Fallout from Snowden leaks could hinder next NSA chief
Gen. Keith Alexander to depart as NSA director next spring
Computerworld - Whoever succeeds Gen. Keith Alexander as the next director of the National Security Agency will be stuck weathering the fallout from the Edward Snowden media leaks for the conceivable future.
The NSA on Thursday confirmed that Alexander would step down as the agency's director in the spring. Deputy Director John Inglis will also be leaving the agency in January, the NSA noted.
In an emailed statement, NSA spokeswoman Vanee Vines said Alexander's planned exit had nothing do with the Snowden leaks. Rather, his decision to quit was made in March 2013, before the disclosures were made.
"The transition date for Gen. Alexander will occur in the spring of 2014 in accordance with the most recent extension decision made by the Secretary of Defense in March 2013," Vines said.
Vines said Alexander's tenure had been extended three separate times -- in 2009, 2010 and in 2013. "He's served well beyond a normal rotation," and is leaving in accordance with previously announced plans, Vines noted. The NSA is in the process of selecting a successor, the spokeswoman added.
Alexander, who will be 63 at the time of his departure, is the agency's longest serving director. Donald Rumsfeld, former U.S. defense secretary during the George W. Bush administration, appointed him director in 2005. He was given additional responsibility as commander of the U.S. Cyber Command in 2010.
Notice of Alexander's departure comes amid continuing public and congressional turmoil over the NSA's surveillance activities. Snowden's revelations about the agency's data collection and data mining practices have fueled widespread privacy and civil rights concerns in the U.S. and elsewhere.
The four-star general has, in many ways, been the face of the controversy over dragnet surveillance practices by U.S. intelligence agencies. Alexander himself has stoutly defended the agency's practices as vital to national security. He has consistently downplayed concerns that the agency may have overstepped its authority in collecting data on U.S. residents.
In testimony before Congress earlier this year, Alexander blasted news media reports as inaccurate and exaggerated in their descriptions of the agency's data collection activities. Alexander insisted to lawmakers that the NSA has the authority to collect all U.S. phone records and put them in a "lock box" from where they could be searched as needed. He maintained that the activities disclosed by Snowden are legally sanctioned and vital to protecting the nation from more 9/11-like attacks.
In comments to The Hill on Thursday, a White House spokeswoman described Alexander's tenure as "extraordinary" and praised him for capably leading the NSA and the Cyber Command through periods of both growth and transition.
This pilot fish is a contractor at a military base, working on some very cool fire-control systems for tanks. But when he spots something obviously wrong during a live-fire test, he can't get the firing-range commander's attention.
- IT Certification Study Tips
- Register for this Computerworld Insider Study Tip guide and gain access to hundreds of premium content articles, cheat sheets, product reviews and more.
- Reduce federal infrastructure risk with compliance management and situational awareness
- IBM continuous monitoring and management solutions deliver real-time situational awareness to help federal agencies understand vulnerabilities, and protect the infrastructure.
- Mission Critical: Managing Mobile Applications & Content
- Smartphones, tablets and other mobile devices have become embedded in enterprise processes, thanks to the consumerization of IT and a new generation of...
- Securing Mobility, From Device to Network
- At one time, the process of managing and securing mobile devices and applications was fairly straightforward. Most organizations worried about one application (email)...
- Planning for Mobile Success
- Many organizations are seeing clear and quantifiable benefits from the deployment of mobile technologies that provide access to data and applications any time,...
- The Challenges and Opportunities of Mobile Application Development
- Nearly all business users now demand mobile devices--their own or company-owned--along with anywhere access to corporate applications and data. What turns mobile devices... All Government IT White Papers
- Keep Servers Up and Running and Attackers in the Dark An SSL/TLS handshake requires at least 10 times more processing power on a server than on the client. SSL renegotiation attacks can readily...
- On Demand: Mastering the Art of Mobile Content Management Mobile device usage in the enterprise has skyrocketed, and it continues to escalate. IT must answer to users who demand access to their...
- DevOps with PureApplication System: Reduce cost and speed delivery with an integrated IBM Cloud solution Join this webcast to hear what ING Netherlands has been able to achieve while deploying DevOps tools from IBM Rational. An ING executive...
- NSS Labs & Cisco Present: Evaluating Leading Breach Detection Systems Today's constantly evolving advanced malware and APTs can evade point-in-time defenses to penetrate networks. Security professionals must evolve their strategy in lockstep to...
- Will the Real Endpoint Threat Detection and Response Please Stand Up? This webinar explores new technologies & process for protecting endpoints from advanced attackers as well as the innovations that are pushing the envelope...
- All Government IT Webcasts