Cybersecurity

Senior DHS official weighs in on cyber legislation

Shutterstock image: secure data stream.

The Department of Homeland Security’s Larry Zelvin is the latest administration official to call for legislation to strengthen DHS's hand in detecting and thwarting cyber threats.

Congress should enact a law to clarify the department’s statutory authority on cybersecurity issues, said Zelvin, who heads the National Cyber and Communications Integration Center. National Security Agency Director Adm. Michael Rogers has said repeatedly that information-sharing legislation is a much-needed arrow in the government’s cybersecurity quiver.

While the FBI and intelligence agencies have clear legal mandates, "we're reliant upon the Homeland Security Act of 2002, legislation that was designed to meet a terrorist threat – airplanes crashing into buildings. And we’re adapting that for" cybersecurity, Zelvin said June 25 at an AFCEA conference in Baltimore.

Zelvin cited Heartbleed, the Open SSL vulnerability made public in April, as a threat with which enhanced DHS authority could have helped. The department led the government’s response to the bug, scanning various agencies' networks for intrusions, but Zelvin said asking each agency's permission to do so was cumbersome. "There was nobody in a holistic way looking at" the federal government’s vulnerability to Heartbleed, he added.

Zelvin also said he strongly supports legislation put forth in the Senate that would house a "portal" at DHS for public-private information sharing.

"As far as DHS's role in information sharing, I think we can provide a service to other government partners. I would love to free up … the FBI to do more law enforcement and domestic intelligence," he said in response to a question from FCW.

California Democrat Dianne Feinstein and Georgia Republican Saxby Chambliss, the chairwoman and ranking member of the Senate Intelligence Committee, have drafted a bill that would set up such a DHS portal, where private firms could confidentially share threat information without legal liability.

About the Author

Sean Lyngaas is an FCW staff writer covering defense, cybersecurity and intelligence issues. Prior to joining FCW, he was a reporter and editor at Smart Grid Today, where he covered everything from cyber vulnerabilities in the U.S. electric grid to the national energy policies of Britain and Mexico. His reporting on a range of global issues has appeared in publications such as The Atlantic, The Economist, The Washington Diplomat and The Washington Post.

Lyngaas is an active member of the National Press Club, where he served as chairman of the Young Members Committee. He earned his M.A. in international affairs from The Fletcher School of Law and Diplomacy at Tufts University, and his B.A. in public policy from Duke University.

Click here for previous articles by Lyngaas, or connect with him on Twitter: @snlyngaas.


The Fed 100

Save the date for 28th annual Federal 100 Awards Gala.

Featured

  • Social network, census

    5 predictions for federal IT in 2017

    As the Trump team takes control, here's what the tech community can expect.

  • Rep. Gerald Connolly

    Connolly warns on workforce changes

    The ranking member of the House Oversight Committee's Government Operations panel warns that Congress will look to legislate changes to the federal workforce.

  • President Donald J. Trump delivers his inaugural address

    How will Trump lead on tech?

    The businessman turned reality star turned U.S. president clearly has mastered Twitter, but what will his administration mean for broader technology issues?

  • Login.gov moving ahead

    The bid to establish a single login for accessing government services is moving again on the last full day of the Obama presidency.

  • Shutterstock image (by Jirsak): customer care, relationship management, and leadership concept.

    Obama wraps up security clearance reforms

    In a last-minute executive order, President Obama institutes structural reforms to the security clearance process designed to create a more unified system across government agencies.

  • Shutterstock image: breached lock.

    What cyber can learn from counterterrorism

    The U.S. has to look at its experience in developing post-9/11 counterterrorism policies to inform efforts to formalize cybersecurity policies, says a senior official.

Reader comments

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group