{"id":233222,"date":"2017-08-07T17:13:31","date_gmt":"2017-08-07T21:13:31","guid":{"rendered":"http:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/uncategorized\/separating-nsa-and-cybercom-be-careful-when-reading-the-gao-report-lawfare-blog.php"},"modified":"2017-08-07T17:13:31","modified_gmt":"2017-08-07T21:13:31","slug":"separating-nsa-and-cybercom-be-careful-when-reading-the-gao-report-lawfare-blog","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/nsa-2\/separating-nsa-and-cybercom-be-careful-when-reading-the-gao-report-lawfare-blog.php","title":{"rendered":"Separating NSA and CYBERCOM? Be Careful When Reading the GAO Report &#8211; Lawfare (blog)"},"content":{"rendered":"<p><p>    The Government Accountability Office last week published    a report that,    among other things, weighs in on the pros and cons the    NSA\/CYBERCOM dual-hat system (pursuant to which the Director    of NSA\/CSS and Commander of CYBERCOM are the same person). The    report deserves attention, but also some criticism and    context. Heres a bit of all three.  <\/p>\n<p>    1. What is the dual-hat issue?  <\/p>\n<p>    If you are new to the dual-hat issue, or in any event if youve    not closely followed the developments of the past year, please    read     this recent post for an introduction and overview.  <\/p>\n<p>    2. What was GAOs bottom line? Did they    recommend keeping or abolishing the dual-hat?  <\/p>\n<p>    Neither. The report does not purport to answer that question.    It is, instead, no more no less than an attempt to convey the    DOD perspective (and only the DOD perspective) on the    pros and cons of keeping the dual-hat structure (as well as    identifying some mitigation steps).  <\/p>\n<p>    3. What method did GAO use to determine DODs    perspective?  <\/p>\n<p>    GAO did three things:  <\/p>\n<p>    a. It reviewed documents previously generated by CYBERCOM and    by the Joint Staff to educate their own leadership on the pros    and cons.  <\/p>\n<p>    b. It sent out questionnaires to various DOD components (with    relevant responses received from CYBERCOM, 6 combatant    commands, 4 combat support agencies, and 3 OSD offices, plus a    collective response for DOD produced by DODs CIO); and  <\/p>\n<p>    c. It conducted interviews with personnel from CYBERCOM, DOD    CIO, and NSA\/CSS.  <\/p>\n<p>    4. Anything wrong with that    methodology?  <\/p>\n<p>    Not if your goal is to convey only DODs perspective.    And to be fair, that was GAOs stated goal. But    this approach is problematic.  <\/p>\n<p>    One of the issues driving the dual-hat debate involves the    tension that arises between intelligence-collection equities    (which NSA would be inclined to favor) and disruption equities    (which CYBERCOM would be inclined to favor), in the scenario in    which access to enemy-controlled system could be used for    either purpose. As a result, the Intelligence Community    has a stake in this question. GAO should have reached out for    input from ODNI in particular (and it also is odd that GAO only    included NSA in one of the three methods mentioned above).  <\/p>\n<p>    GAO might respond that its terms of reference were    DOD-specific. Thats clearly true for certain other parts    of the GAO report in question, dealing with other topics.    Its less clearly the case with the dual-hat portion of the    report. But even if it is, it does not follow that GAO    could not include in its report any reference to    possibly-competing perspectives from the IC. Indeed, I    would go further and say it was a big mistake not to do so, for    it was perfectly foreseeable that this report would be taken by    many (especially the media) as conveying a general assessment    of the dual-hat issue rather than just a DOD-specific summary    of opinions, no matter how many caveats are given.  <\/p>\n<p>    5. Fine, but it is what it is. So lets look at    what GAO actually reported, starting with the three pros    favoring preservation of the dual-hat arrangement. The    first one asserts that the dual-hat promotes coordination and    collaboration between NSA and CYBERCOM. Comments?  <\/p>\n<p>    At bottom, this is a claim that having a common boss makes it    relatively easy to collaborate when it comes to developing    exploits and sorting out when and how they are used. That    makes sense, and is consistent with conventional wisdom on the    dual-hat situation.  <\/p>\n<p>    6. The second pro is about how the dual-hat    solves the deconfliction challenge mentioned above, but whats    really interesting here is what the report implies about how    that challenge would otherwise have to be managed.      <\/p>\n<p>    As noted above, the need to deconflict when collection and    disruption equities compete is a big part of this story.    Here, GAO acknowledges that the status quo provides a    ready-made solution. So far, so good. What is really    interesting, though, is the comment GAO then makes regarding    what would happen in such cases of tension in the absence of    the dual-hat.  <\/p>\n<p>    Tellingly, the report observes that, in that case,    deconfliction issues would have to be taken to the Secretary    of Defense and\/or Director of National    Intelligence for resolution (emphasis added). I love    the use of and\/or in that sentence. It perfectly    captures a critical point: absent a dual-hat, there has    to be a new deconfliction system, and yet the lead contenders    for that role each have a dog in the fight. Let me expand    on that a bit.  <\/p>\n<p>    Assume we decide to end the dual-hat system, without first    settling on a new deconfliction system. What then?    In that case, CYBERCOM usually will win over    NSA. Why? Think about it. NSA wants to use    existing access to keep collecting, but CYBERCOM wants to use    it to disrupt the platform. If NSA barrels ahead with its    preference, nothing really changes; the target remains    operational and the enemy is none the wiser, hopefully.    But if CYBERCOM barrels ahead with its preference, in    most instances that will shut down the target (or at least make    it clear to the enemy that the target has been penetrated); no    more collection at that point. NSA will lose such    battles, except when DIRNSA manages to see the issue coming and    gets someone over CYBERCOMs head to make them back off.  <\/p>\n<p>    Sounds like we would need a formal system to replace the    dual-hat for deconfliction then. But what would that look    like? If the solution is to charge the DNI with making the    call, CYBERCOM wont likely be happy. If the solution    instead is to charge SecDef (or USD(I) or the like), NSA (and    DNI) wont likely be happy. If the solution instead is to    convene a committee of some kind with stakeholders from both    sidesand that committee works by majority votethen the same    problem arises (unless you find some third-party player, like    the National Security Adviser, to ensure there is not a tie and    that the IC and military have equal voting power).  <\/p>\n<p>    The point being: this issue needs serious attention. I    dont doubt a decent solution can be developed, but care must    be taken lest we stumble into the default scenario mentioned    above.  <\/p>\n<p>    7. The third pro involves the efficient    allocation of resources, but its really about the idea that    NSA makes CYBERCOM possibleand that reminds us that the    dual-hat isnt going away soon.  <\/p>\n<p>    The third pro noted by GAO is that the dual-hat facilitates NSA    and CYBERCOM sharing operational infrastructure (translated:    hacking tools, accesses, staging servers, personnel, etc.), as    well as the infrastructure for training. Of course, its    pretty much a one-way street; this traditionally is all about    NSA sharing its expertise with CYBERCOM as it has stood    up. Legislation currently forbids separation of the dual    hat until DOD can certify that CYBERCOM is truly ready to    operate independently. Thats supposed to be the case by    September next year, but of course its one thing to say it and    quite another to achieve it.  <\/p>\n<p>    8. Turning now to the cons, GAO introduces the    idea that the dual-hat may give CYBERCOM an unfair advantage    over other commands.  <\/p>\n<p>    This one was phrased very carefully. Without saying that    this problem already exists, GAO says that CYBERCOM    thinks that other commands are worried that the    dual-hat may in the future unduly favor CYBERCOM requests for    NSA support over the requests that come from other military    commands. This is an interesting twist on the more-familiar    concern that military equities in general will trump collection    equities. This is military-vs-military instead. At any    rate, again note that it is framed as speculation rather than a    current observation. That might be politeness, or it    might really be purely speculative. You really cant tell    from the GAO report (see my last point below, on whether any of    the reports observations have strong evidentiary    foundations).  <\/p>\n<p>    9. The second con GAO lists is a bombshell: The    dual-hat creates [i]ncreased potential for exposure of NSA\/CSS    tools and operations.  <\/p>\n<p>    Wow. In an almost cavalier way, the GAO report links the    dual-hat issue directly to the fierce, ongoing debate over the    security of NSAs tools, a topic that goes to the very heart of    NSAs mission. Because of the importance of that latter debate,    GAOs assertion will constitute a heavy thumb on the scale in    favor of separating the dual-hat, if it catches on. Time    will tell if it will. For now, lets just take a closer look at    the claim.  <\/p>\n<p>    First, here is what GAO says on the subject:  <\/p>\n<p>      The dual-hat command structure has led to a high-level of      CYBERCOM dependence on NSA\/CSS tools and infrastructure.      According to NSA\/CSS officials, the agency shares its tools      and tactics for gaining access to networks with a number of      U.S. government agencies, but CYBERCOMs dependence on and      use of the tools and accesses is particularly prevalent.      CYBERCOMs dependence on NSA\/CSS tolls increases the      potential that the tools could be exposed.    <\/p>\n<p>    Lets parse the two claims here.  <\/p>\n<p>    Does the dual-hat create CYBERCOM dependence on NSA, as the    first sentence indicates? I think that has things    backwards. As noted in the prior con, CYBERCOM badly needed    NSA at first, and still needs it to no small extent.    Thats not caused by the dual-hat. It is caused by lack    of capacity. The dual-hat has been part of the solution    to that need. Perhaps DOD meant to convey a different    point: that keeping the status quo has become a crutch that    prevents CYBERCOM from pressing faster to build its own    capacities. That makes more sense.  <\/p>\n<p>    Does CYBERCOM use of NSA tools and accesses (i.e., exploits and    penetrations) increase the risk of their exposure? Put    that way, the answer must be yes. Every instance of use    of any exploit or access creates a new opportunity for others    to discover it, and so the risk must go up each time (you might    say each use increases the exposure surface). But note    that weve just put the question in a non-nuanced way, without    any attempt to quantify the degree of increase in the risk, let    alone to place it in context with offsetting benefits or with    reference to mitigation strategies for this problem. All    that emerges from the GAO Report is the bottom line: CYBERCOM    relies on NSA tools ostensibly because of the dual-hat, and    therefore the dual-hat increases the risk of those tools    getting loose. And any suggestion that a policy    exacerbates that risk is bound to draw attention.  <\/p>\n<p>    The possibility of loose NSA tools has become a flashpoint for    debate, in a manner that threatens for better or worse to    create new limits on the ability of NSA to develop or keep    certain capacities (particularly knowledge of zero-day    vulnerabilities). NSA received a substantial black eye    when a Russian intelligence agency the mysterious    entity identifying itself as the Shadowbrokers somehow acquired    a cache of NSA-created exploits and then began dumping them    publiclyespecially after one of those exploits was used in    connection with WannaCry and NotPetya. Both WannaCry and    NotPetya received a vast amount of media attention, much of it    pinning the blame in large part on NSA. This fueled arguments    to the effect that NSA should not be allowed to create or    preserve such tools (or at least that current procedures for    balancing the competing equities involved (building NSAs    collection capacity, vs improving the security of    commercially-available products) should be altered    significantly so as to reduce NSAs capacities in this area).      <\/p>\n<p>    That argument was     out there before WannaCry and NotPetya broke, in fact, but    once those stories broke it received a     strong boost from Microsoft. As     this June piece in the New York Times from Nicole Perlroth    and David Sanger underscores, this perspective has gained    considerable momentum with some in private industry, Congress,    and foreign governments. Just this morning, former NSA Deputy    Director Rick Ledgett wrote     a post here at Lawfare fighting back against this argument,    highlighting how important the issue is.  <\/p>\n<p>    Whether you agree or disagree with this argument, you no doubt    can appreciate how it has made the government acutely sensitive    to questions about the security of NSAs tools. As a result,    the argument that the dual-hat creates significant security    risks for those tools has the potential to have an outsized    impact on the dual-hat debate. Which is a good    thing, if the argument is a persuasive one.    Unfortunately, the GAO report does not come anywhere close to    giving us enough information to judge the matter. And yet    this part of the report grabbed headlines in some quarters (see        this piece in NextGov, titled GAO: Keeping NSA and    CyberCom Together Makes Hacking Tool Leaks More Likely).  <\/p>\n<p>    10. The next con listed by GAO: NSA and CYBERCOM    are too much for any one person to manage.  <\/p>\n<p>    Thats a familiar and serious concern, and it is unsurprising    that it arose here. It is entangled to some extent with    the deconfliction issue, of course, but at the end of the day    being Director of NSA and Commander of CYBERCOM both concern    vastly more than deconfliction.  <\/p>\n<p>    11. The next con on the list? Strangely, its    the deconfliction issue, which we already discussed above as a    pro for the dual-hat. What gives?  <\/p>\n<p>    It is telling that the deconfliction issue pops up both as a    pro and a con. As noted above, the dual-hat is a good    thing for deconfliction insofar as one thinks there ought to be    a single decision-maker who takes both collection and    disruption equities seriously. But here we now see the    flip-side of the argument, as GAO reports that personnel from    both NSA and CYBERCOM (including a senior-level    official) told GAO that the dual-hat leads to increased    tension between NSA and CYBERCOM staffs, because their    respective collection and disruption missions may not always    be mutually achievable.  <\/p>\n<p>    You know what Im going to say, I suspect. The tension is    caused by the combination of incompatible missions and shared    tools\/accesses. Thats not the dual-hats fault.    The dual-hat is one solution to resolving the tension. As    I have     noted here, there clearly is a view in some circles that    the fix is in with the dual-hat, in favor of NSAs collection    mission. Maybe thats right, maybe its not. But at any    rate, listing the dual-hat as a con here seems to be a    reflection of that perspective.  <\/p>\n<p>    12. The last con on the list has to do with    difficulties in tracking expenditures the NSA makes on behalf    of CYBERCOM  <\/p>\n<p>    This may well be a very important issue, but it seems to me the    sort of thing to be addressed through improved procedures, and    should not matter much in deciding whether to keep the    dual-hat.  <\/p>\n<p>    13. How strong is the evidence supporting the    various pro and con claims?  <\/p>\n<p>    I recommend caution. We get a description of GAOs methods, as    noted above, but of course we do not also get the underlying    documents, interview notes, etc. And the reports    narrative on each point is exceedingly thin, no longer really    than what Im providing here. Note, too, my earlier    observation that GAO does not appear to have sought the views    of ODNI, and only sought NSA views to a limited extent.    None of which is to say that any of the observations are    incorrect, of course.   <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Originally posted here:<\/p>\n<p><a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/lawfareblog.com\/separating-nsa-and-cybercom-be-careful-when-reading-gao-report\" title=\"Separating NSA and CYBERCOM? Be Careful When Reading the GAO Report - Lawfare (blog)\">Separating NSA and CYBERCOM? Be Careful When Reading the GAO Report - Lawfare (blog)<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> The Government Accountability Office last week published a report that, among other things, weighs in on the pros and cons the NSA\/CYBERCOM dual-hat system (pursuant to which the Director of NSA\/CSS and Commander of CYBERCOM are the same person). The report deserves attention, but also some criticism and context. Heres a bit of all three <a href=\"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/nsa-2\/separating-nsa-and-cybercom-be-careful-when-reading-the-gao-report-lawfare-blog.php\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"limit_modified_date":"","last_modified_date":"","_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[261463],"tags":[],"class_list":["post-233222","post","type-post","status-publish","format-standard","hentry","category-nsa-2"],"modified_by":null,"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/233222"}],"collection":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/comments?post=233222"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/233222\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/media?parent=233222"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/categories?post=233222"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/tags?post=233222"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}