CISA, NSA And The Dual Hat

One of the most challenging parts of a 20th century government structure - like the U.S. - is dealing with a 21st century challenge.  We first saw this in the disaster of 9/11 which was less about an intelligence or policy failure than the ugly new reality that we have entered an era of porous borders/porous boundaries.  Al Qaeda did not have an international and domestic bureaucracy not talking to each other. 

They played a loose game of soccer, we played rules bound American football.  And they won the first round.

Unfortunately, we now seem to be playing out the same circumstances in Cyber world where the last several months have been filled with a litany of extraordinary breeches. The Microsoft and SolarWinds break-ins, done by China and Russia, are extraordinary in their breadth and scope. 

And, this time, we certainly didn’t lack for entities to defense the ramparts.  The alphabet soup of U.S. government agencies involved in Homeland Security, Defense, Justice and Commerce Department and multiple private sector industry cyber security groups is equally breathtaking - all in response to the last ten years of continued cyber lawlessness.  Yet, again, we have failure.

The main domestic breakdown is the continued “stovepipe” separation between the external and internal. In particular, between those with the technical cyberspace savvy people to resolve the problem and the defenders who can take action. 

Externally, the Cyber Command / NSA dual hat combination has worked increasingly well  - one focused on attack, the other focused on warning and developing successful software “tools”.  But, this kind of logical pairing has stopped at the border for a number of reasons, mostly surrounding domestic privacy concerns and old fashioned 20th century thinking.  We simply need to move beyond that.

Former Secretary of Defense Robert Gates (for full clarity, my old boss at CIA,) has put forward a potential solution which I think would work well - it is time to match off the expertise of NSA with a domestic agency that could defend inside the American borders - which the Russians and Chinese now so easily enter under our “external fence wire.” This domestic “dual hatted” arrangement would act as Cyber Command and NSA do today externally – provide expertise, insight, and execution together.  

While Gates suggests DHS as the Department, I would suggest further that Cybersecurity and Infrastructure Security Agency (CISA) would be the place to nest the DHS anchor.  Unlike the law enforcement-oriented FBI, CISA has the mission of warning and the vast private sector connections to benefit from a relationship with NSA. The Director of CISA would, in essence, be dual hatted with NSA.

The objection to this would be strong in the area of civil liberties and the question of overburdening the NSA – triple hatting the DIRNSA.  While there is merit to both concerns, there are known ways around these challenges. 

We already have, in place, civil liberties oversight organizations in the Intelligence Community and DHS. This is not the bad old days of the ever relived 60’s where no one was watching the store from Capitol Hill nor the outside world.  We have two oversight committees paid to watch out for these abuses.  And, I dare say, an active cyber space filled with public watchers who would never stand for anything close to the nonsense of the 1960’s and blow the whistle on perceived misdeeds.

As for the triple hatted nature of an NSA Director, that is simply a bureaucratic term with little practical daily impact.  Directors have deputies who manage the day-to-day operations.  Adding one for domestic would not be a major challenge.

The challenge, however, would be the work load for the NSA staff. There are a lot of good people at NSA.  But, they would be further spread thin with a domestic role. And we are already challenged in the US government with a shortage of good cyber people - often put off by the slowness of hiring and the ever-present problem of passing background checks.  

This problem can be ameliorated, in part, through the contracting community who can move more swiftly in the hiring process than the government.  And, while the contractors will always have security problems, they have a quickly developing set of stringent cyber security rules promulgated by a very involved Defense Department security protection system.

All of this will not add up to the perfect defense in cyber space at home.  There is no such thing as one hundred percent security.  But, Secretary Gates was right – we have to move away from the concept of internal and external defense and use of intelligence to protect America’s cyberspace.  Allowing NSA and CISA to work closely together may help.

Ronald Marks is Term Visiting Professor, George Mason University, Schar School of Policy and Government. He is President of ZPN Cyber & National Security Strategies     

Image: Unsplash

You Might Also Read: Smart Artificial Intelligence

 

 

« Investigating Fake News With Google, YouTube & Facebook
Create A Cybersecurity Compliance Plan With These Seven Tips »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Bob's Business

Bob's Business

Bob's Business adopts a fresh approach to information security awareness and compliance training, delivering key information through the use of short animated movies.

Cloud Credential Council (CCC)

Cloud Credential Council (CCC)

The CCC is a leading provider of vendor-neutral certification programs that empower IT and business professionals in their digital transformation journey.

Datto

Datto

Datto delivers a single toolbox of easy to use products and services designed specifically for managed service providers and the businesses they serve.

CloudMask

CloudMask

CloudMask patent technology provides Dynamic Data Masking (DDM) that masks sensitive data, structured or non-structured, in real-time.

IronNet Cybersecurity

IronNet Cybersecurity

IronNet’s product and services provide enterprise-wide security management and visibility of your network, users and assets.

Idaptive

Idaptive

Idaptive delivers Next-Gen Access through a zero trust approach. Idaptive secures access everywhere with single sign-on, adaptive MFA, EMM and analytics.

Perseus Cyber Security

Perseus Cyber Security

Perseus provides all-around digital protection for small and medium-sized businesses through state-of-the-art software solutions, flexible online training and emergency response.

itbox.online

itbox.online

Itbox.online offers IT solutions to ensure that your company's technologies are always available and secure as your business demands.

Griffeshield

Griffeshield

Griffeshield is a company specialised in new information technologies used to protect Intellectual Property.

WebSec B.V.

WebSec B.V.

WebSec is a Dutch Cybersecurity firm mainly focused on offensive security services such as pentesting, red teaming and security awareness and phishing campaigns.

Asimily

Asimily

Asimily’s IoMT risk remediation platform holistically secures the mission-critical healthcare devices that deliver safe and reliable care.

Nanitor

Nanitor

Nanitor is a powerful cybersecurity management platform focusing on hardening security fundamentals across your global IT infrastructure.

Beetles Cyber Security

Beetles Cyber Security

Beetles is a crowdsourced penetration testing platform designed to build a trusted, hacker-centric approach to protectan organization’s digital attack surface.

63 Moons Technologies (63MT)

63 Moons Technologies (63MT)

63 Moons Technologies is a world leader in providing next-generation technology ventures, innovations, platforms, and solutions.

ARGOS Cloud Security

ARGOS Cloud Security

ARGOS aims to simplify and strengthen cloud security, by creating a visual map of security vulnerabilities, to your priceless information stored in any cloud provider environment.

Aim Security

Aim Security

Aim empowers enterprises to unlock the full potential of GenAI technology without compromising security. GenAI makes business better - Aim makes GenAI secure.