Cybersecurity

Langevin presses Trump for details on cyber ops

Shutterstock ID 1041857944 By Lagarto Film 

Rep. Jim Langevin (D-R.I.), chair of the House Armed Services Subcommittee on Emerging Threats and Capabilities, publicly blasted the Trump administration for neglecting to brief Congress on how the U.S. military is using expanded offensive cyber authorities.

Langevin and other HASC leaders from both parties wrote to President Trump in February requesting a copy of National Security Presidential Memorandum (NSPM) 13 which outlined the new authorities being assumed by the administration. That letter was first reported by the Wall Street Journal on Wednesday.

Last year, the administration rescinded Presidential Policy Directive 20 drafted under President Barack Obama, which laid out a complex interagency process for approving U.S. offensive cyber operations. The White House replaced that policy with NSPM 13, which National Security Advisor John Bolton said would no longer "tie the hands" of the military when it came to striking back at foreign cyber threats.

Since then, U.S. Cyber Command has executed at least two publicly known operations against Russian intelligence agencies and another against Iranian rocket and missile computer systems, but has thus far refused to let members of Congress read the document or brief them on the new policy.

Langevin's office told FCW in June that the White House's continued refusal to share documents detailing how the military was conducting sensitive operations in cyberspace "impedes Congress's ability to ensure both law and policy are followed."

"Congress has a vital role to play in ensuring any offensive cyber operations do not inadvertently undermine that stability and reflect our commitments to responsible state behavior in this new domain," Langevin said in a statement put out hours after the story published. "Unfortunately, the White House has continually stymied our attempts to conduct this Constitutionally protected oversight, refusing to provide important policy documents that took effect nearly a year ago."

Langevin also introduced an amendment to the National Defense Authorization bill that would give the administration 30 days to hand over copies of all National Security Presidential Memorandums relating to Department of Defense operations in cyberspace.

"I expect these documents to be provided immediately, or else we will take measures to require them by law," Langevin continued in his statement. "Defending our nation in cyberspace requires close collaboration between the legislative and the executive branches, and I am deeply disappointed that the president refuses to work with us on this vital issue."

About the Author

Derek B. Johnson is a senior staff writer at FCW, covering governmentwide IT policy, cybersecurity and a range of other federal technology issues.

Prior to joining FCW, Johnson was a freelance technology journalist. His work has appeared in The Washington Post, GoodCall News, Foreign Policy Journal, Washington Technology, Elevation DC, Connection Newspapers and The Maryland Gazette.

Johnson has a Bachelor's degree in journalism from Hofstra University and a Master's degree in public policy from George Mason University. He can be contacted at djohnson@fcw.com, or follow him on Twitter @derekdoestech.

Click here for previous articles by Johnson.


Featured

  • Congress
    Rep. Jim Langevin (D-R.I.) at the Hack the Capitol conference Sept. 20, 2018

    Jim Langevin's view from the Hill

    As chairman of of the Intelligence and Emerging Threats and Capabilities subcommittee of the House Armed Services Committe and a member of the House Homeland Security Committee, Rhode Island Democrat Jim Langevin is one of the most influential voices on cybersecurity in Congress.

  • Comment
    Pilot Class. The author and Barbie Flowers are first row third and second from right, respectively.

    How VA is disrupting tech delivery

    A former Digital Service specialist at the Department of Veterans Affairs explains efforts to transition government from a legacy "project" approach to a more user-centered "product" method.

  • Cloud
    cloud migration

    DHS cloud push comes with complications

    A pressing data center closure schedule and an ensuing scramble to move applications means that some Homeland Security components might need more than one hop to get to the cloud.

Stay Connected

FCW INSIDER

Sign up for our newsletter.

I agree to this site's Privacy Policy.