FAS

CRS Views the Cybersecurity Initiative

03.12.09 | 2 min read | Text by Steven Aftergood

The Comprehensive National Cybersecurity Initiative (CNCI) that was established by classified presidential directive (NSPD 54 and HSPD 23) in January 2008 is deliberately opaque, and there is little specific information in the public domain about its conduct or performance to date.

“Much remains unknown about the CNCI due to the classified nature of the presidential directives and supporting implementation documents,” says a new report (pdf) from the Congressional Research Service.

But the CRS report summarizes what has been disclosed, and illuminates many of the ensuing questions raised by the Initiative.  These include the extent of its underlying legal authority; the respective roles of the executive and legislative branches on cybersecurity; the involvement of the private sector; the impact of privacy considerations; and even the possibility that offensive or defensive cybersecurity activities would fall into the category of “covert action.”

See “Comprehensive National Cybersecurity Initiative: Legal Authorities and Policy Considerations,” March 10, 2009.

“A chief concern” about the Initiative, the Senate Armed Services Committee declared last year, “is that virtually everything about [it] is highly classified, and most of the information that is not classified is categorized as `For Official Use Only’.”

“These restrictions preclude public education, awareness, and debate about the policy and legal issues, real or imagined, that the initiative poses in the areas of privacy and civil liberties. Without such debate and awareness in such important and sensitive areas, it is likely that the initiative will make slow or modest progress. The committee strongly urges the administration to reconsider the necessity and wisdom of the blanket, indiscriminate classification levels established for the initiative.” (“Cyber Security Initiative is Too Secret, SASC Says,” Secrecy News, May 15, 2008.)

On February 9, 2009 President Obama ordered a 60-day review of cybersecurity policy.

publications
See all publications
Global Risk
Blog
The Pentagon’s (Slimmed Down) 2025 China Military Power Report

On Tuesday, December 23rd, the Department of Defense released its annual congressionally-mandated report on China’s military developments, also known as the “China Military Power Report,” or “CMPR.” The report is typically a valuable injection of information into the open source landscape, and represents a useful barometer for how the Pentagon assesses both the intentions and […]

01.09.26 | 7 min read
read more
Global Risk
Report
On the Precipice: Artificial Intelligence and the Climb to Modernize Nuclear Command, Control, and Communications

Successful NC3 modernization must do more than update hardware and software: it must integrate emerging technologies in ways that enhance resilience, ensure meaningful human control, and preserve strategic stability.

01.08.26 | 2 min read
read more
Global Risk
Blog
What’s New for Nukes in the New NDAA?

The FY2026 National Defense Authorization Act (NDAA) paints a picture of a Congress that is working to both protect and accelerate nuclear modernization programs while simultaneously lacking trust in the Pentagon and the Department of Energy to execute them.

12.18.25 | 5 min read
read more
FAS
Blog
“I’ve always been around people who make a living by caring”: an interview with Impact Fellow John Whitmer

For Impact Fellow John Whitmer, working in public service was natural. “I’ve always been around people who make a living by caring.”

12.18.25 | 3 min read
read more