National Security

NSA and Cyber Command Infrastructure Divided

NSA and Cyber Command

A Department of Defense official said November 1 that U.S. Cyber Command needs to have its own infrastructure and not rely so heavily on the National Security Agency for its cyber tools, a transition that suggests a subsequent split between the two rivaling agencies.

Cyber Command has operated on the NSA’s networks since its conception in 2009, but is in the process of building systems “by which we can do our own operations and not rely so heavily on the NSA infrastructure,” said Capt. Ed Devinney, director of corporate partnerships and technology outreach at Cyber Command.

“Building our own infrastructure is probably the biggest thing that will impact both organizations,” Devinney said at the CyberCon conference hosted by Fifth Domain November 1, 2018.

The infrastructure split stems from the different missions of the two agencies, Devinney said. The NSA’s infrastructure is designed for intelligence gathering, as well as persistent and covert access capabilities, while Cyber Command’s needs are often blunter.

“Often times we may not care about the persistent access. We may not care about being quiet,” Devinney said. “In fact, in some cases we want to be overt about what we’re doing, we want to make sure that the adversary knows that we’re there.”

In August, Gen. Paul Nakasone, who heads both the National Security Agency and U.S. Cyber Command, recommended the two organizations remain formally integrated for at least two years, according to reports in the Washington Post. Calls to end this “dual-hat” arrangement have existed since the Obama administration, but were delayed when Nakasone took over, according to the Post.

Arms Industries

@armsindustriesusa #armsindustries


In Related News:

Russia’s Aircraft Carrier Damaged in Dock Accident

More Letters Discovered in Ricin Poison Case

Related posts

Americas Nuclear Security Readiness Urgency

Arms Industries

US House Denies New Nuclear Weapon Proposed Limits

Arms Industries

New Email Security Protocol for Federal Agencies

Arms Industries

Leave a Comment