Will NSA & CyberCom Split?

Talk of separating the National Security Agency and US Cyber Command continues to pop up, as officials discuss the best path forward for agencies with different but related missions.

The Obama administration's top defense and intelligence officials are proposing a plan to separate the spying and war fighting arms of America's vast hacking apparatus, an idea that was recommended, but rejected after the Edward Snowden revelations of 2013.

Defense Secretary Ash Carter and Director of National Intelligence James Clapper both support a proposal to separate NSA from CYBERCOM, but both declined to comment for the record.

The agencies currently share the same leader, Adm. Mike Rogers, and headquarters space at Fort Meade, Maryland. But their missions differ: NSA focuses on intelligence while CYBERCOM conducts military cyberspace operations.

“While USCYBERCOM resides with NSA, the two organizations are distinct entities with separate missions, authorities and resource streams,” said Rogers in written testimony for an April 5 Senate Armed Services Committee hearing. “Neither is an arm of the other, and both perform vital tasks on behalf of our nation.”

Adm. Mike Rogers wears two hats.

Rogers at the hearing said he supported elevating CYBERCOM to a unified combatant command, which “would allow us to be faster, which would generate better mission outcomes.” He, however, warned against taking control of CYBERCOM away from the NSA chief at this time, in part because of the command’s reliance on NSA systems.

Senior military leaders have served as NSA director since the agency’s founding in 1952. According to NBC News, future directors would be four-star generals or the equivalent, a higher rank than currently leads the agency. An earlier Reuters report said future directors could be civilians to show NSA doesn’t report to CYBERCOM.

“Following a thorough interagency review, the administration has decided that keeping the positions of NSA director and Cyber Command commander together as one, dual-hatted position is the most effective approach to accomplishing both agencies’ missions,” White House’s National Security Council spokeswoman Caitlin Hayden said.


DefenseOne:       ABC

 

« Delete Google Maps But They'll Still Track You
Uber Starts Self Driving Taxis »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

IEEE Computer Society

IEEE Computer Society

The IEEE Computer Society is the world's leading membership organization dedicated to computer science and technology.

Vanguard Integrity Professionals

Vanguard Integrity Professionals

Vanguard Integrity Professionals is an independent provider of enterprise security software solutions that address complex security and regulatory compliance challenges.

Untangle

Untangle

Untangle provides network security products designed specifically for the below-enterprise market, safeguarding businesses, home offices, nonprofits, schools and governmental organizations.

Threat Status

Threat Status

Threat Status are a Threat Intelligence company. We are the developers of Trillion. A cloud based Security As A Service (SaaS) platform.

Control System Cyber Security Association International (CS2AI)

Control System Cyber Security Association International (CS2AI)

CS2AI is the premier global not for profit workforce development organization supporting professionals of all levels charged with securing control systems.

C3i Hub

C3i Hub

C3i Hub aims to address the issue of cyber security of cyber physical systems in its entirety, from analysing security vulnerabilities to developing tools and technologies.

FPG Technologies & Solutions

FPG Technologies & Solutions

FPG Technology is a technology solutions provider and systems integrator, specializing in delivering IT Consulting, IT Security, Cloud, Mobility, Infrastructure solutions and services.

Digital Silence

Digital Silence

Digital Silence is a world-class provider of information security research and consulting services.

BlastWave

BlastWave

BlastWave’s BlastShield integrates three innovative products into a single solution to help prevent inadvertent and intentional attacks.

Herzing College

Herzing College

Herzing College Ottawa offers an accelerated 12-month Cybersecurity Specialist training program. This program is developed by industry experts and based on leading IT security certifications.

SE Ventures

SE Ventures

SE Ventures provides capital to big ideas and bold entrepreneurs who can benefit from Schneider Electric's deep domain expertise, R&D assets, and global customer base.

CodeLock

CodeLock

Codelock is a patent-pending solution that continuously provides software security at the code level, while providing advanced management insights with performance metrics and data analytics.

GoTo

GoTo

At GoTo we help people and businesses to connect and collaborate simply and securely – from anywhere. We’re the trusted partner for companies of all sizes.

VMware

VMware

VMware is a leading provider of multi-cloud services for all apps, enabling digital innovation with enterprise control.

Recast Software

Recast Software

Recast Software exists to simplify the work of IT teams and enable them to create highly secure and compliant environments.

Icon Information Systems (ICONIS)

Icon Information Systems (ICONIS)

ICONIS is an integrated infrastructure and service provider, offering unified Information Technology (IT) solutions globally.