Copyright ©2009 NPR. For personal, noncommercial use only. See Terms of Use. For other uses, prior permission required.

STEVE INSKEEP, host:

President Obama plans to provide some answers of his own today about how to better protect the nation's computer networks. He'll be releasing a widely anticipated review of the nation's cybersecurity. Military and intelligence leaders say protecting computer networks from hackers, spies and terrorists is one of the nation's top national security problems. And we have more this morning from NPR'S Brian Naylor.

BRIAN NAYLOR: Foreign governments stealing U.S. military secrets. Foreign companies stealing advanced technology and intellectual property from American firms. It happens every day, says James Lewis of the Center for Strategic and International Studies, a Washington think tank.

Mr. JAMES LEWIS (Center for Strategic and International Studies): They're not mom-and-pop operations. They're not little kids. These are the spies of the 21st century, and they've been very successful.

NAYLOR: Republican Congressman Michael McCaul of Texas, who contributed to a recent CSIS cybersecurity report, says the problem reaches across government. We reached him on his cell phone.

Representative MICHAEL MCCAUL (Republican, Texas): We know that last year alone, almost every federal agency had been penetrated, and massive amounts of data were stolen from our federal government.

NAYLOR: The Pentagon, NASA and air traffic networks were among those targeted. Lewis says the nation's power grid is particularly vulnerable. He points to a blackout six years ago that while not caused by terrorists was still disruptive.

Rep. MCCAUL: You know, everyone remembers the 2003 blackout in the Northeast. It's likely that three or four countries have the capability to do that kind of thing again.

NAYLOR: The president today is expected to lay out a strategy for protecting the nation's computer networks. It starts with a cybersecurity adviser who will report to him as part of the National Security Council within the White House.

The president's economic advisers are also expected to have a role. Rod Beckstrom says the bureaucratic structure is important. Beckstrom recently resigned from his position as director of cybersecurity in the Department of Homeland Security. He's wary of giving the NSC and the military primacy over the civilian side.

Mr. ROD BECKSTROM (Former Director of Cybersecurity): The commercial sector is the primary user of the Internet, and we as citizens, and the National Security Council doesn't in general represent that perspective as well as a group like the Council of Economic Advisers might, that are very attuned to the economy and business.

NAYLOR: Privacy advocates, meanwhile, are worried that aggressive government efforts to secure the Internet and other computer networks could trample privacy and civil liberties. Gregory Nojeim is with the Center for Democracy and Technology.

Mr. GREGORY NOJEIM (Center for Democracy and Technology): Unlimited government access to private communications would chill those communications.

NAYLOR: Nojeim praises the Obama administration for listening to privacy concerns.

Unlike many government problems, this one does not seem to require massive amounts of money. Instead, advocates say, it's about better coordinating existing government efforts.

Rod Beckstrom says one key component is making the Internet more secure.

Mr. BECKSTROM: And that is the best investment we can make, and it's been almost entirely ignored by our federal government. And we might see something in this report to move a little bit in that direction. We need to go a lot farther.

NAYLOR: And cybersecurity analysts say today's review cannot be the end but only the start of the Obama administration's attention to the problem.

Brian Naylor, NPR News, Washington.

Copyright © 2009 NPR. All rights reserved. No quotes from the materials contained herein may be used in any media without attribution to NPR. This transcript is provided for personal, noncommercial use only, pursuant to our Terms of Use. Any other use requires NPR's prior permission. Visit our permissions page for further information.

NPR transcripts are created on a rush deadline by a contractor for NPR, and accuracy and availability may vary. This text may not be in its final form and may be updated or revised in the future. Please be aware that the authoritative record of NPR's programming is the audio.

Comments

 

Please keep your community civil. All comments must follow the NPR.org Community rules and terms of use, and will be moderated prior to posting. NPR reserves the right to use the comments we receive, in whole or in part, and to use the commenter's name and location, in any medium. See also the Terms of Use, Privacy Policy and Community FAQ.

Support comes from: