Former cybersecurity chief opposes new regulations

Richard Clarke, former White House cybersecurity chief, is the first to admit that more than a year after that office completed a national cybersecurity strategy, attacks via the Internet are still on the rise. But that is not the fault of the strategy, and does not mean that more government intervention is needed, he said.

In a recent interview with National Journal's Technology Daily, Clarke criticized the Bush administration for failing to implement the National Strategy to Secure Cyberspace and for cutting funding for cybersecurity research.

"They've actually cut the overall amount of money for research in cybersecurity," he said. "They've not created the federal government as an example of how to do cybersecurity."

Clarke defended the strategy he oversaw, saying that it "absolutely" reflected his views, and indicating that no changes are needed in it. He took issue with press reports from the time of the strategy's release that suggested it had been "watered down" through consultation with industry and others.

"What we did was we had a very complex document that was the result of a lot of input from a lot of groups in and out of government," he said. "We had 70 or 80 ... recommendations. ... So we clustered them ... into five recommendations and simplified the document. It wasn't watered down."

He also contended with assertions that the earlier version had more "teeth," in terms of calling for federal regulations. He said a strong public-private partnership is critical to success against cyber attacks, and frowned upon new regulation.

"I don't mind regulation if it's already there in industry traditionally regulated [such as electric power, banking and healthcare], and I think if you're going to have regulation, it ought to be effective regulation."

Clarke also said, "The FBI is light years ahead of where it was three or four years ago, but where it was three or four years ago is in the Stone Age." But he said FBI and the Homeland Security Department are moving slowly to put in place a sophisticated network for federal, state and local law enforcement. "They are underfunded and there is a certain lack of creativity," he said.

Clarke, who was the White House counter-terrorism adviser before moving to cybersecurity, said, "Terrorists use the Internet just like anybody else." But he has "yet to see any evidence per se that terrorists have used the Internet to launch attacks and cyber attacks. But then we very seldom know who does launch cyber attacks."

Clarke left the administration shortly after the strategy's release early in 2003, and is now in the private sector in northern Virginia, consulting on cybersecurity for firms such as Symantec and RSA Security.

Asked about this year's presidential election, Clarke said he is "still waiting" for a technology policy statement from the campaign of Democratic candidate John Kerry and would not say which candidate he supports. "I think I'm going to not publicly endorse anyone. I certainly think we need a management change, let's put it that way."

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
FROM OUR SPONSORS
JOIN THE DISCUSSION
Close [ x ] More from GovExec
 
 

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.