Clinton proposes anti-terrorist "Cyber Corps"

President Clinton proposed Friday that the United States form a "Cyber Corps" of computer experts to defend against threats to the nation's critical information systems.

The Cyber Corps program would help fortify the ranks of federal government computer experts, Clinton said, and would encourage federal agencies to recruit computer-savvy college grads. In addition, the program would set aside funding for training and retraining of federal computer technology experts.

The suggestion was made in a speech at the National Academy of Sciences, where Clinton outlined three additional initiatives to combat cyber-terrorism.

Clinton recommended stepping up research efforts to detect hackers trying to break into computer systems, building intruder detection networks that would alert key agencies when a critical computer system had been hacked, and proposed the creation of information centers that would promote private-sector cooperation in addressing cyber-threats.

The President said he would include $1.46 billion in his budget proposal to Congress to fund these initiatives, a 40 percent increase from what the government spent on cyber-defense two years ago.

The Pentagon received a wake-up call last year when certain unclassified Department of Defense computer systems were hacked. It took several days for the Pentagon to determine that the attacks were acts of vandalism and not foreign threats.

Clinton illustrated the world's dependence on critical information systems by referring to last spring's satellite failure in which ATMs, pagers, television and credit card systems worldwide were temporarily disabled.

"We must be ready-ready if our adversaries try to use computers to disable power grids, banking, communications and transportation networks, police, fire and health services-or military assets," he said.

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
Close [ x ] More from GovExec

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Forecasting Cloud's Future

    Conversations with Federal, State, and Local Technology Leaders on Cloud-Driven Digital Transformation

  • The Big Data Campaign Trail

    With everyone so focused on security following recent breaches at federal, state and local government and education institutions, there has been little emphasis on the need for better operations. This report breaks down some of the biggest operational challenges in IT management and provides insight into how agencies and leaders can successfully solve some of the biggest lingering government IT issues.

  • Communicating Innovation in Federal Government

    Federal Government spending on ‘obsolete technology’ continues to increase. Supporting the twin pillars of improved digital service delivery for citizens on the one hand, and the increasingly optimized and flexible working practices for federal employees on the other, are neither easy nor inexpensive tasks. This whitepaper explores how federal agencies can leverage the value of existing agency technology assets while offering IT leaders the ability to implement the kind of employee productivity, citizen service improvements and security demanded by federal oversight.

  • IT Transformation Trends: Flash Storage as a Strategic IT Asset

    MIT Technology Review: Flash Storage As a Strategic IT Asset For the first time in decades, IT leaders now consider all-flash storage as a strategic IT asset. IT has become a new operating model that enables self-service with high performance, density and resiliency. It also offers the self-service agility of the public cloud combined with the security, performance, and cost-effectiveness of a private cloud. Download this MIT Technology Review paper to learn more about how all-flash storage is transforming the data center.

  • Ongoing Efforts in Veterans Health Care Modernization

    This report discusses the current state of veterans health care


When you download a report, your information may be shared with the underwriters of that document.