Crossroads Blog | CYBER SECURITY LAW AND POLICY

Cybersecurity, DOD, Legislation, NSA, regulation

Cyber Round Up: NSA Planning Reorganization; U.S. Looking to Relax Software Export Regulation; Defense Secretary Highlights Tech Priorities for 2017

  • NSA Planning Reorganization (The Washington Post): The National Security Agency (“NSA”) is reportedly planning a reorganization, according to The Washington Post. The article suggests that the reorganization, referred to as “NSA21”, will be publicly announced soon. The reorganization is focused on breaking down walls between organizations within the agency and developing a more collaborative environment, the article explained. According to the article, the offensive and defensive organizations will be merged to allow them to better adapt to changing threats. The full article can be found here.
  • U.S. Looking to Relax Software Export Regulation (WSB-TV): According to an article from WSB-TV, the U.S. government is planning to ease arms control rules concerning the export of software that have the potential to be used for hacking and surveillance because they have legitimate uses, such as securing computer networks. The article reported that the proposed changes have the support of the White House. The language of the proposed rule is broad, according to those who oppose the rule, and would result in “unintended negative consequences for national cybersecurity and research,” the article explained. The full article can be found here.
  • Defense Secretary Highlights Tech Priorities for 2017 (Federal Times): U.S. Secretary of Defense Ash Carter identified the major theme underlying the defense budget for FY2017, according to the Federal Times. The article reported that Secretary Carter emphasized the “technological edge as a major theme.” Included in the budget is a $7 billion fund for investment in cyber for 2017, and then about $35 billion over the next five years, specified the article. The cyber fund will be used to improve the DoD’s network defenses, provide more training for cyber warriors, and develop cyber tools, including those that can be used offensively, according to the article. The full article can be found here.

Leave a Reply