• Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Home
  • About Darknet
  • Hacking Tools
  • Popular Posts
  • Darknet Archives
  • Contact Darknet
    • Advertise
    • Submit a Tool
Darknet – Hacking Tools, Hacker News & Cyber Security

Darknet - Hacking Tools, Hacker News & Cyber Security

Darknet is your best source for the latest hacking tools, hacker news, cyber security best practices, ethical hacking & pen-testing.

Obama To Create Cyber Security Czar In White House

May 27, 2009

Views: 4,864

[ad]

It looks like Obama is taking a serious stance on Cyber Security and Cyber Crime with his introduction of a new position which will be known as the ‘Cyber Czar’.

As a senior White House official this is quite a serious position with the responsibility of protecting both the US government networks and looking out for private companies too.

It’ll be interesting to see who is chosen for the post and what kind of policies or campaigns they will run.

President Obama is expected to announce late this week his decision to create a senior White House official responsible for protecting the nation’s government-run and private computer networks from attack, according to a published report.

The “cyber czar” will probably be a member of the National Security Council but will report to the national security adviser and the senior White House economic advisor, according to The Washington Post, which cited unnamed officials who had been briefed on the plan. As of Friday, Obama had not yet settled on the advisor’s rank and title.

The announcement is to coincide with the release of a 40-page report evaluating the government’s strategy for security government networks and other infrastructure deemed critical to national security. The timing of the report – it was expected to be released a week or two ago – and the details included in the Washington Post report suggest the plan may have run into infighting by advisors to Obama.

Officially the rank and title have not yet been decided but they will be working with the National Security Council and the Economic division of the government.

The strategy will be interesting to see too, what are they going to propose to protect the government networks and what else will they deem critical to national security? I hope it includes power stations and other such resources (Industrial Control Systems for example) as they seem to be massively lacking security.

On his first full day in office, Obama signaled a willingness to have the cyber czar report directly to the president, an arrangement that he promised as a candidate and that was also recommended by a panel of more than 60 government and business computer security experts.

While the idea is whoever is appointed will be someone who can “pick up the phone and contact the president directly, if need be,” the advisor no longer would report directly to Obama, according to the report. What’s more, the czar would now have two bosses, in an attempt to strike a balance between homeland security and economic concerns.

Over the past few months, turf wars have arisen between advisors who want the ultra-secretive National Security Agency to oversee the country’s cybersecurity. Others have said the job is best carried out by the National Cybersecurity Center, an office within the Department of Homeland Security that’s responsible for coordinating the defense of civilian, military and intelligence networks. In March, the government’s cybersecurity chief abruptly resigned amid allegations his office was woefully underfunded and inappropriately controlled by the military.

Seems like there is some infighting going on in the government and a bit of a power struggle as to which department will be controlling the ‘cyber czar’.

It’s looking like the organizational problems regarding cyber security may run deeper than they appear on the surface with claims of underfunding and misuse by the military.

I hope they do sort it out though, the more secure the US government is the safer the rest of the World will be.

Source: The Register

Related Posts:

  • Systemic Ransomware Events in 2025 - How Jaguar Land…
  • An Introduction To Web Application Security Systems
  • Initial Access Brokers (IAB) in 2025 - From Dark Web…
  • Deepfake-as-a-Service 2025 - How Voice Cloning and…
  • Privacy Implications of Web 3.0 and Darknets
  • Dark Web Search Engines in 2025 - Enterprise…
Share
Tweet
Share
Buffer
WhatsApp
Email

Filed Under: Hacking News Tagged With: hacking-US-government, us government security



Reader Interactions

Comments

  1. Alan says

    May 27, 2009 at 2:58 pm

    Funny you should say this, “the more secure the US government is the safer the rest of the World will be.” It brings to mind the miriad of ways that a breach of one of the world’s superpowers could prove to be a threat to for the rest of the world.

  2. Bogwitch says

    May 28, 2009 at 7:28 am

    One ‘cyber security czar’ = A single point of failure.

  3. Alan says

    May 28, 2009 at 7:51 am

    It might not even be that, it could just boil down to one man’s opinion or maybe even agenda. Either way I feel sorry for the US if the NSA get in because they’re monitor mad as far as I am aware :P

    HS I don’t think would be much better. Both departments have their own ways of going about things and I’d expect that they would want to push their ideas of information gathering for the agencies as a whole.

    I would rather see an independent team/department/agency get put together who’s sole purpose is hardening the US.

Primary Sidebar

Search Darknet

  • Email
  • Facebook
  • LinkedIn
  • RSS
  • Twitter

Advertise on Darknet

Latest Posts

Systemic Ransomware Events in 2025 - How Jaguar Land Rover Showed What a Category 3 Supply Chain Breach Looks Like

Systemic Ransomware Events in 2025 – How Jaguar Land Rover Showed What a Category 3 Supply Chain Breach Looks Like

Views: 2,304

Jaguar Land Rover’s prolonged cyber outage in 2025 turned what would once have been a “single … ...More about Systemic Ransomware Events in 2025 – How Jaguar Land Rover Showed What a Category 3 Supply Chain Breach Looks Like

SmbCrawler - SMB Share Discovery and Secret-Hunting

SmbCrawler – SMB Share Discovery and Secret-Hunting

Views: 2,147

SmbCrawler is a credentialed SMB spider that takes domain credentials and a list of hosts, then … ...More about SmbCrawler – SMB Share Discovery and Secret-Hunting

Heisenberg Dependency Health Check - GitHub Action for Supply Chain Risk

Heisenberg Dependency Health Check – GitHub Action for Supply Chain Risk

Views: 1,415

Heisenberg Dependency Health Check is a GitHub Action that inspects only the new or modified … ...More about Heisenberg Dependency Health Check – GitHub Action for Supply Chain Risk

Dark Web Search Engines in 2025 - Enterprise Monitoring, APIs and IOC Hunting

Dark Web Search Engines in 2025 – Enterprise Monitoring, APIs and IOC Hunting

Views: 3,330

Dark web search engines have become essential for enterprise security teams that need early … ...More about Dark Web Search Engines in 2025 – Enterprise Monitoring, APIs and IOC Hunting

mcp-scan - Real-Time Guardrail Monitoring and Dynamic Proxy for MCP Servers

mcp-scan – Real-Time Guardrail Monitoring and Dynamic Proxy for MCP Servers

Views: 1,246

mcp-scan is a security tool from Invariant Labs that can run as a static scanner or as a dynamic … ...More about mcp-scan – Real-Time Guardrail Monitoring and Dynamic Proxy for MCP Servers

Initial Access Brokers (IAB) in 2025 - From Dark Web Listings to Supply Chain Ransomware Events

Initial Access Brokers (IAB) in 2025 – From Dark Web Listings to Supply Chain Ransomware Events

Views: 1,122

Initial Access Brokers (IABs) have moved from niche forum actors to central wholesalers in the … ...More about Initial Access Brokers (IAB) in 2025 – From Dark Web Listings to Supply Chain Ransomware Events

Topics

  • Advertorial (28)
  • Apple (46)
  • Cloud Security (8)
  • Countermeasures (232)
  • Cryptography (85)
  • Dark Web (6)
  • Database Hacking (89)
  • Events/Cons (7)
  • Exploits/Vulnerabilities (433)
  • Forensics (64)
  • GenAI (13)
  • Hacker Culture (10)
  • Hacking News (237)
  • Hacking Tools (709)
  • Hardware Hacking (82)
  • Legal Issues (179)
  • Linux Hacking (74)
  • Malware (241)
  • Networking Hacking Tools (352)
  • Password Cracking Tools (107)
  • Phishing (41)
  • Privacy (219)
  • Secure Coding (119)
  • Security Software (235)
  • Site News (51)
    • Authors (6)
  • Social Engineering (37)
  • Spammers & Scammers (76)
  • Stupid E-mails (6)
  • Telecomms Hacking (6)
  • UNIX Hacking (6)
  • Virology (6)
  • Web Hacking (384)
  • Windows Hacking (171)
  • Wireless Hacking (45)

Security Blogs

  • Dancho Danchev
  • F-Secure Weblog
  • Google Online Security
  • Graham Cluley
  • Internet Storm Center
  • Krebs on Security
  • Schneier on Security
  • TaoSecurity
  • Troy Hunt

Security Links

  • Exploits Database
  • Linux Security
  • Register – Security
  • SANS
  • Sec Lists
  • US CERT

Footer

Most Viewed Posts

  • Brutus Password Cracker Hacker – Download brutus-aet2.zip AET2 (2,434,393)
  • Darknet – Hacking Tools, Hacker News & Cyber Security (2,174,104)
  • Top 15 Security Utilities & Download Hacking Tools (2,097,565)
  • 10 Best Security Live CD Distros (Pen-Test, Forensics & Recovery) (1,200,364)
  • Password List Download Best Word List – Most Common Passwords (934,682)
  • wwwhack 1.9 – wwwhack19.zip Web Hacking Software Free Download (777,407)
  • Hack Tools/Exploits (674,322)
  • Wep0ff – Wireless WEP Key Cracker Tool (531,448)

Search

Recent Posts

  • Systemic Ransomware Events in 2025 – How Jaguar Land Rover Showed What a Category 3 Supply Chain Breach Looks Like November 26, 2025
  • SmbCrawler – SMB Share Discovery and Secret-Hunting November 24, 2025
  • Heisenberg Dependency Health Check – GitHub Action for Supply Chain Risk November 21, 2025
  • Dark Web Search Engines in 2025 – Enterprise Monitoring, APIs and IOC Hunting November 19, 2025
  • mcp-scan – Real-Time Guardrail Monitoring and Dynamic Proxy for MCP Servers November 17, 2025
  • Initial Access Brokers (IAB) in 2025 – From Dark Web Listings to Supply Chain Ransomware Events November 12, 2025

Tags

apple botnets computer-security darknet Database Hacking ddos dos exploits fuzzing google hacking-networks hacking-websites hacking-windows hacking tool Information-Security information gathering Legal Issues malware microsoft network-security Network Hacking Password Cracking pen-testing penetration-testing Phishing Privacy Python scammers Security Security Software spam spammers sql-injection trojan trojans virus viruses vulnerabilities web-application-security web-security windows windows-security Windows Hacking worms XSS

Copyright © 1999–2026 Darknet All Rights Reserved · Privacy Policy