NSA had cyber-attack authority since 1997

You wouldn't really know it from reading press accounts about cyber-warfare, but the National Security Agency has been the executive agent for precisely that capability since 1997, according to newly declassified documents. "Executive agent" is the government's term for "the entity that does the stuff." "Capability" is the government's way of saying "weapon."

In 1997, the following fact was classified as "SECRET," releasable to a few U.S. allies. "On 3 March 1997, the Secretary of Defense officially delegated to the National Security Agency the authority to develop computer network attack techniques." William Black, who held the title of "Special Assistant to the Director for Information Warfare," noted that the new authority "is sure to be a catalyst for major changes in the NSA's processes and its workforce." Actually, it was a "third dimension" to the NSA's dual mission: To make and break codes, and to steal signals.

Another SECRET fact simply notes that computer network protection (we call it "defense" now), exploitation (or, basically, spying on a network), and attack are to be exercised in concert. One cannot "do" one without thinking about all three.

The Week

Escape your echo chamber. Get the facts behind the news, plus analysis from multiple perspectives.

SUBSCRIBE & SAVE
https://cdn.mos.cms.futurecdn.net/flexiimages/jacafc5zvs1692883516.jpg

Sign up for The Week's Free Newsletters

From our morning news briefing to a weekly Good News Newsletter, get the best of The Week delivered directly to your inbox.

From our morning news briefing to a weekly Good News Newsletter, get the best of The Week delivered directly to your inbox.

Sign up

Interestingly, the NSA also surmised at the time that its own perception as "the bad guy," along with legislation limiting what it can do vis-a-vis computers that don't belong to the government, would make it harder to become a cyber mission force. They were damned right. Information Warfare, however, would now take the form of "digital coercion," where enemy public infrastructure systems were fair game for attack. (That fact was also classified SECRET).

By the way, whenever you see the phrase "INTEGRATED JOINT SPECIAL TECHNICAL OPERATION" in a government document, you're probably seeing a reference to very elaborate information warfare and cyber-exploitation techniques used by the CIA and the NSA. "IJSTO" is the unclassified euphemism of choice for that stuff.

Marc Ambinder is TheWeek.com's editor-at-large. He is the author, with D.B. Grady, of The Command and Deep State: Inside the Government Secrecy Industry. Marc is also a contributing editor for The Atlantic and GQ. Formerly, he served as White House correspondent for National Journal, chief political consultant for CBS News, and politics editor at The Atlantic. Marc is a 2001 graduate of Harvard. He is married to Michael Park, a corporate strategy consultant, and lives in Los Angeles.