People were having a cow over "carnivore" being used in the Bush administration to track suspected foreign terrorists after 9-11. Given such broad sweeping powers how can this be any different?
Follow the crumb trail GPS mapping of every door in the US by ACORN census takers, Homeland Security labeling anyone not agreeing with the current administration a potential domestic terrorist and now this.
Guess since newspeak calls it something different it gets a free pass.
________
"Obama Set to Create A Cybersecurity Czar With Broad Mandate
Shielding Public, Private Networks Is Goal
By Ellen Nakashima
Washington Post Staff Writer
Tuesday, May 26, 2009
"President Obama is expected to announce late this week that he will create a "cyber czar," a senior White House official who will have broad authority to develop strategy to protect the nation's government-run and private computer networks, according to people who have been briefed on the plan.
The adviser will have the most comprehensive mandate granted to such an official to date and will probably be a member of the National Security Council but will report to the national security adviser as well as the senior White House economic adviser, said the sources, who spoke on the condition of anonymity because the deliberations are not final.
The announcement will coincide with the long-anticipated release of a 40-page report that evaluates the government's cybersecurity initiatives and policies. The report is intended to outline a "strategic vision" and the range of issues the new adviser must handle, but it will not delve into details, administration officials told reporters last month.
Cybersecurity "is vitally important, and the government needs to be coordinated on this," a White House official said Friday, speaking on the condition of anonymity. "The report give conclusions and next steps. It's trying to steer us in the right direction."
The document will not resolve the politically charged issue of what role the National Security Agency, the premier electronic surveillance agency, will have in protecting private-sector networks. The issue is a key concern in policy circles, and experts say it requires a full and open debate over legal authorities and the protection of citizens' e-mails and phone calls. The Bush administration's secrecy in handling its Comprehensive National Cybersecurity Initiative, most of which was classified, hindered such a debate, privacy advocates have said.
ad_icon
The White House's role will be to oversee the process, formulate policy and coordinate agencies' roles, and will not be operational, administration officials have said.
Obama was briefed a week ago and signed off on the creation of the position, the sources said. But as of Friday, discussions were continuing as to what rank and title the adviser would have. The idea is to name someone who can "pick up the phone and contact the president directly, if need be," an administration official said, speaking on the condition of anonymity.
Obama pledged during his presidential campaign to elevate the issue of cybersecurity to a "top priority" and to appoint a national cybersecurity adviser "who will report directly to me."
Having the adviser report to both the national security and economic advisers suggests that the White House is seeking to ensure a balance between homeland security and economic concerns, the sources said. It also indicates an effort to quell an internal political battle in which Lawrence H. Summers, the senior White House economic adviser, is pushing for the National Economic Council to have a key role in cybersecurity to ensure that efforts to protect private networks do not unduly threaten economic growth, the sources said.
The report suggests that although it is a key government responsibility to help secure private-sector networks, regulation should be the last resort, the sources said. The report touts the concept of public-private partnerships to protect nongovernmental systems. It discusses the need to provide incentives for greater data sharing and risk management, and to use the procurement process to drive greater security, they said.
The report recommends that members be appointed to the Privacy and Civil Liberties Oversight Board, an independent executive branch agency created by Congress in 2007 to ensure that privacy concerns are considered in the implementation of counterterrorism policies and laws. The report suggests that the board's mandate expressly include cybersecurity, the sources said.
The document is based on a 60-day review of cyber policies, led by Melissa Hathaway, the interim White House cybersecurity adviser and former intelligence official who is a contender for the new position. During that review, Hathaway's team had dozens of meetings with representatives from industry, academia and civil liberties groups, and received more than 100 papers. "
http://www.washingtonpost.com/wp-dyn/content/article/2009/05/25/AR2009052502104.html
March 2024 February 2024 January 2024 December 2023 November 2023 October 2023 September 2023 August 2023 July 2023 June 2023 May 2023 April 2023 March 2023 February 2023 January 2023 December 2022 November 2022 October 2022 September 2022 August 2022 July 2022 June 2022 May 2022 April 2022 March 2022 February 2022 January 2022 December 2021 November 2021 October 2021 September 2021 August 2021 July 2021 June 2021 May 2021 April 2021 March 2021 February 2021 January 2021 December 2020 November 2020 October 2020 September 2020 August 2020 July 2020 June 2020 May 2020 April 2020 March 2020 February 2020 January 2020 December 2019 November 2019 October 2019 September 2019 August 2019 July 2019 June 2019 May 2019 April 2019 March 2019 February 2019 January 2019 December 2018 November 2018 October 2018 September 2018 August 2018 July 2018 June 2018 May 2018 April 2018 March 2018 February 2018 January 2018 December 2017 November 2017 October 2017 September 2017 August 2017 July 2017 June 2017 May 2017 April 2017 March 2017 February 2017 January 2017 December 2016 November 2016 January 2013 October 2011 September 2011 August 2011 July 2011 June 2011 May 2011 March 2011 January 2011 December 2010 October 2010 September 2010 August 2010 July 2010 June 2010 May 2010 April 2010 March 2010 February 2010 January 2010 December 2009 November 2009 October 2009 September 2009 August 2009 July 2009 June 2009 May 2009 April 2009 March 2009 February 2009 January 2009 December 2008 November 2008 October 2008 September 2008 August 2008 July 2008 June 2008 May 2008 April 2008 March 2008 February 2008 January 2008 December 2007 November 2007 October 2007 April 2007 March 2007 February 2007 January 2007 December 2006 November 2006 October 2006 September 2006 August 2006 July 2006 June 2006 May 2006 April 2006 March 2006 February 2006 January 2006 December 2005 November 2005 October 2005 September 2005 August 2005 July 2005 June 2005 March 2005 November 2004 October 2004