recommended reading

Defense to Weigh Civilian Cyber Militia

Defense Secretary Chuck Hagel is to evaluate the plan.

Defense Secretary Chuck Hagel is to evaluate the plan. // Defense Department

Congress has mandated that Defense Secretary Chuck Hagel evaluate the practicality of hiring part-time nonmilitary employees to help the National Guard thwart cyberattacks.

Some states and other nations, including Estonia, already have volunteer netwarfare squads poised to protect networks controlling oil reserves, subways and other critical infrastructure in times of crisis.

The corps outlined in the 2014 National Defense Authorization Act that lawmakers approved on Thursday night would recruit "non-dual technicians," or National Guard personnel who are not required to deploy overseas. Dual-status employees must be uniformed military members and maintain their Defense Department ranks and assignment units. 

The legislative text calls for "an assessment of the appropriateness of hiring on a part-time basis non-dual status technicians who possess appropriate cyber security expertise for purposes of assisting the National Guard in protecting critical infrastructure and carrying out cyber missions."

Earlier this year, House and Senate members from both parties introduced legislation that would stand up a National Guard "Cyber and Computer Network Incident Response Team" -- or Cyber Guard -- in every state. Officials with the National Guard Association of the United States have said they back the proposals, but note Defense officials have argued the teams might sap resources from departmental cyber activities. 

There have been concerns about domestic extremist groups or cybersecurity contractors forming rogue bands of cyber patriots. But it does not appear that either of the Guard organizations described is structured in a way that would give rise to such cyber mercenaries. 

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.


When you download a report, your information may be shared with the underwriters of that document.