CISA, NSA And The Dual Hat

One of the most challenging parts of a 20th century government structure - like the U.S. - is dealing with a 21st century challenge.  We first saw this in the disaster of 9/11 which was less about an intelligence or policy failure than the ugly new reality that we have entered an era of porous borders/porous boundaries.  Al Qaeda did not have an international and domestic bureaucracy not talking to each other. 

They played a loose game of soccer, we played rules bound American football.  And they won the first round.

Unfortunately, we now seem to be playing out the same circumstances in Cyber world where the last several months have been filled with a litany of extraordinary breeches. The Microsoft and SolarWinds break-ins, done by China and Russia, are extraordinary in their breadth and scope. 

And, this time, we certainly didn’t lack for entities to defense the ramparts.  The alphabet soup of U.S. government agencies involved in Homeland Security, Defense, Justice and Commerce Department and multiple private sector industry cyber security groups is equally breathtaking - all in response to the last ten years of continued cyber lawlessness.  Yet, again, we have failure.

The main domestic breakdown is the continued “stovepipe” separation between the external and internal. In particular, between those with the technical cyberspace savvy people to resolve the problem and the defenders who can take action. 

Externally, the Cyber Command / NSA dual hat combination has worked increasingly well  - one focused on attack, the other focused on warning and developing successful software “tools”.  But, this kind of logical pairing has stopped at the border for a number of reasons, mostly surrounding domestic privacy concerns and old fashioned 20th century thinking.  We simply need to move beyond that.

Former Secretary of Defense Robert Gates (for full clarity, my old boss at CIA,) has put forward a potential solution which I think would work well - it is time to match off the expertise of NSA with a domestic agency that could defend inside the American borders - which the Russians and Chinese now so easily enter under our “external fence wire.” This domestic “dual hatted” arrangement would act as Cyber Command and NSA do today externally – provide expertise, insight, and execution together.  

While Gates suggests DHS as the Department, I would suggest further that Cybersecurity and Infrastructure Security Agency (CISA) would be the place to nest the DHS anchor.  Unlike the law enforcement-oriented FBI, CISA has the mission of warning and the vast private sector connections to benefit from a relationship with NSA. The Director of CISA would, in essence, be dual hatted with NSA.

The objection to this would be strong in the area of civil liberties and the question of overburdening the NSA – triple hatting the DIRNSA.  While there is merit to both concerns, there are known ways around these challenges. 

We already have, in place, civil liberties oversight organizations in the Intelligence Community and DHS. This is not the bad old days of the ever relived 60’s where no one was watching the store from Capitol Hill nor the outside world.  We have two oversight committees paid to watch out for these abuses.  And, I dare say, an active cyber space filled with public watchers who would never stand for anything close to the nonsense of the 1960’s and blow the whistle on perceived misdeeds.

As for the triple hatted nature of an NSA Director, that is simply a bureaucratic term with little practical daily impact.  Directors have deputies who manage the day-to-day operations.  Adding one for domestic would not be a major challenge.

The challenge, however, would be the work load for the NSA staff. There are a lot of good people at NSA.  But, they would be further spread thin with a domestic role. And we are already challenged in the US government with a shortage of good cyber people - often put off by the slowness of hiring and the ever-present problem of passing background checks.  

This problem can be ameliorated, in part, through the contracting community who can move more swiftly in the hiring process than the government.  And, while the contractors will always have security problems, they have a quickly developing set of stringent cyber security rules promulgated by a very involved Defense Department security protection system.

All of this will not add up to the perfect defense in cyber space at home.  There is no such thing as one hundred percent security.  But, Secretary Gates was right – we have to move away from the concept of internal and external defense and use of intelligence to protect America’s cyberspace.  Allowing NSA and CISA to work closely together may help.

Ronald Marks is Term Visiting Professor, George Mason University, Schar School of Policy and Government. He is President of ZPN Cyber & National Security Strategies     

Image: Unsplash

You Might Also Read: Smart Artificial Intelligence

 

 

« Investigating Fake News With Google, YouTube & Facebook
Create A Cybersecurity Compliance Plan With These Seven Tips »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

UK Cyber Week Expo & Conference

UK Cyber Week Expo & Conference

Award-winning event organiser ROAR B2B announces the launch of UK Cyber Week and its inaugural event on 4 and 5 April 2023 at the Business Design Centre, London.

Securezoo

Securezoo

Securezoo's mission is to simplify and enhance information security by providing trusted security guidance, products, and information to small and mid-sized businesses and security professionals.

Radware

Radware

Radware is a global leader of application delivery and cyber security solutions for virtual, cloud and software defined data centers.

Metasploit

Metasploit

Metasploit penetration testing software helps find security issues, verify vulnerabilities and manage security assessments.

Cobalt Strike

Cobalt Strike

Cobalt Strike is penetration testing software designed to execute targeted attacks.

Malware Patrol

Malware Patrol

Malware Patrol provides intelligent threat data that protects against cyber attacks.

Assured Enterprises

Assured Enterprises

Assured Enterprises provides comprehensive cyber risk identification, management and mitigation across all platforms.

TCN

TCN

TCN is an advanced System Integrator and Infrastructure Company in Albania.

MENAInfoSecurity

MENAInfoSecurity

MENAInfoSecurity is a regional leader in information security solutions, assurance services and managed services.

Data Terminator

Data Terminator

Data Terminator provide a comprehensive range of secure data destruction equipment and services are in compliance to US Department of Defense (DoD) and National Security Agency (NSA) standards.

Protocol Labs

Protocol Labs

Protocol Labs is a research, development, and deployment institution for improving Internet technology.

Whistic

Whistic

Whistic is a cloud-based platform that uses a unique approach to address the challenges of third-party risk management.

DataExpert Singapore

DataExpert Singapore

DataExpert Singapore provide solutions and services in the areas of Digital Forensics, Data Recovery, Data Duplication, Data Degaussing & Wiping, Data Destruction, and IT Disposal.

Opora

Opora

Opora is the leading cybersecurity provider of adversary behavior analytics “ABA” and preemptive security solutions.

Mission Critical Partners (MCP)

Mission Critical Partners (MCP)

Mission Critical Partners is committed to delivering innovative solutions that help our clients enhance and evolve their critical-communications systems and operations.

Cymune

Cymune

At Cymune we help businesses to fight against cybercrime, protect patented data and diminish security risks.

Quatrro Business Support Services (QBSS)

Quatrro Business Support Services (QBSS)

QBSS is a tech-enabled outsourcing firm that’s changing the way companies think about finance, accounting, human resources and technology services.