Divide and Conquer

Why Dual Authority at the NSA and Cyber Command Hurts U.S. Cybersecurity

Keith Alexander testifies before Congress on June 12, 2013 Courtesy Reuters

As General Keith Alexander prepares to depart from the federal government early next year, it’s important to note that he will be vacating not one job but two. He has earned plenty of attention for his role as director of the National Security Agency (NSA), the United States’ signals intelligence operation. But Alexander has concurrently served as head of Cyber Command, the cybersecurity command that the Pentagon established in 2010. This overlap was not an oversight; in fact, it was quite the opposite. Policymakers assumed that it would be efficient to have the same person run the two organizations, given that they both relied on the same types of technical expertise and operated in the same virtual space (not to mention that they are both physically based in Fort Meade, Maryland).

But if decision-makers at the White House and Pentagon are smart, they will use Alexander’s departure as an opportunity to dissolve the marriage between the two agencies. The past several years have proven that the arrangement is not as mutually conducive as it once seemed. Not only do the organizations have starkly different cultures, their missions are vastly different, even contradictory. There is, indeed, an overlap between military and intelligence missions in cyberspace. But it was a mistake to assume that they would complement, rather than impede, each other.

So long as intelligence collection and military operations are conducted in tandem, their practitioners will fight bureaucratic turf battles against their counterparts to gain priority in operational planning. For example, if a fighter pilot targets a building in support of his military objectives but kills a human intelligence source in the process, the intelligence agent will be sure to blame the pilot for jeopardizing the former’s mission. By contrast, if the presence of a human intelligence source precludes authorization to target the building, the pilot will blame the collector for jeopardizing the former’s mission.

Standard military doctrine tries to overcome this age-old struggle with “an evaluation of the

Loading, please wait...

Related Articles

This site uses cookies to improve your user experience. Click here to learn more.