Dramatic Improvement in Intelligence Sharing Because of ISIS

European countries are voluntarily providing the United States with large amounts of information about their citizens, particularly as those citizens attempt to travel, the nation's top counterterrorism official said.

ObamaCompared to the summer of 2013, US intelligence professionals have seen a "pendulum swing" in the willingness of European law enforcement to share information with the United States on European citizens, said Nicholas J. Rasmussen, director? of the National Counterterrorism Center, or NCTC, on Wednesday.

Things have turned around since summer 2013, when NSA contractor Edward Snowden first disclosed some of the nations closely kept secrets on surveillance capabilities. Rasmussen said that "the politics are difficult for some of our European partners" but tracking Islamic State fighters, or ISIS, has become a priority.

Rasmussen, before the House Committee on Homeland Security, said that European partners continue to differ form US counterparts on the issue of bulk metadata collection. But European reservations about data sharing in more targeted investigations had "seen a dramatic improvement," particularly in populating the NCTC's database, called the Terrorist Identities Datamart Environment, or TIDE. It is one of the key person-of-interest watch lists that the US and other countries use to track potential or suspected terrorists.

Thanks in part to better collaboration, he said, the Turkish "banned from entry list" now includes 10,000 individuals who are primarily European citizens. Turkey is seen as the most direct route that foreign fighters in Europe use to join ISIS in Iraq and Syria.

More than 20,000 fighters have flocked to Syria and Iraq to join ISIS, including 3,400 from Western countries and 150 Americans, according to previously-submitted written testimony from Rasmussen, first obtained by the Associated Press.

Many security experts and even some Navy SEALs argue that encryption keeps the nation safer from cyber attacks by keeping user information more secure.

http://www.defenseone.com/technology/2015/02/dramatic-improvement

« Cybercrime and the value of personal data
Cyber Soldiers: UK Announces Creation Of The 77th Battalion »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

ZDL Group

ZDL Group

At ZDL (formerly ZeroDayLab) we take a comprehensive view of our clients cyber security risks and provide quality services to address those risk

Fortify Experts

Fortify Experts

Fortify Experts is a search and recruitment firm specializing in Cyber Security.

Seceon

Seceon

Seceon OTM, is a cyber security advanced threat management platform that visualizes, detects, and eliminates threats in real time.

BioCatch

BioCatch

BioCatch uses behavioral biometrics for fraud prevention and detection. Continuous authentication for web and mobile applications to prevent new account fraud.

exceet Secure Solutions

exceet Secure Solutions

exceet Secure Solutions is your experienced specialist for Internet of Things (IoT), Heath Telematics, electronic signatures and timestamps and IT security.

National Cyber Security Authority (NCA) - Saudi Arabia

National Cyber Security Authority (NCA) - Saudi Arabia

The NCA is the government entity in charge of cybersecurity in Saudi Arabia and serves as the national authority on its affairs.

Span

Span

Span designs, develops and maintains information systems based on advanced technological solutions of global IT leaders.

Nucleon

Nucleon

Nucleon enables cybersecurity tools, organizations and software developers to become proactive by blocking threats before they become breaches.

Altipeak Security

Altipeak Security

Altipeak Security provide Safewalk - a flexible and robust authentication platform through which we offer improved security to SMBs, corporates, banks, insurance companies, healthcare and more.

PQShield

PQShield

PQShield are specialists in Post-Quantum Cryptography. We provide quantum-secure cryptographic solutions for software, software/hardware co-design and data in transit.

HMS Networks

HMS Networks

HMS stands for Hardware meets Software. Our technology enables industrial hardware to communicate and share information with software and systems.

Deeper Network

Deeper Network

Deeper Network represents the world's first decentralized blockchain network for building a truly private, secure and fair Internet.

Exceed Cybersecurity & I.T. Services

Exceed Cybersecurity & I.T. Services

Exceed Cybersecurity & I.T. Services is a premier Managed Internet Technology (I.T.) company with a focus in cybersecurity risk management and CMMC compliance management.

Bright Data

Bright Data

Bright Data Inc is the world’s #1 web data platform, enabling organizations to research, monitor, analyze data, and make better decisions.

Securadin

Securadin

Securadin - Defending Your Data Security. We will assist you in learning how to maintain the confidentiality, integrity, and availability of your organization's assets.

HYCU

HYCU

HYCU was born of the need to simplify data protection and provide equivalent levels of backup and recovery support across on premises, public cloud, and SaaS workloads.