New Ground Rules Needed

By Saxby Chambliss

Saxby Chambliss is a partner at DLA Piper in Atlanta.  He served as a member of the U.S. Senate for two terms, and was the Vice Chairman of the Senate Select Committee on Intelligence.  He also served on the Senate Armed Services Committee and the Senate Rules Committee.  Chambliss was a member of the U.S. House of Representatives for four terms and served as Chairman of the House Intelligence Subcommittee on Terrorism and Homeland Security.

Imagine this:  a private company discovers that detailed personal identifying information—including Social Security numbers, dates of birth, passport data, foreign travel histories, and other sensitive personal and private data—for more than 25 million people has been compromised in successive security breaches.  How swiftly do you think government officials, regulators, and policy makers would be demanding strong action? 

The breaches at the Office of Personnel Management (OPM) of sensitive personal information, including the many counterintelligence nuggets often found in security background forms, have brought calls for action, followed by the inevitable resignation of the OPM Director.  Much more in the way of serious reform is needed.  A resignation alone, or a few fixes in one agency, will not counter the ongoing cyber threat posed by the Chinese, Russians, Iranians, cyber criminals, and terrorist organizations.  We need a fresh examination of the federal government’s approach to cybersecurity, and we need new ground rules.  We cannot continue to be punched in the nose and simply turn the other cheek, shrugging off the theft of classified and proprietary information.

“The Cipher Brief has become the most popular outlet for former intelligence officers; no media outlet is even a close second to The Cipher Brief in terms of the number of articles published by formers.” —Sept. 2018, Studies in Intelligence, Vol. 62

Access all of The Cipher Brief’s national security-focused expert insight by becoming a Cipher Brief Subscriber+ Member.

Subscriber+

Categorized as:Cyber Tech/CyberTagged with:

Related Articles

Search

Close