But [Michael Daniel, the White House cybersecurity coordinator] spent the rest of his blog entry describing what conditions might lead to a decision not to publish the details of a flaw — perhaps for a short time, perhaps for much longer. “Disclosing a vulnerability can mean that we forego an opportunity to collect crucial intelligence that could thwart a terrorist attack, stop the theft of our nation’s intellectual property, or even discover more dangerous vulnerabilities that are being used by hackers or other adversaries to exploit our networks,” Mr. Daniel wrote, describing the review that has taken place at the White House in the past few months.Makes you feel warm all over. Doesn't it?
Tuesday, April 29, 2014
White House "Thinking" Makes The Best Case for Privatization of Cyber Security
Yesterday's New York Times story (read it here) on White House "thinking" regarding cyber security is absolute proof that privatization is the only workable solution. The net-net seems to be that we can't count on the people protecting our infrastructure to let us know of vulnerabilities and back doors, because those flaws would then be fixed and unavailable to our own spooks:
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Implementation suggestions for THE MORGAN DOCTRINE are most welcome. What are the "Got'chas!"? What questions would some future Cyber Privateering Czar have to answer about this in a Senate confirmation hearing?