Posted on 06/10/2013 9:57:12 AM PDT by EveningStar
On Fox News Sunday, Weekly Standard Editor Bill Kristol cautioned against conflating the various Obama scandals with the new revelations of NSA surveillance.
"Conservatives and Republicans are making a huge mistake," Kristol predicted.
(Excerpt) Read more at mediaite.com ...
This Snowden thing is really helping separate the wheat from the statist chaff.
Bill:
Uhm no.
The IRS scandal is but one symptom of a government gone ammock.
Fact is, the IRS will feed your info to other agencies. Further, the other agencies are creating their own Db’s and they are sharing their information and conclusion.
Hmmmm... there’s that $25 dollar word ‘conflate’ again. Now where have I seen that before?
Bill Gates quit college too, and look what happened to him.
Even someone as dim witted as I cannot help but think, if the regime used the IRS against conservatives for political gain, what is to stop them from using the NSA? Glad Bill has set me straight.
This sort of abuse is the Obama signature...not an aberration.
What went on at the IRS is SOP...that abuse would take an exponential leap forward with access to NSA data.
And not to rant on, but clearly this administration does not consider the enemy of this country to be Islamic terrorists but its own citizens...how can any NSA program NOT go awry with that kind of foundational premise.
They wouldn’t be able to justify domestic spying if our borders were protected and we weren’t importing terrorists.
The government that abused the IRS surely will abuse the NSA.
(Why are we surrounded in the media by so many dimwits?)
“Mary Matalin allowed James Carville to breed.”
And sadly those children got the worst of both parents genetics. Matalin used to bring them to the Sunday News Shows to “show them off.”
Nevermind. Bill would like to apologize. He got conflate mixed up with NeoConFellatio, something he’s been gifting Democrat policy makers for years.
Kristol is a fool...if the shoe was on the other foot, the dems would have already started impeachment procedures.
Obama has no respect for privacy.
Any Republican who does not understand this point needs to be shouted down.
Considering the obvious hatred the GOPe feels for the tea party, its not hard to believe that they would happily use those same agencies against us.
Could it be any clearer? Seriously!
Someone, PLEASE, tell Mr. Kristol to STFU.
M EMORANDUM OF AGREEMENT
B ETWEEN
T HE D EPARTMENT OF HOMELAND SECURITY
AND
THE DEPARTMENT OF DEFENSE
REGARDING CYBERSECURITY
1. PARTIES. The parties to this Agreement are the Department o f Homeland Security
(DHS) and the Department o f Defense (DoD).
2. AUTHORITY. This Agreement is authorized under the provisions o f the Homeland
Security Act (2002); the Economy Act; U.S. Code Title 10; Executive Order 12333;
National Security Directive 42; Homeland Security Presidential Directive-5; Homeland
Security Presidential Directive-7; and National Security Presidential Directive
54/Homeland Security Presidential Directive-23.
3. PURPOSE. The purpose o f the Agreement is to set forth terms by which DHS and DoD
will provide personnel, equipment, and facilities in order to increase interdepartmental
collaboration in strategic planning for the Nation’s cybersecurity, mutual support for
cybersecurity capabilities development, and synchronization o f current operational
cybersecurity mission activities. Implementing this Agreement w ill focus national
cybersecuri ty efforts, increasing the overal I capacity and capabil i ty o f both DHS’ s
homeland security and D oD’s national security missions, while providing integral
protection for privacy, civil rights, and civil liberties.
4. SCOPE. DoD and DHS agree to collaborate to improve the synchronization and mutual
support o f their respective efforts in support o f U. S. cybersecurity. Departmental
relationships identified in this Agreement are intended to improve the efficiency and
effectiveness o f requirements formulation, and requests for products, services, technical
assistance, coordination,and performance assessment for cybersecurity missions
executed across a variety o f DoD and DHS elements. They do not alter existing DoD and
DHS authorities, command relationships, or privacy, civil liberties, and other oversight
relationships. In establishing a framework to provide mutually beneficial logistical and
operational support, this Agreement is not intended to replicate or aggregate
unnecessarily the diverse line organizations across technology development, operations,
and customer support that collectively execute cybersecurity missions.
5. RESPONSIBILITIES.
A . Department o f Homeland Security.
1) Identify and assign, in coordination with the Departmenf o f Defense, a DHS
Director, Cybersecurity Coordination who will be in the National Protection and
CLEARED
For Open publication 1
10
OCT 1 3 ZOW
II - S-0/23
Office of Security Review
De artment of Defense
P rograms D irectorate and will be located at the National Security A gency ( NSA)
but will not be in the N SA c hain o f c ommand. T his i ndividual will also act as the
DHS S enior C ybersecurity Representative to U.S. C yber C ommand
( USCYBERCOM).
2) Receive 0 00 r equests for cybersecurity s uppott a nd c onsider 0 00 r equirements,
as appropriate and consistent with applicable law and DHS m ission r equirements
and authorities, related to operational p lanning a nd m ission c oordination.
3) Identify qualified D HS p ersonnel to perfom1 DHS functions under the sole
supervision and direction o fDHS o flicials as follows:
a. A ssign D HS personnel to w ork at N SA as part o f a J oint C oordination
E lement ( JCE) performing the functions o f joint o perational planning,
coordination, synchronization, r equirement t ranslation, and o ther D HS
m ission s upport f or homeland security for cybersecurity under the direct
supervision o f the Director, Cybersecurity C oordination;
b. A ssign p ersonnel to w ork at the N SA D irectorate o f A cquisition for .
collaborative acquisition and t echnology d evelopment;
c. Assign o r d etail, as appropriate, personnel to w ork at the National Security
A gency/Central S ecurity Services ( NSA/CSS) T hreat O perations C enter
( NTOC) to p romote j oint o perational planning, coordination, synchronization,
r equirement t ranslation, and other DHS m ission suppOl1 for h omeland s ecurity
for cybersecurity; and
d. Assign representatives from the Office o f the General Counsel, Privacy
O ftice, and the Office for Civil Rights and Civil Liberties to s upport t he D HS
D irector, C ybersecurity C oordination, at N SA, a nd coordinate with the 0 00
c ountcrparts identified in p aragraph B.2.d.
4) E nsure t hat D HS p ersonnel have current security clearances (TS/SCI) upon
a ssignment to N SA, i ncluding training on the appropriate handling and
dissemination o f c lassified and sensitive information in a ccordance w ith D oD,
I ntelligence C ommunity and N SA r egulations.
5) Provide funding for DHS mission requirements, salaries, and training unique to
D HS p ersonnel for a ssignments u nder paragraph 5.A.3.
6) Provide appropriate access, administrative support, and space for an N SA
C ryptologic Services G roup ( CSO) a nd a U SCYBERCOM C yber S upport
E lement ( CSE) c ollocated with the National Cybersecurity and C ommunications
I ntegration C enter ( NCCIC), at D HS, a nd integration into D HS’s c ybersecurity
operational activities. D HS \ViII p rovide all necessary D HS e quipment a nd
connectivity to p ermit b oth C SG a nd C SE e ntities the capability to carry o ut their
respective roles and responsibilities.
7) D HS D irector, Cybersecurity Coordination.
a. P rovide r equests for cybersecurity planning, technology, and w here
a ppropriate o ther s upport to N SA a nd U SCYBERCOM a nd a dvocate for s uch
r equests based o n D HS requirements to protect Federal E xecutive b ranch,
n on-DoD, n on-national security systems, and U.S. critical infrastructure and
key resources.
b. C onvey to and coordinate within D HS a ny N SA a nd U SCYBERCOM
r equests for s upport o r r equirements regarding cybersecurity operations.
2
c. Participate in a nd lead, as appropriate, j oint p lanning and other processes.
d. P romote and facilitatc strong c ommunications b etween D HS a nd D oD s enior
leadership, including that o f N SA, o n cybersecurity matters o f joint interest,
including engaging in j oint o perational p lanning a nd m ission c oordination.
e. Maintain cognizance o f D HS and, as appropriate, o f D oD, N SA, a nd
U SCYBERCOM c ybersecurity activities, to assist in deconfliction and
p romote s ynchronization o f t hose activities.
f. A ssist in coordinating D oD a nd D HS e fforts to improve cybersecurity threat
information s haring b etween the public and private sectors to aid in
preventing, detecting, mitigating, and/or recovering from the effects o f an
attack, interference, compromise, o r i ncapacitation related to homeland
security and national security activities in cyberspace.
B. Department o f D efense.
1) D irect the Director o fNSA ( DIRNSA) and C ommander, U SCYBERCOM, to
undertake collaborative activities and provide cybersecurity support envisioned in
this a greement and s ubsequent i mplementing a greements.
2) National Security Agency.
a. A ssign a n N SA S ES-equivalent to serve as the N SA lead to the Joint
C oordination E lement (JCE). This N SA o fticial will coordinate and work with
the D HS D irector, Cybersecurity Coordination in carrying out the activities o f
t he J oint Coordination Element. This N SA o fficial will not be in the D HS
c hain o f c ommand, and his OT h er performance ratings will be prepared by
N SA with input from the DHS Director, Cybersecurity Coordination. This
N SA official will supervise and direct all N SA p ersonnel assigned to the JCE.
b. R eceive and coordinate D HS r equests for cybersecurity support and consider
D HS r equirements, as appropriate and consistent with applicable law and
N SA m ission requirements and authorities, in operational planning and
mission coordination.
c. Provide appropriate access, facilities, and administrative support (including
necessary e quipment and connectivity) to support the Director, Cybersecurity
Coordination and D HS p ersonnel assigned o r d etailed to the three entities
listed below. N SA will provide all necessary N SA e quipment a nd connectivity
to p ermit D HS p ersonnel with the capability to c arry o ut their roles and
responsibilities.
i. N SA D irectorate o f A cquisition
J oint Coordination Element to be located at N SA
11.
N SNCSS T hreat O perations Center
111.
d. I dentify representatives from its Office o f t he General Counsel and Privacy
Office to work with counterparts at 0 00, U SCYBERCOM, a nd D HS to
support the i mplementation o f this Agreement.
e. Collocate a Cryptologic Services G roup at the N CCIC a t D HS, fOT s upport to
and operational synchronization with D HS’s c ybersecurity operations and the
National C yber I ncident Response Plan (NCIRP).
f. A ssign or detail qualified personnel in a ccordance with this A greement b oth
to serve in J CE p ositions and in C SG p ositions as mutually agreed.
3
g. E ngage with DHS and U SCYBERCOM i njoint o perational planning and
mission coordination.
h. P rovide funding for N SA m ission requirements, salaries and training unique
to N SA for personnel identified in B.2.c.
3) U SCYBERCOM.
a. R eceive DHS requests for cybersecurity s upport a nd c onsider D HS
requirements, as appropriate and consistent with applicable l aw a nd
U SCYBERCOM m ission requirements and authorities, in operational
planning and mission coordination.
b. C ollocate a C yber S upport E lement a t the N CCIC at D HS, for support to a nd
operational synchronization with D HS’s c ybersecurity operations and the
N CIRP.
c. A ssign qualified personnel to C SE p ositions.
d. As needed to implement this Agreement, provide, on a reimbursable basis,
appropriate access, administrative support and space for DHS personnel.
e. Provide funding for U SCYBERCOM m ission requirements and training
unique to its personnel during the assignment.
f. E ngage with D HS a nd N SA in j oint o perational p lanning a nd mission
coordination.
C. J oint D oD-DHS.
1) S ynchronize the roles and relationships o f the proposed D oD I ntegrated C yber
C enter (ICC) and the current D BS N ational Cybersecurity and C ommunications
I ntegration Center (NCCIC).
2) D evelop a genda o f a ppropriate supporting actions, including consideration o f t he
establishment o f a J oint Program Office (JPO).
3) Develop j ointly a ppropriate agreements, including necessary funding
mechanisms, to i mplement the objectives and responsibilities o f this Agreement
pursuant to applicable authority.
6. O VERSIGHT. T o oversee the activities described in the p receding p aragraphs, the
Deputy Secretary o f H omeland S ecurity and the Deputy Secretary o f D efense will
conduct monthly oversight meetings suppo11ed by the DHS Deputy U nder S ecretary,
National Protection and Programs Direclorate ( NPPD); t he Principal Deputy U nder
S ecretary o f D efense for Policy and the Director o fNSAlCommander, U SCYBERCOM.
7. P OINTS OF C ONTACT.
P hilip Reitinger James N. Miller
Principal Deputy Under Secretary
Deputy U nder S ecretary
National Protection and o f D efense for Policy
D epartment o f D efense
Programs Direclorate
2100 D efense Pentagon
Department o f H omeland S ecurity
Washington, D C 20528 W ashington, D C 2 0301-2100
(703) 2 3 5 . (703) 6 9 7 .
4
8. O THER P ROVISlONS. N othing in t his A greement is i ntended to conflict with law,
regulation, Presidential order o r d irective, or the directives o f D HS o r D oD. I f a t erm o f
t his Agreement is inconsistent with such authority, then that term shall be invalid, but the
remaining t erms and conditions o f this Agreement shall remain in full force and effect.
This Agreement shaH be interpreted and implemented in a m anner t hat respects and
complies with (and does not abrogate) the statutory and regulatory responsibilities o f the
Secretary o f H omeland Security and the Secretary o f D efense. T his A greement d oes not
obligate funds.
9. E FFECTIVE D ATE. This Agreement is effective upon signature o f b oth parties.
10. M ODIFICATION A ND R EVIEW. T his A greement m ay be modified upon the mutual
written consent o f t he parties. This Agreement will be reviewed b y the parties after o ne
year.
11. T ERMINATION. T he t erms o f this Agreement, as modified with the, consent o f b oth
parties, ,,,,ill r emain in effect untiltem1inated. Either party upon 30 days written notice to
the o ther pm1y m ay t erminate this Agreement.
A PPROVED BY:
Robert Gates
Janet Napolitano
Secretary o f D efense
Secretary o f H omeland S ecurity
5
A distinction without a difference - especially given who the President is.
Crystal is a colossal mistake, but then he works for Rove Media Services, Inc, aka FOX News.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.