_tags","embeddable":true,"href":"https:\/\/oldsite.acisonline.net\/index.php?rest_route=%2Fwp%2Fv2%2Ftable_tags&post=3519"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}