Sen. Collins warns against cybersecurity 'road map' for US enemies

A key senator has cautioned that part of a White House plan to strengthen cybersecurity at commercial networks by disclosing audits of security practices could expose vulnerable targets in major parts of the U.S. infrastructure such as power grids, Aliya Sternstein writes in Nextgov.

Sen. Susan Collins (R-Maine), the ranking member of Senate Homeland Security and Governmental Affairs Committee, said at a hearing May 23 that security plans would be publicly accessible under the White House plan, and added, "We don't want to give those that would do us harm a road map on to how to attack our critical infrastructure," Nextgov reports.

She was reacting to  the White House's 52 pages of legislative text that detail the Obama administration's position on issues that have hung up cybersecurity measures, the article states.

Committee Chairman Sen. Joe Lieberman (I-Conn.) and Collins have introduced cybersecurity legislation reflects some of the Obama's administration's plans, Nextgov notes.

About the Author

Connect with the FCW staff on Twitter @FCWnow.

FCW in Print

In the latest issue: Looking back on three decades of big stories in federal IT.


  • Anne Rung -- Commerce Department Photo

    Exit interview with Anne Rung

    The government's departing top acquisition official said she leaves behind a solid foundation on which to build more effective and efficient federal IT.

  • Charles Phalen

    Administration appoints first head of NBIB

    The National Background Investigations Bureau announced the appointment of its first director as the agency prepares to take over processing government background checks.

  • Sen. James Lankford (R-Okla.)

    Senator: Rigid hiring process pushes millennials from federal work

    Sen. James Lankford (R-Okla.) said agencies are missing out on younger workers because of the government's rigidity, particularly its protracted hiring process.

  • FCW @ 30 GPS

    FCW @ 30

    Since 1987, FCW has covered it all -- the major contracts, the disruptive technologies, the picayune scandals and the many, many people who make federal IT function. Here's a look back at six of the most significant stories.

  • Shutterstock image.

    A 'minibus' appropriations package could be in the cards

    A short-term funding bill is expected by Sept. 30 to keep the federal government operating through early December, but after that the options get more complicated.

  • Defense Secretary Ash Carter speaks at the TechCrunch Disrupt conference in San Francisco

    DOD launches new tech hub in Austin

    The DOD is opening a new Defense Innovation Unit Experimental office in Austin, Texas, while Congress debates legislation that could defund DIUx.

Reader comments

Tue, Jun 7, 2011

While security by obscurity is obviously trash, the less the enemy knows about what you're doing, the better. Sure, the audit may detail what's going on at the very perimeter of the network, which is stuff the bad guys will know or easily figure out anyways, but it will also include details on things they don't and shouldn't know about the internal operations. Remember, security is all about the balance between how hard it is to break in/how valuable the system is. If you do half the work for them, you make an effective attack that much more likely.

Sat, Jun 4, 2011

You NEVER EVER reveal the results of audits or vulnerabilities to anyone except those who have a need to know, and those charged with fixing the vulnerabilities. For this guy in the White House to even suggest that this is a prudent step to take further underscores how little he knows about cyber security, cyber warfare, or the protection of data. He is in fact the single point of failure and will remain so as long as he is in office. He has an agenda, and it would be really nice to know what it is. It most certainly is not to support and defend the Constitution of the United States (and its people) against all enemies both foreign and domestic.

Thu, May 26, 2011

The US has been giving way too much info about many things lately. This trend started about 30 years ago. The facility that I worked in then had a very sensitive part of one building that was key to our defense. So, they put up big armor plates on the outside of that part of the building. We were all saying that they should have just painted a big bullseye on it instead. Today, you would find a detailed map on Wikileaks or Facebook!!

Thu, May 26, 2011

It's bad enough consolidating everything and creating a central point of failure for any merged system. Then you go and enumerate all the details?

Wed, May 25, 2011

Magic wands don't exist to fix security problems. It takes time and money to fix problems and limited resources and risk management determine what to fix first.

Show All Comments

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group