Federal cybersecurity director quits, complains of NSA role
Rod Beckstrom quit the post after less than a year
Computerworld - In a move that highlights differences over who should be in charge of national cybersecurity efforts, the director of a federal office set up to protect civilian, military and intelligence networks has submitted his resignation after less than a year in the job.
Rod Beckstrom, director of the National Cyber Security Center (NCSC), on Friday said he is quitting because of concerns over what he said is the National Security Agency's (NSA) domination of the nation's cybersecurity efforts. The NCSC was set up within the U.S. Department of Homeland Security (DHS) last year to oversee and coordinate efforts to shore up the nation's defenses and responses to cyberthreats.
Beckstrom was appointed to lead the NCSC in March 2008 and was required to report directly to then-DHS Secretary Michael Chertoff.
In a sharply worded letter to current DHS Secretary Janet Napolitano, Beckstrom on Friday noted that the NSA effectively controlled DHS cyberefforts "through detailees, technology insertions" and a proposed move of the National Protection and Programs Directorate and the NCSC to an NSA facility in Fort Meade. His letter, dated March 5, noted that allowing the NSA to control national cybersecurity efforts is a "bad strategy on multiple grounds."
Beckstrom also stressed his unwillingness to "subjugate the NCSC underneath the NSA."
The intelligence culture embodied by the NSA is "very different than a network operations or security culture," said Beckstrom in the letter, a copy of which was obtained by Computerworld. Allowing a single agency such as the NSA to handle all top-level government network security and monitoring functions poses a significant threat to "our democratic processes," he said. "Instead, we advocated a model where there is a credible civilian government cybersecurity capability which interfaces with, but is not controlled by, the NSA."
Beckstrom also lamented the lack of "appropriate" support for his office within the DHS during the Bush administration. He noted that over the past year, his office had received just five weeks' worth of funding because of various roadblocks engineered within the DHS and the White House Office of Management and Budget (OMB).
Beckstrom's resignation is sure to focus attention on a 60-day review of national cybersecurity efforts now under way by Melissa Hathaway, a Bush administration official, at the behest of President Barack Obama. Hathaway has been working as a cybercoordination executive for the Office of the Director of National Intelligence Comprehensive National Cyber Security Initiative, or CNCI.
The CNCI is a highly classified multibillion dollar cybersecurity initiative approved by then-President George W. Bush early last year. Hathaway has been in charge of coordinating and monitoring the CNCI's implementation and was recently asked by Obama to do a complete review of CNCI and other governmentwide cybersecurity initiatives.
Beckstrom's resignation is likely to force Hathaway to address the issue of who should run the government's overall national cybersecurity efforts. Even before Beckstrom's announcement, questions had arisen about the idea of letting the NSA taking the lead on cybersecurity issues. At a congressional hearing as far back as February 2008, lawmakers had expressed concern about the NSA's role in the CNCI, especially because of the classified nature of the initiative.
In December, a panel of security experts from the Center for Strategic and International Studies delivered a set of cybersecurity recommendations for the Obama administration explicitly calling on the White House to take overall charge of cyberinitiatives, not the NSA.
Read more about Security in Computerworld's Security Topic Center.
- Enable secure remote access to 3D data without sacrificing visual perfomance Design and manufacturing companies must adapt quickly to the demands of an increasingly global and competitive economy. To speed time to market for...
- Virtually Delivered High Performance 3D Graphics "A picture is worth a thousand words." That old phrase is as true today as it ever was. Pictures (i.e., those with heavy...
- Best Practices for Securing Hadoop Historically, Apache Hadoop has provided limited security capabilities. To protect sensitive data being stored and analyzed in Hadoop, security architects should use a...
- Top Tips for Securing Big Data Environments: Why Big Data Doesn't Have to Mean Big Security Challenges Organizations must come to terms with the security challenges they introduce. As big data environments ingest more data, organizations will face significant risks...
- What should I look for in a Next Generation Firewall? SANS Provides Guidance With so many vendors claiming to have a Next Generation Firewall (NGFW), it can be difficult to tell what makes each one different....
- Responding to New SSL Cybersecurity Threat The featured Gartner research examines current strategies to address new SSL cybersecurity threats and vulnerabilities. All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!