Sen. Collins warns against cybersecurity 'road map' for US enemies

A key senator has cautioned that part of a White House plan to strengthen cybersecurity at commercial networks by disclosing audits of security practices could expose vulnerable targets in major parts of the U.S. infrastructure such as power grids, Aliya Sternstein writes in Nextgov.

Sen. Susan Collins (R-Maine), the ranking member of Senate Homeland Security and Governmental Affairs Committee, said at a hearing May 23 that security plans would be publicly accessible under the White House plan, and added, "We don't want to give those that would do us harm a road map on to how to attack our critical infrastructure," Nextgov reports.

She was reacting to  the White House's 52 pages of legislative text that detail the Obama administration's position on issues that have hung up cybersecurity measures, the article states.

Committee Chairman Sen. Joe Lieberman (I-Conn.) and Collins have introduced cybersecurity legislation reflects some of the Obama's administration's plans, Nextgov notes.

About the Author

Connect with the FCW staff on Twitter @FCWnow.

The Fed 100

Read the profiles of all this year's winners.


  • Shutterstock image (by wk1003mike): cloud system fracture.

    Does the IRS have a cloud strategy?

    Congress and watchdog agencies have dinged the IRS for lacking an enterprise cloud strategy seven years after it became the official policy of the U.S. government.

  • Shutterstock image: illuminated connections between devices.

    Who won what in EIS

    The General Services Administration posted detailed data on how the $50 billion Enterprise Infrastructure Solutions contract might be divvied up.

  • Wikimedia Image: U.S. Cyber Command logo.

    Trump elevates CyberCom to combatant command status

    The White House announced a long-planned move to elevate Cyber Command to the status of a full combatant command.

  • Photo credit: John Roman Images /

    Verizon plans FirstNet rival

    Verizon says it will carve a dedicated network out of its extensive national 4G LTE network for first responders, in competition with FirstNet.

  • AI concept art

    Can AI tools replace feds?

    The Heritage Foundation is recommending that hundreds of thousands of federal jobs be replaced by automation as part of a larger government reorganization strategy.

  • DOD Common Access Cards

    DOD pushes toward CAC replacement

    Defense officials hope the Common Access Card's days are numbered as they continue to test new identity management solutions.

Reader comments

Tue, Jun 7, 2011

While security by obscurity is obviously trash, the less the enemy knows about what you're doing, the better. Sure, the audit may detail what's going on at the very perimeter of the network, which is stuff the bad guys will know or easily figure out anyways, but it will also include details on things they don't and shouldn't know about the internal operations. Remember, security is all about the balance between how hard it is to break in/how valuable the system is. If you do half the work for them, you make an effective attack that much more likely.

Sat, Jun 4, 2011

You NEVER EVER reveal the results of audits or vulnerabilities to anyone except those who have a need to know, and those charged with fixing the vulnerabilities. For this guy in the White House to even suggest that this is a prudent step to take further underscores how little he knows about cyber security, cyber warfare, or the protection of data. He is in fact the single point of failure and will remain so as long as he is in office. He has an agenda, and it would be really nice to know what it is. It most certainly is not to support and defend the Constitution of the United States (and its people) against all enemies both foreign and domestic.

Thu, May 26, 2011

The US has been giving way too much info about many things lately. This trend started about 30 years ago. The facility that I worked in then had a very sensitive part of one building that was key to our defense. So, they put up big armor plates on the outside of that part of the building. We were all saying that they should have just painted a big bullseye on it instead. Today, you would find a detailed map on Wikileaks or Facebook!!

Thu, May 26, 2011

It's bad enough consolidating everything and creating a central point of failure for any merged system. Then you go and enumerate all the details?

Wed, May 25, 2011

Magic wands don't exist to fix security problems. It takes time and money to fix problems and limited resources and risk management determine what to fix first.

Show All Comments

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group