Feeds

PATRIOT Act author tapped for Homeland Security

Former Ashcroft aide on track for confirmation

  • alert
  • submit to reddit

The Essential Guide to IT Transformation

After the Bush Administration's embarrassing nomination of the buffoon Bernard Kerik to replace Tom Ridge as Homeland Security Secretary, a far more sober nominee has emerged in the person of former federal prosecutor Michael Chertoff.

The well-educated and articulate Chertoff has earned a reputation as a hard-nosed prosecutor and a creative strategist. He has gone after organized crime outfits with an aggressive and controversial tactic of locking up suspects, against whom evidence is weak, as "material witnesses." With this he did significant damage to several New York area crime families in the mid 1980s.

He extended the same tactic to the domestic "war on terror," with far less success, while serving as head of the DoJ's Criminal Division for two years following the 9/11 atrocities.

He also went after Enron, and helped to expose the related Arthur Andersen accounting scandal. He showed somewhat less zeal in investigating the cozy relations between Enron's former chairman, Ken Lay, and President George W Bush, however.

While at DoJ, Chertoff was instrumental in drafting the so-called "PATRIOT" Act, but, to his credit, he has since expressed misgivings about its more Draconian elements, such as detention without due process.

During his tenure at the DoJ, the government locked up many hundreds of immigrants on no evidence and to no public security benefit. Virtually all were innocent, yet they found themselves in a Kafkaesque legal purgatory of secret evidence and charges that could never be challenged. And the few cases where the government had real evidence have been badly botched. Chertoff's record as a terror fighter is about as dismal as his record as a gangbuster is laudable.

This may not be entirely his fault. His former boss, US attorney general John Ashcroft - certainly no one's idea of an intellectual heavyweight - may well have pressured the Criminal Division to enact a public rain dance suggesting that "something is being done." The urge to create a public impression of counterterrorist activity would no doubt have been a powerful inducement to DoJ's brutish blundering in that realm.

Chertoff has no experience administering a bureaucracy as vast as DHS - which, according to military analyst Thomas Barnett, now supports two bureaucrats for every hardcore jihadist worldwide - but he has proven himself - at least in criminal affairs - to be a competent, imaginative, and adaptable manager. And unlike Kerik, there are no questions about his personal integrity, intelligence, or maturity.

He will have his hands full if he intends to whip DHS into an effective agency. Current Homeland Security Czar Tom Ridge has enjoyed little success, though hardly due to any lack of qualifications on his part. The Department is enormous, sluggish, and neurotically preoccupied with defending the US from attacks that have already occurred. The top job at DHS is hardly an enviable one.

The Senate is expected to confirm Chertoff without much difficulty, because of time lost during the Kerik sideshow, it is possible that Ridge will step down before Chertoff takes over the post. ®

Related stories

DHS network vulnerable to attack
Proposed Homeland Security Czar scratched
The American way of spying gets a makeover
High-school drop-out to become Homeland Security Czar
US Homeland Security Czar resigns

Build a business case: developing custom apps

More from The Register

next story
14 antivirus apps found to have security problems
Vendors just don't care, says researcher, after finding basic boo-boos in security software
'Things' on the Internet-of-things have 25 vulnerabilities apiece
Leaking sprinklers, overheated thermostats and picked locks all online
Only '3% of web servers in top corps' fully fixed after Heartbleed snafu
Just slapping a patched OpenSSL on a machine ain't going to cut it, we're told
iWallet: No BONKING PLEASE, we're Apple
BLE-ding iPhones, not NFC bonkers, will drive trend - marketeers
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Secure microkernel that uses maths to be 'bug free' goes open source
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
Israel's Iron Dome missile tech stolen by Chinese hackers
Corporate raiders Comment Crew fingered for attacks
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Backing up Big Data
Solving backup challenges and “protect everything from everywhere,” as we move into the era of big data management and the adoption of BYOD.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.