Attacks/Breaches

8/21/2017
12:45 PM
50%
50%

Trump Makes US Cyber Command an Official Combat Arm

Move seen as step one in spinning off the command from the NSA.

The White House late last week officially elevated the US Cyber Command to a Unified Combatant Command for cyberspace operations.

The US Cyber Command, currently under the umbrella of the National Security Agency, soon may also be spun off completely from the spy agency.

"United States Cyber Command’s elevation will also help streamline command and control of time-sensitive cyberspace operations by consolidating them under a single commander with authorities commensurate with the importance of such operations. Elevation will also ensure that critical cyberspace operations are adequately funded," President Donald Trump said in an a statement announcing the anticipated move.

The White House announcement also noted that Defense Secretary James Mattis is exploring whether to separate the US Cyber Command from NSA. The Cyber Command was created in 2009 as a cyber offensive arm under the NSA.

Greg Touhill, the US government's first federal CISO, applauded the move. "I welcome today's announcement by the president. The elevation of United States Cyber Command to combatant command status has long been awaited. As the Department of Defense (DoD) moves to implement the president's order, what is really important in this process is the determination of how to segregate the intelligence mission of the National Security Agency (NSA) from the operational mission of US Cyber Command," he said in a statement.

"From my perch, I believe the DoD should not dual-hat the leadership of the two organizations. US Cyber Command and NSA have different authorities and missions. I believe the NSA should be supporting all combatant commands rather than being distracted by trying to be one itself," said Touhill, who is president of Cyxtera's Federal Group. 

Read the official US Cyber Command announcements here and here

 

Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
8/22/2017 | 6:44:52 AM
Step in the right direction
I agree with Greg's statement. Having dual leadership of both the NSA and the US Cyber Command could represent a conflict of interest, especially if the goal is to severe the current ties between them in the future.
New Cold Boot Attack Gives Hackers the Keys to PCs, Macs
Kelly Sheridan, Staff Editor, Dark Reading,  9/13/2018
Yahoo Class-Action Suits Set for Settlement
Dark Reading Staff 9/17/2018
RDP Ports Prove Hot Commodities on the Dark Web
Kelly Sheridan, Staff Editor, Dark Reading,  9/17/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Flash Poll
How Data Breaches Affect the Enterprise
How Data Breaches Affect the Enterprise
This report, offers new data on the frequency of data breaches, the losses they cause, and the steps that organizations are taking to prevent them in the future. Read the report today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-3912
PUBLISHED: 2018-09-18
Bypassing password security vulnerability in McAfee Application and Change Control (MACC) 7.0.1 and 6.2.0 allows authenticated users to perform arbitrary command execution via a command-line utility.
CVE-2018-6690
PUBLISHED: 2018-09-18
Accessing, modifying, or executing executable files vulnerability in Microsoft Windows client in McAfee Application and Change Control (MACC) 8.0.0 Hotfix 4 and earlier allows authenticated users to execute arbitrary code via file transfer from external system.
CVE-2018-6693
PUBLISHED: 2018-09-18
An unprivileged user can delete arbitrary files on a Linux system running ENSLTP 10.5.1, 10.5.0, and 10.2.3 Hotfix 1246778 and earlier. By exploiting a time of check to time of use (TOCTOU) race condition during a specific scanning sequence, the unprivileged user is able to perform a privilege escal...
CVE-2018-16515
PUBLISHED: 2018-09-18
Matrix Synapse before 0.33.3.1 allows remote attackers to spoof events and possibly have unspecified other impacts by leveraging improper transaction and event signature validation.
CVE-2018-16794
PUBLISHED: 2018-09-18
Microsoft ADFS 4.0 Windows Server 2016 and previous (Active Directory Federation Services) has an SSRF vulnerability via the txtBoxEmail parameter in /adfs/ls.