Will NSA & CyberCom Split?

Talk of separating the National Security Agency and US Cyber Command continues to pop up, as officials discuss the best path forward for agencies with different but related missions.

The Obama administration's top defense and intelligence officials are proposing a plan to separate the spying and war fighting arms of America's vast hacking apparatus, an idea that was recommended, but rejected after the Edward Snowden revelations of 2013.

Defense Secretary Ash Carter and Director of National Intelligence James Clapper both support a proposal to separate NSA from CYBERCOM, but both declined to comment for the record.

The agencies currently share the same leader, Adm. Mike Rogers, and headquarters space at Fort Meade, Maryland. But their missions differ: NSA focuses on intelligence while CYBERCOM conducts military cyberspace operations.

“While USCYBERCOM resides with NSA, the two organizations are distinct entities with separate missions, authorities and resource streams,” said Rogers in written testimony for an April 5 Senate Armed Services Committee hearing. “Neither is an arm of the other, and both perform vital tasks on behalf of our nation.”

Adm. Mike Rogers wears two hats.

Rogers at the hearing said he supported elevating CYBERCOM to a unified combatant command, which “would allow us to be faster, which would generate better mission outcomes.” He, however, warned against taking control of CYBERCOM away from the NSA chief at this time, in part because of the command’s reliance on NSA systems.

Senior military leaders have served as NSA director since the agency’s founding in 1952. According to NBC News, future directors would be four-star generals or the equivalent, a higher rank than currently leads the agency. An earlier Reuters report said future directors could be civilians to show NSA doesn’t report to CYBERCOM.

“Following a thorough interagency review, the administration has decided that keeping the positions of NSA director and Cyber Command commander together as one, dual-hatted position is the most effective approach to accomplishing both agencies’ missions,” White House’s National Security Council spokeswoman Caitlin Hayden said.


DefenseOne:       ABC

 

« Delete Google Maps But They'll Still Track You
Uber Starts Self Driving Taxis »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

ixAssociates

ixAssociates

ixAssociates is a UK based IT Integration business specialising in risk, compliance, eDefence, and network security solutions.

it-sa 365

it-sa 365

it-sa 365 is a digital platform for connecting IT security vendors and experts with those who bear responsibility for IT security in management and technology.

CloudInsure

CloudInsure

CloudInsure is a Cloud Insurance platform designed to specifically address emerging liabilities within the Cloud environment.

Fenror7

Fenror7

Fenror7 lowers the TTD (Time To Detection) of hackers, malwares and APTs in enterprises and organizations from 300 days on average to 24 hrs or less.

MadSec Security

MadSec Security

MadSec Security is a leading consulting company whose expertise are information and cyber security.

File Centre

File Centre

File Centre is a leading specialist when it comes to data backup, we offer our clients a premium backup retrieval and delivery solution.

Salt Security

Salt Security

Salt Security protects the APIs that are the core of every SaaS, web, mobile, microservices and IoT application.

Cyber Science

Cyber Science

Cyber Science is the flagship conference of C-MRiC, focusing on pioneering research and innovation in Cyber Situational Awareness, Social Media, Cyber Security and Cyber Incident Response.

Blockchain Solutions

Blockchain Solutions

Blockchain Solutions Limited is a technological One Stop Solution provider, for Blockchain technology.

OAS Chain

OAS Chain

OAS Blockchain Renaissance Project presents three platforms that address the major challenges of public blockchain, private blockchain, and IoT security.

Sum&Substance (Sumsub)

Sum&Substance (Sumsub)

Sum&Substance is a developer of remote verification solutions. Our technology allows online services around the world to meet regulatory requirements, prevent fraud and enhance customer confidence.

Trusted Connectivity Alliance (TCA)

Trusted Connectivity Alliance (TCA)

Trusted Connectivity Alliance is a global, non-profit industry association which is working to enable a secure connected future.

VirtualArmour

VirtualArmour

VirtualArmour is a managed security services provider with global reach and local attitude.

Guardey

Guardey

Guardey protects thousands of SME's environments. Whether your team works at the office, at home, at the customer or remotely. We protect your business. We do this in an accessible and affordable way.

IDECSI

IDECSI

IDECSI delivers cutting-edge technology and engages all employees in the security system for effective and cost-efficient data protection.

Wavenet

Wavenet

Wavenet has grown from simple beginnings to become one of the UK’s market leaders in unified communications, business telephony, and Cyber Security solutions.