Debating the future of cyber


Sen. Angus King (I-Maine), co-chair of the newly established Cyberspace Solarium Commission, said the group is currently determining how best to structure itself and allocate resources as it seeks to explore three visions for defending U.S. interests in cyberspace.

The commission, chartered in the 2019 National Defense Authorization Act, is made up of 14 members drawn from federal agencies, Congress and the private sector. Rep. Mike Gallagher (R-Wis.) is the other co-chair. The commission also includes FBI Director Christopher Wray, cyber-focused lawmaker Rep. Jim Langevin (D-R.I.), Sue Gordon the deputy director of the Office of National Intelligence, former National Security Agency Deputy Director Chris Ingles and Suzanne Spaulding, who used to lead the cybersecurity agency at the Department of Homeland Security.

Their mandate includes election meddling, 5G and economic espionage, threats against government infrastructure, the financial system, electric grid, pipelines and businesses.

The commission draws inspiration for its name and mission from Project Solarium, a 1953 body formed by President Dwight Eisenhower that debated three strategies for confronting Soviet expansion. The Cyberspace Solarium Commission plans to break into working groups focusing on offensive strategy, defensive strategy focused on deterrence, and regulating threats through global norms enforced by the international community.

"There's no central leadership and there's no policy that our adversaries -- or our allies for that matter -- can discern about what we're going to do in a particular situation, and my belief is that until we clarify that, we're going to keep getting hit," King said during a May 13 conference call with reporters.

The group's final recommendations will likely combine efforts from all three working groups. King said that separate strategies might be needed to deal with disparate threats from nation states, rogue actors and criminal organizations.

Proponents of each of the three strategic perspectives will debate the virtues of each approach at an event in September, to be followed by a final report that includes policy and legislative recommendations.

The U.S. government isn't exactly lacking in such strategies: the Trump administration, Department of Defense and Department of Homeland Security each rolled out visions for defending U.S. interests in cyberspace last year, and King said the commission will try to build on, not supplant, those strategies. While the commission isn't currently working directly with the White House, King said the group includes executive branch agency representatives, and it envisions the administration will weigh in at some point.

About the Author

Derek B. Johnson is a senior staff writer at FCW, covering governmentwide IT policy, cybersecurity and a range of other federal technology issues.

Prior to joining FCW, Johnson was a freelance technology journalist. His work has appeared in The Washington Post, GoodCall News, Foreign Policy Journal, Washington Technology, Elevation DC, Connection Newspapers and The Maryland Gazette.

Johnson has a Bachelor's degree in journalism from Hofstra University and a Master's degree in public policy from George Mason University. He can be contacted at, or follow him on Twitter @derekdoestech.

Click here for previous articles by Johnson.


  • Congress
    Rep. Jim Langevin (D-R.I.) at the Hack the Capitol conference Sept. 20, 2018

    Jim Langevin's view from the Hill

    As chairman of of the Intelligence and Emerging Threats and Capabilities subcommittee of the House Armed Services Committe and a member of the House Homeland Security Committee, Rhode Island Democrat Jim Langevin is one of the most influential voices on cybersecurity in Congress.

  • Comment
    Pilot Class. The author and Barbie Flowers are first row third and second from right, respectively.

    How VA is disrupting tech delivery

    A former Digital Service specialist at the Department of Veterans Affairs explains efforts to transition government from a legacy "project" approach to a more user-centered "product" method.

  • Cloud
    cloud migration

    DHS cloud push comes with complications

    A pressing data center closure schedule and an ensuing scramble to move applications means that some Homeland Security components might need more than one hop to get to the cloud.

Stay Connected


Sign up for our newsletter.

I agree to this site's Privacy Policy.