Clarifying the art of the possible might be the operation’s real lasting success.
Latest in Cyber Command
‘Achieving and Maintaining Cyberspace Superiority’: A Cyber Command and Interagency Legal Conference
I'm happy to report that U.S. Cyber Command will host its sixth annual legal conference from March 4–7, and that some seats may still be available. The title is "Achieving and Maintaining Cyberspace Superiority," and it is consciously framed as not just a CYBERCOM but also an interagency (and international) production.
More details from the organizers, including contact information if you’d like to attend:
The new U.S. Cyber Command vision and the Department of Defense Cyber Strategy embody a fundamental reorientation in strategic thinking.
U.S. Cyber Command will host its fifth annual legal conference from March 5–8.
Friday morning, the White House announced it will elevate Cyber Command to a full unified combatant command. Within 60 days, the Secretary of Defense will recommend whether Cyber Command should also be split from the National Security Agency.
The White House has released a statement announcing the elevation of CYBERCOM to a unified combatant command.
The Government Accountability Office last week published a report that, among other things, weighs in on the pros and cons of the NSA/CYBERCOM “dual-hat” system (pursuant to which the director of the NSA/CSS and commander of CYBERCOM are the same person). The report deserves attention but also some criticism and context. Here’s a bit of all three.
1. What is the “dual-hat” issue?
In light of Michael Sulmeyer’s excellent recent piece on splitting NSA and CYBERCOM, which ran at War on the Rocks last week, I want to pull together some of the key legal and policy developments of the past year in a single narrative. My aim is to put them in context with each other in a way that will provide useful background for those new to this issue, while also putting a spotlight on the deconfliction-of-equities issue that the split proposal raises.
C4ISRNET recently published an interesting and useful four-part series exploring what U.S. Cyber Command will need to operate on its own, separate from the National Security Agency. (Part I is here and provides links to the other parts in the series.)