recommended reading

Obama Resurrects Intel Advisory Panel

Chuck Burton/AP

The Obama administration is resuscitating a small intelligence council after membership dwindled to four people a year ago.

The President's Intelligence Advisory Board -- not to be confused with the Privacy and Civil Liberties Oversight Board -- is intended to enhance the effectiveness of surveillance activities.

The White House late Thursday announced the appointments of six new members with backgrounds in technology research, telecommunications policy, cloud computing, financial regulation, the shipping business and private investment. 

President Obama’s timing is curious, some national security experts say.

Amid the past year’s uproar over domestic spying, it was privacy watchdog PCLOB that gathered steam, issuing two major reports on National Security Agency surveillance.

The country is now dealing with emergencies in the Middle East, Russia and Ukraine.

“Revamping the PIAB would have made more sense two or four years ago,” said Steven Aftergood, who studies government secrecy at the Federation of American Scientists. “Presumably (the president) came to feel a need for what the PIAB tries to provide -- independent analysis and advice that looks beyond the immediate crises of the day.”

Bringing membership up to ten, the new members include:

  • James S. Crown, president of investment group Henry Crown and Company, who also serves on the board of trustees at the Aspen Institute
  • Scott Davis, UPS chief executive officer and a former member of the President’s Export Council
  • Jamie Dos Santos, former CEO of Web services provider Terremark Federal Group and current member of the President's National Security Telecommunications Advisory Committee
  • Julius Genachowski, former Federal Communications Commission chairman
  • Shirley Ann Jackson, president of Rensselaer Polytechnic Institute and former Nuclear Regulatory Commission chairman
  • Neal S. Wolin, former Treasury deputy secretary

The additions are unlikely to affect any policy on Obama’s watch.

"It will take months or longer for the new PIAB to accomplish anything useful, and by that time it may be too late for this president to act on its recommendations,” Aftergood said.

He also noted, “The CEO of UPS was not an obvious candidate for the job.”

The shipping firm has been in the news recently with accusations that deliveries were intercepted by the NSA to bug computers as well as disclosures about a payment system hack affecting 51 retail locations nationwide. 

The postal and shipping industries are considered “critical infrastructure” that are crucial for sustaining the U.S. economy, according to the Department of Homeland Security. 

"Perhaps the choice reflects a view of intelligence as a competitive enterprise that aims to serve a customer base while being enabled by technology and constrained by cost limits," Aftergood said. 

A January presidential directive to reform NSA intelligence collection tasked the board with devising ways to distinguish between metadata and other types of information and options for replacing the "need-to-know" model of information sharing with a "work-related access" model.

Recommendations were due to Obama in May, but the assessment, like most of the board's reports, is not public. 

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.


When you download a report, your information may be shared with the underwriters of that document.