Senate kills bid to make White House czars accountable
Amendment would have extended congressional oversight over cybersecurity coordinator
Computerworld - A proposed amendment that would have given Congress more oversight over the White House cybersecurity czar and at least 17 other czars appointed by President Obama was shut down in the U.S. Senate today.
The amendment, proposed by Sen. Susan Collins (R-Maine), sought to restrict federal funds for the expenses of White House-appointed czars unless two conditions were met. One of them was to require the president to agree that every czar would respond to "reasonable requests" to testify before Congress on matters related to the office. The other would require the czars to issue a report to Congress twice a year. The proposed amendment was in an Interior Department environmental appropriations bill on the Senate floor.
In a statement, Collins said the amendment was needed to ensure greater transparency and accountability. She had claimed that direct White House appointees were largely insulated from congressional oversight and often duplicated or diluted the statutory authority and responsibilities of cabinet-level appointees who had been vetted by Congress.
However, the amendment was ruled "non-germane" to the pending bill in the Senate this afternoon and will not move forward, a spokesman for Collins said in an e-mail. "The amendment fell," following an objection by Sen. Dick Durbin (D-Ill.), he said.
Collins, who is the ranking minority member of the Senate Homeland Security and Governmental Affairs Committee, had raised similar concerns previously, especially with regard to Obama's plans to appoint a White House cybersecurity czar, or agency coordinator.
At a committee hearing in May on strategies for securing cyberspace, Collins had said that putting the White House in charge would make it harder for Congress to exercise oversight of critical cybersecurity policies and budgets. Collins proposed instead that the government consider adopting the model used in setting up the National Counterterrorism Center. The NCTC, which was established in August 2004 on the recommendations of the 9/11 Commission, works in the Office of the Director of National Intelligence, a setup that allows for greater congressional oversight, she had said.
The developments come amid a delay by the White House in naming a new cybersecurity coordinator. The president announced the position in May and stressed the need for a national strategy for securing U.S. interests in cyberspace.
The delay in making the appointment has fueled speculation about the likely candidates and the nature of the job. Earlier this month, the Reuters news service, quoting an unnamed source with "direct knowledge" of the matter, said the front-runner for the post was Frank Kramer, an assistant defense secretary under President Bill Clinton.
Read more about Security in Computerworld's Security Topic Center.
- Best iPhone, iPad Business Apps for 2014
- 14 Tech Conventions You Should Attend in 2014
- 10 Desktop Apps to Power Your Windows PC
- How to Add New Job Skills Without Going Back to School
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Alert Logic for PCI DSS Compliance To achieve PCI DSS compliance, you must identify and remediate all critical vulnerabilities detected during PCI scans. Threat Manager streamlines this process by...
- Cybersecurity Imperatives Reinvent Your Network Security With Palo Alto Networks The Rise of CyberSecurity
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts