Skip to content
Search

Latest Stories

Welcome! Log in to stay connected and make the most of your experience.

Input clean

Cutting Cyber Command’s Umbilical Cord to the NSA

Despite the many logistical and operational challenges of a transition, many acknowledge that U.S. Cyber Command must eventually separate from the National Security Agency. According to news reports, the Trump Administration is now finalizing plans to separate Cyber Command from its parent organization, the National Security Agency. While the details of the reorganization are still being worked out, an official decision could be announced in the coming weeks. In March, The Cipher Brief spoke with General Michael Hayden, former director of both the NSA and CIA, about how Cyber Command came about, the different roles and authorities between the NSA and Cyber Command, and why they must eventually be separated.

The Cipher Brief: How did U.S. Cyber Command come to be and what strategic role does it play in cyberspace?

Keep reading...Show less
Access all of The Cipher Brief’s national security-focused expert insight by becoming a Cipher Brief Subscriber+ Member.

Related Articles

The Houthi Balancing Act After Israel’s Attack on Iran

OPINION — How will the Houthis respond to the devastating Israeli strikes on Iran? This moment could prove decisive for both the Iran-led axis and [...] More
The Attack that Knocked Back Iran’s Nuclear Program

The Attack that Knocked Back Iran’s Nuclear Program

EXPERT INTERVIEW — Israeli airstrikes against targets associated with Iran’s nuclear program early Friday have seemingly dealt a devastating blow as [...] More

Dead Drop: June 13

SHOULD GREENLAND AND PANAMA BE (EVEN MORE) NERVOUS: Defense Secretary Pete Hegseth was engaged in a war of words this week with lawmakers during a [...] More
Report for Friday, June 13, 2025

Report for Friday, June 13, 2025

9:07 AM America/New_York Friday, June 13 [...] More

China Wants Our Hearts. Literally.

OPINION — China is pre-positioning itself on U.S. networks for disruptive and destructive attacks against our critical infrastructure. In the past [...] More