Fallout from Snowden leaks could hinder next NSA chief
Gen. Keith Alexander to depart as NSA director next spring
Computerworld - Whoever succeeds Gen. Keith Alexander as the next director of the National Security Agency will be stuck weathering the fallout from the Edward Snowden media leaks for the conceivable future.
The NSA on Thursday confirmed that Alexander would step down as the agency's director in the spring. Deputy Director John Inglis will also be leaving the agency in January, the NSA noted.
In an emailed statement, NSA spokeswoman Vanee Vines said Alexander's planned exit had nothing do with the Snowden leaks. Rather, his decision to quit was made in March 2013, before the disclosures were made.
"The transition date for Gen. Alexander will occur in the spring of 2014 in accordance with the most recent extension decision made by the Secretary of Defense in March 2013," Vines said.
Vines said Alexander's tenure had been extended three separate times -- in 2009, 2010 and in 2013. "He's served well beyond a normal rotation," and is leaving in accordance with previously announced plans, Vines noted. The NSA is in the process of selecting a successor, the spokeswoman added.
Alexander, who will be 63 at the time of his departure, is the agency's longest serving director. Donald Rumsfeld, former U.S. defense secretary during the George W. Bush administration, appointed him director in 2005. He was given additional responsibility as commander of the U.S. Cyber Command in 2010.
Notice of Alexander's departure comes amid continuing public and congressional turmoil over the NSA's surveillance activities. Snowden's revelations about the agency's data collection and data mining practices have fueled widespread privacy and civil rights concerns in the U.S. and elsewhere.
The four-star general has, in many ways, been the face of the controversy over dragnet surveillance practices by U.S. intelligence agencies. Alexander himself has stoutly defended the agency's practices as vital to national security. He has consistently downplayed concerns that the agency may have overstepped its authority in collecting data on U.S. residents.
In testimony before Congress earlier this year, Alexander blasted news media reports as inaccurate and exaggerated in their descriptions of the agency's data collection activities. Alexander insisted to lawmakers that the NSA has the authority to collect all U.S. phone records and put them in a "lock box" from where they could be searched as needed. He maintained that the activities disclosed by Snowden are legally sanctioned and vital to protecting the nation from more 9/11-like attacks.
In comments to The Hill on Thursday, a White House spokeswoman described Alexander's tenure as "extraordinary" and praised him for capably leading the NSA and the Cyber Command through periods of both growth and transition.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
If you use ‘password,’ one the worst passwords, as your password, fail to keep antivirus protection updated and don’t bother to deploy security patches to close critical vulnerabilities, then maybe you should consider working for the cybersecurity-clueless federal government; you’d fit right in, according to Senator Tom Coburn's cybersecurity and critical infrastructure report.
- IT Certification Study Tips
- Register for this Computerworld Insider Study Tip guide and gain access to hundreds of premium content articles, cheat sheets, product reviews and more.
- Changing the Way Government Works: Four Technology Trends that Drive Down Costs and Increase Productivity
- This paper discusses four technology-based approaches to improving processes and increasing
productivity while driving down department and agency costs.
- HP HAVEn: See the big picture in Big Data
- HP HAVEn is the industry's first comprehensive, scalable, open, and secure platform for Big Data. Enterprises are drowning in a sea of data...
- What Datapipe customers need to know about the new PCI DSS 3.0 compliance standard
- This handy quick reference outlines what PCI DSS 3.0 is, who needs to be compliant and how Alert Logic solutions address the new...
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting
- This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle
- This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle. All Government IT White Papers
- Meg Whitman presents Unlocking IT with Big Data During this Web Event you will hear Meg Whitman, President and CEO, HP discuss HAVEn - the #1 Big Data platform, as well...
- The New Way to Work Knowledge Vault This Knowledge Vault focuses on how, in today's increasingly virtual world, it's more important than ever to engage deeply with employees, suppliers, partners,...
- Getting Ready for BlackBerry Enterprise Service 10.2 Find out how BlackBerry® Enterprise Service 10 helps organizations address the full spectrum of EMM challenges, while balancing the needs of both the...
- Containerization Options: How to Choose the Best DLP Solution for Your Organization This webcast outlines a framework for making the right choice when it comes to containerization approaches, along with the pros and cons of...
- Mobile Apps and Devices Slash Customer Cycle Time Consolidated Engineering Laboratories' field employees used to collect data on triplicate forms that were sometimes hard to read and difficult to manage. After...
- All Government IT Webcasts