CIA Chief - Trump Picks Pompeo

 

 

In his nomination of US Rep. Mike Pompeo to head the CIA, President-elect Donald Trump has picked someone who has supported NSA surveillance programs and has criticised Silicon Valley's stance on encryption.

Pompeo, a Republican from Kansas, is a former cavalry officer in the US Army and a graduate of West Point. He serves on the House Intelligence Committee and is perhaps best known for his role on the Benghazi committee that investigated Hillary Clinton.

But his committee assignment has also put him in the middle of several recent issues that have pitched the US intelligence community against major tech companies.

Back in February when the FBI was fighting Apple to gain access to data inside an iPhone used by a San Bernadino mass shooter, Pompeo criticized the company's position. Pompeo called Apple CEO Tim Cook's resistance to a subpoena "disappointing" and said he "should not stand in the way of the FBI’s investigation into a dead ISIS terrorist, who has the blood of 14 innocent Americans on his hands."

The FBI had asked Apple to create custom software that would allow it an unlimited number of attempts to crack a passcode on the phone. Apple refused, and the case ended unresolved after the FBI said it had ultimately gained access to the iPhone using other methods.

Pompeo has also supported the National Security Agency's decision to run some of its expansive surveillance programs that came to light after Edward Snowden, the former NSA contractor, leaked secret documents to media organizations.

In the face of widespread resistance to NSA domestic data collection, Pompeo opposed limits and argued that the agency's surveillance programs are essential in fighting the threat or terrorism aimed at targets in the US.

He has also been a constant critic of Snowden. Commenting on his committee's report into Snowden, Pompeo called him "a liar and a criminal" and said, "the appropriate action would be to send Snowden to prison, not give him a pardon."

Back in 2014, he pushed the organizers of the SXSW conference to cancel an event where Snowden appeared via video conference.

In making his choice, Trump said Pompeo "will be a brilliant and unrelenting leader for our intelligence community to ensure the safety of Americans and our allies."

His nomination will need to clear the Senate, and there will be some resistance.

In response to the nomination, Sen. Ron Wyden, a Democrat from Oregon, said the CIA needs "principled leadership now more than ever." Wyden criticised Pompeo's support for torture of terrorism suspects.

"Unfortunately, Representative Pompeo’s comments in which he asserted that the CIA’s torture program was legal and that the American people did not deserve to know about it are deeply troubling," Wyden said.

Computerworld:             Is Apple Right To Resist The FBI?:

 

« US Election Recounts In ‘Hacked’ States?
Can Snowden Testify in Berlin? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Israel National Cyber Directorate (INCD)

Israel National Cyber Directorate (INCD)

The Israel National Cyber Directorate is the national security and technological agency responsible for defending Israel’s national cyberspace and for establishing and advancing Israel’s cyber power.

Data Resolve Technologies

Data Resolve Technologies

Data Resolve offer a mechanism through which customers can detect and tackle various kinds of sensitive activities pertaining to data loss and data theft.

Honeywell Process Solutions (HPS)

Honeywell Process Solutions (HPS)

Honeywell's Industrial Cyber Security Solutions help plants and critical infrastructure sectors defend the availability, reliability and safety of their industrial control systems.

Zero Networks

Zero Networks

With Zero Network, you can achieve affordable, airtight network access security at scale.

Cyber Security Operations Consulting (CyberSecOp)

Cyber Security Operations Consulting (CyberSecOp)

CyberSecOp is an ISO 27001 Certified Organization which provides cyber security operations services and risk management consulting.

Deft

Deft

Deft (formerly ServerCentral Turing Group) is a trusted provider of colocation, cloud, and disaster recovery services.

Hybrid Identity Protection Conference (HIP)

Hybrid Identity Protection Conference (HIP)

Hybrid Identity Protection (HIP) is the premier educational forum for identity-centric cybersecurity practitioners charged with defending hybrid cloud environments.

Triaxiom Security

Triaxiom Security

Triaxiom Security offers penetration testing, security audits, and strategic consulting customized to meet your needs.

Mage Data

Mage Data

Mage (formerly Mentis Software) is a leading solutions provider for data security and data privacy software for global enterprises.

RiskOptics

RiskOptics

RiskOptics (formerly Reciprocity) equips organizations with one of the most intuitive and powerful information security and cyber risk management solutions in the market.

Creative Destruction Lab (CDL)

Creative Destruction Lab (CDL)

Creative Destruction Lab is a nonprofit organization that delivers an objectives-based program for massively scalable, seed-stage, science- and technology-based companies.

Kodem Security

Kodem Security

Our mission is to make AppSec simple. Meet the world’s first dynamic software composition analysis platform. Only Kodem uses runtime intelligence to determine application risk.

OxCyber

OxCyber

OxCyber's mission is to ignite and encourage cybersecurity and technology growth in the Thames Valley through meetings, webinars, in person events, workshops and mentorship programs.

Finlaw Associates

Finlaw Associates

Finlaw Associates is a trusted cybercrime law firm providing a wide range of taxation, legal, advisory and regulatory services to the financial, commercial and industrial communities.

Automotive Information Sharing & Analysis Center (Auto-ISAC)

Automotive Information Sharing & Analysis Center (Auto-ISAC)

Auto-ISAC provides a forum for companies to analyze and identify threats sooner and share solutions that enhance vehicle cybersecurity.

DataTrails

DataTrails

DataTrails enables organizations to prove and verify the provenance and authenticity of any data they use in their business operations.