{"id":211876,"date":"2017-02-28T07:12:21","date_gmt":"2017-02-28T12:12:21","guid":{"rendered":"http:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/uncategorized\/nsa-cyber-command-structure-should-remain-the-same-the-hill-blog.php"},"modified":"2017-02-28T07:12:21","modified_gmt":"2017-02-28T12:12:21","slug":"nsa-cyber-command-structure-should-remain-the-same-the-hill-blog","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/nsa-2\/nsa-cyber-command-structure-should-remain-the-same-the-hill-blog.php","title":{"rendered":"NSA, Cyber Command structure should remain the same &#8211; The Hill (blog)"},"content":{"rendered":"<p><p>    As if not troubled enough by President Trumps attacks, a new    debate is heighteningtensions    in the intelligence community. The Pentagon has started to    assess whether it is time todivide    the leadershipof the National Security Agency and    U.S. Cyber Command.Such a move is dubious: Is change    necessary? Can the IC tolerate another shock?  <\/p>\n<p>    A look overseas to the Israeli case could provide some insight.  <\/p>\n<\/p>\n<p>    According to that plan, the new directorate would absorb    responsibilities and resources from both Unit8200(the    IDFs signals intelligence or SIGINT unit, equivalent to the    NSA), as well as the Computer Service Directorate (equivalent    to the Joint Staff J6). A fierce internal debate has emerged,    with several (including the head of AMAN, the Intelligence    Directorate) arguing that all cyber activities should remain    under AMANs responsibility, while others insist that there is    an acute need for a dedicated cyber directorate.  <\/p>\n<p>    In early 2017, Lt. Gen. Eizenkot announced that the    establishment of the Cyber Directorate would be postponed until    further notice, and declared that AMAN would handle offensive    and information collection elements in cyber space, while the    Cyber Administration would come under the Computer Service    Directorate, focusing mainly on defensive activities.  <\/p>\n<p>    The reasons that led Lt. Gen. Eizenkot, who is considered a    level-headed officer, to reverse his 2015 decision are highly    relevant to the American case.  <\/p>\n<p>    From a strategic standpoint, the implications of the cyber    domain on present and future battlefields are still ambiguous    and constantly changing; so too are their effects on    traditional kinetic challenges. The inter-relations between the    physical and virtual domains are still in flux, with grave    ramifications on the nature of threats, and the measures needed    to cope with them.  <\/p>\n<p>    These changes are highly relevant to the way the IC reacts and    adapts. The vast majority of the NSAs current collection    activities are most likely executed through and with the cyber    domain. Though traditional methods (such as phone tapping) are    not dead, it is safe to assume that cyber is more dominant than    ever, and will only continue to grow over more traditional    domains and methods. Furthermore, given the specific    characteristics of the cyber domain, it is difficult to    distinguish between types of cyber activities (e.g., collection    vs. attack). Separating those in charge of SIGINT and those in    charge of cyber doesnt make sense.  <\/p>\n<p>    as the last few years have taught us, the Wests adversaries    have themselves transitioned to the cyber domain. With Russias    (alleged)interventionin    the U.S. elections, theSnowden    affair, HAMAS and Irans extensive use ofcyber-related    techniques, Chinesetheftof    F-35 plans, and ISISssophisticated    useof the virtual domain, this may not be the right    time for radical changes.  <\/p>\n<p>    Separating the NSA and the Cyber Command would inevitably    create a long transition period, during which U.S. cyber    capabilities would be negatively affected. Disputes over    missions and responsibilities, coordination issues, transition    of manpower, and lack of sufficient resources in one or both    entities would jeopardize U.S. cyber resilience in the short    term at the very least.  <\/p>\n<p>    Finally, with Trump trying to aggressivelyredefinerelations    between the IC and the executive branch, the last thing the    community needs at this moment is another shock. A decision to    separate the NSA and Cyber Command would create an all-out war    within the IC and the Department of Defense, since no sane    commander would agree to surrender responsibilities and    resources to another organization.  <\/p>\n<p>    The NSA itself would lose not only prestige but also relevancy,    and presumably try to torpedo the move. If any change is needed    at all, it would require a different approach: the cyber    component should gain supremacy over any other type of SIGINT    activity, as this will be the not-too-distant future reality.    Until then, NSA-Cyber Command relations should remain    untouched.  <\/p>\n<p>    Shay Hershkovitz, Ph.D., is chief strategy officer at    Wikistrat, Inc. and a political science professor at Tel Aviv    University specializing in intelligence studies. He is also a    former IDF intelligence officer whose book, \"Aman Comes To    Light,\" deals with the history of the Israeli intelligence    community.  <\/p>\n<p>    The views expressed by contributors are their own and are    not the views of The Hill.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Follow this link:<\/p>\n<p><a target=\"_blank\" rel=\"nofollow\" href=\"http:\/\/thehill.com\/blogs\/pundits-blog\/defense\/321292-nsa-cyber-command-structure-should-remain-the-same\" title=\"NSA, Cyber Command structure should remain the same - The Hill (blog)\">NSA, Cyber Command structure should remain the same - The Hill (blog)<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> As if not troubled enough by President Trumps attacks, a new debate is heighteningtensions in the intelligence community. The Pentagon has started to assess whether it is time todivide the leadershipof the National Security Agency and U.S.  <a href=\"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/nsa-2\/nsa-cyber-command-structure-should-remain-the-same-the-hill-blog.php\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"limit_modified_date":"","last_modified_date":"","_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[261463],"tags":[],"class_list":["post-211876","post","type-post","status-publish","format-standard","hentry","category-nsa-2"],"modified_by":null,"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/211876"}],"collection":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/comments?post=211876"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/211876\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/media?parent=211876"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/categories?post=211876"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/tags?post=211876"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}