On Tuesday, several media outlets reported that Intelligence Community Inspector General sent a letter to Congress regarding Sec. Hillary Clinton stored documents on her home server that were classified “Special Access Program.”
By Dan Gerstein
Cybersecurity is a two-sided proposition, requiring both defense of internal networks and the ability to operate effectively in the cyber domain. Securing government networks is certainly necessary, but authorities should not lose sight of the need to couple their defense of America’s networks with appropriate resources dedicated to combating criminal, terrorist and other threats in cyberspace.
A few weeks back, I recommended that the House Homeland Security Subcommittee on Cybersecurity, Infrastructure Protection and Security Technologies have a “do-over” of a hearing where the subject was private sector interaction with DHS S&T. The reason I recommended this was because the most successful private sector program at S&T – the SAFETY Act implementation – was never mentioned. On July 28, the same Subcommittee held that “do-over.”
There’s an old axiom in science and statistics: correlation does not imply causation. Sometimes what walks and talks like a duck isn’t actually a duck. Technical glitches on Wednesday sure looked like a cyber attack…but they weren’t. Here’s how we know.
DHS Secretary Jeh Johnson announced at the 2015 RSA Conference that DHS is opening a satellite office in Silicon Valley. His words were vague, leading to questions of why DHS is setting up this office and with whom the Department will be working. Perhaps a more pressing question is, what makes DHS think Silicon Valley wants to work with the federal government in the first place?
The infamous Tommy-gun toting John Dillinger was once asked why he robbed banks. He responded, “Because that’s where the money is.” That simple logic is similar to the thinking of government leaders, like DHS Secretary Jeh Johnson, who are looking to California as a vault holding a priceless commodity—a high-tech workforce.
In Security Debrief’s sixth annual April Fools coverage, we’ve collected stories the rest of the media somehow missed…