Will NSA & CyberCom Split?

Talk of separating the National Security Agency and US Cyber Command continues to pop up, as officials discuss the best path forward for agencies with different but related missions.

The Obama administration's top defense and intelligence officials are proposing a plan to separate the spying and war fighting arms of America's vast hacking apparatus, an idea that was recommended, but rejected after the Edward Snowden revelations of 2013.

Defense Secretary Ash Carter and Director of National Intelligence James Clapper both support a proposal to separate NSA from CYBERCOM, but both declined to comment for the record.

The agencies currently share the same leader, Adm. Mike Rogers, and headquarters space at Fort Meade, Maryland. But their missions differ: NSA focuses on intelligence while CYBERCOM conducts military cyberspace operations.

“While USCYBERCOM resides with NSA, the two organizations are distinct entities with separate missions, authorities and resource streams,” said Rogers in written testimony for an April 5 Senate Armed Services Committee hearing. “Neither is an arm of the other, and both perform vital tasks on behalf of our nation.”

Adm. Mike Rogers wears two hats.

Rogers at the hearing said he supported elevating CYBERCOM to a unified combatant command, which “would allow us to be faster, which would generate better mission outcomes.” He, however, warned against taking control of CYBERCOM away from the NSA chief at this time, in part because of the command’s reliance on NSA systems.

Senior military leaders have served as NSA director since the agency’s founding in 1952. According to NBC News, future directors would be four-star generals or the equivalent, a higher rank than currently leads the agency. An earlier Reuters report said future directors could be civilians to show NSA doesn’t report to CYBERCOM.

“Following a thorough interagency review, the administration has decided that keeping the positions of NSA director and Cyber Command commander together as one, dual-hatted position is the most effective approach to accomplishing both agencies’ missions,” White House’s National Security Council spokeswoman Caitlin Hayden said.


DefenseOne:       ABC

 

« Delete Google Maps But They'll Still Track You
Uber Starts Self Driving Taxis »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

INSUREtrust

INSUREtrust

INSUREtrust is a pioneer in the industry, inventing the concept of cyber insurance.

Apricorn

Apricorn

Apricorn provides hardware-based 256-bit encrypted external storage products to companies and organizations that require high-level protection for their data at rest.

Open Systems International (OSI)

Open Systems International (OSI)

Our innovative Operations Technology (OT) solutions are highly scalable and can be deployed by various utility companies to monitor, control and optimize their real-time operations.

Rhebo

Rhebo

Rhebo Industrial Protector monitors and ensures the continuous, correct, and predictable operation of real-time Industrial Control Systems to prevent outages and reduce downtimes.

Digital Ship

Digital Ship

Digital Ship provides news, information, conferences and events focused on digital ship systems, information technology and security relating to maritime operations.

Data Terminator

Data Terminator

Data Terminator provide a comprehensive range of secure data destruction equipment and services are in compliance to US Department of Defense (DoD) and National Security Agency (NSA) standards.

Fly Ventures

Fly Ventures

Fly Ventures is a seed-stage venture capital fund for outstanding teams building Enterprise and Deep Tech startups in Europe.

ClassNK Consulting Service (NKCS)

ClassNK Consulting Service (NKCS)

ClassNK Consulting provides consulting services to the maritime industry with a focus on safety, security and compliance.

Skudo

Skudo

Skudo is dedicated to creating innovative best-in-class solutions that protect data exchange with the highest level of security and privacy.

Sekuro

Sekuro

Sekuro is your leading governance and cyber security partner. Building organisational resilience. Enabling fearless innovation.

Luxembourg House of Financial Technology (LHoFT)

Luxembourg House of Financial Technology (LHoFT)

Offering start-up incubation, co-working spaces including a soft-landing platform, the LHoFT connects and creates value for the entire Luxembourg FinTech ecosystem.

tru.ID

tru.ID

We’re tru.ID, and we're reimagining mobile authentication, one API at a time.

Paragon Cyber Solutions

Paragon Cyber Solutions

Paragon Cyber Solutions provides specialized security risk management and IT solutions to protect the integrity of your business operations.

DART Consulting & Training

DART Consulting & Training

DART is a leading cyber training and consultancy company. We enhance our clients’ cyber capabilities by growing and strengthening their frontline defense – the cyber teams.

HanaByte

HanaByte

HanaByte is a security consultancy focused on delivering state of the art solutions in the cloud. We specialize in delivering cloud services with an emphasis on security.

Hexagate

Hexagate

Hexagate is at the forefront of blockchain threat prevention and automated risk management, proactively detecting and mitigating threats to smart contracts and onchain assets.