New Authorities for Military Cyber Operations and Surveillance, Including TMA? – Lawfare (blog)

CERT-LatestNews Malware ThreatsCybercrime ThreatsStrategic

Note that this is not a blank check from Congress; the statute says there must be appropriate authorization from another source. That means any such operation must be authorized as a separation-of-powers matter— either in the sense that it is within the inherent Article II authority of the commander….