US Intel Leaders “It’s time to be Data Serious”

The US Government says it’s time to get serious about data, how it is collected, curated, and capitalised by humans and machines, otherwise the country could lose its intelligence edge, the Office of the Director of National Intelligence says in a new 3-year Data Strategy Report.

Senior Management of the Senate Intelligence Committee has recently said that Congress has been making a “serious effort” to address emerging technologies, like Artificial Intelligence (AI) and Quantum Computing, but “whether it is enough is something that we really need to ask ourselves.”

“To bridge the gap between where we are today and optimising for the future, we have taken a step back to see what we need to do as a Community to accelerate our data and digital transformation over the next three years so that end-to-end data management is core to what we do and not seen as merely an enabling function,” says The IC (Intelligence Community) Data Strategy 2023-2025.

“To date, we have not significantly prioritised data as a strategic and operational [intelligence community] asset. The central challenge remains that the IC is not fielding data, analytics, and AI enabled capabilities at the pace and scale required to preserve our decision and intelligence advantage,” the document said.

To fix that, the IC wants to fine-tune the “data flow lifecycle from collection and acquisition, to transporting, ingesting, curating, exploiting, disseminating, and disposing of IC data.”

The strategy outlines four main goals: improve data management, ensure data is human and AI-ready with new services and tools, directly work with the private sector and academia, and develop intelligence officers who are fluent in how data works.

The ODNI’s strategy calls for automation to prepare and label data to reduce the time it takes to absorb datasets from days to minutes.

Also, every time data is collected or bought, intel agencies will have to lay out how it will be transported, ingested, curated, exploited, disseminated, and disposed of “with consideration for its ethical and appropriate use, consistent with law and policy,” according to the strategy.

That type of data management will help solidify “minimum common standards for the use, protection, dissemination, interoperability, and generation of IC data.”

Bolstering partnerships is another key pillar of the strategy, which could help with not having a full data workforce.

“Data acumen has to become a core skill for every member of the workforce, not just for data professionals. The workforce and supporting contractors need to know, understand, and value data utilisation and sharing for mission value and insight,” the document said.

But there’s still the need for people who can make that happen.

“How do we work across, not only inside our buildings, but across the IC, across the US government, swith our industry academic partners, so that we can really bring the best of what there is to bear in support of our mission,” said Lakshmi Raman, the Central Intelligence Agency’s director of AI innovation, during a panel discussion at the Intelligence and National Security Summit recently.
 
“We don't have enough resources to do everything that we need to do.”

Defense One:     DRI:     Meri Talk:     United States Senate:     ExecutiveGov:     DRI

 

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible

« JumpCloud Says Nation-State Hackers Hit Specific Customers
Software Faults Ground F-35 Warplanes »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Lumeta

Lumeta

Lumeta’s cyber situational awareness platform is the unmatched source for enterprise network infrastructure analytics and security monitoring for breach detection.

QASymphony

QASymphony

QASymphony software testing and QA tools help companies create better software by improving speed, efficiency and collaboration during the testing lifecycle.

Sucuri

Sucuri

Sucuri have offered holistic website security solutions since 2008 including malware removal, malware monitoring and website protection services.

Ambersail

Ambersail

Ambersail provide Penetration Testing and Cyber Security Compliance services.

Fidelis Security

Fidelis Security

Fidelis Security is a leading provider of extended threat detection and response (XDR) solutions for your security operations.

Secnology

Secnology

Secnology is dedicated to developing and providing the most powerful and user friendly event analysis and security management solution.

PECB

PECB

PECB is a certification body for persons, management systems, and products on a wide range of international standards in a range of areas including Information Security and Risk Management.

Excelerate Systems

Excelerate Systems

Excelerate Systems is a leading provider of IT services with a focus on Big Data, Cloud Services and Security.

Research Institute in Verified Trustworthy Software Systems (VeTSS)

Research Institute in Verified Trustworthy Software Systems (VeTSS)

The main purpose of VeTSS is to support program analysis, testing and verification, to achieve guarantees of software correctness, safety, and security.

Mitiga

Mitiga

Mitiga uniquily combines the top cybersecurity minds in Incident Readiness and Response with a cloud-based platform for cloud and hybrid environments.

Fortiedge

Fortiedge

Fortiedge is an IT Security solution provider specializing in Cyber Security practices and solutions for our clients.

Secora Consulting

Secora Consulting

Secora Consulting is a professional services company specialising in tailored cybersecurity assessments and cyber advisory services.

NPCERT

NPCERT

NPCERT is a team of Information Security experts formed to address the urgent need for the protection of national information and growing cybersecurity threat in Nepal.

CXI Solutions

CXI Solutions

CXI Solutions: Your trusted partner in cybersecurity. We offer a full range of cybersecurity solutions to protect your business from digital attacks and virtual threats.

Millennium Corporation

Millennium Corporation

For nearly two decades, Millennium Corporation has been operating on the leading edge of cybersecurity.

Wattlecorp Cybersecurity Labs

Wattlecorp Cybersecurity Labs

Wattlecorp Cybersecurity Labs are a group of IT security specialists, ethical hackers, and researchers driven to identify security flaws before cyber threat actors does.