US Intelligence Faces A Diversity of Challenges

A family of threats ranging from nation-states to individuals acting on behalf of a terrorist group challenges the US intelligence community as it tries to prevent kinetic and digital attacks on the homeland. Traditional arenas such as terrestrial battlespaces have been joined by cyberspace as both targets and media for adversaries bent on damaging or destroying allied military forces or civilian infrastructures.

The nature of these threats and steps that must be taken to stop them were among the issues discussed at the AFCEA/INSA Intelligence and National Security Summit recently held in Washington. Presenters included the director of national intelligence; the US intelligence agency directors; the heads of individual military service intelligence; and other government and industry intelligence community leaders.

James Clapper, director of national intelligence (DNI), addressed some of the more pressing challenges facing the US intelligence community. Many come from Russian activities, which Clapper describes as “a throwback to the Cold War.” He added that the Russians are quite serious about their stake in the Arctic. The US intelligence community is at a disadvantage here. “We do not have nearly the resources we did in the Cold War to allocate to Russia,” Clapper warned.

In addition, Edward Snowden has dealt a devastating blow to US intelligence, the DNI declared. “Snowden has done untold damage to our foreign collection capabilities,” he said. “Terrorists have gone to school on his revelations.”

Michael Chertoff, former Homeland Security secretary and co-founder of The Chertoff Group, stated that al-Qaida is imitating the Islamic State of Iraq and the Levant (ISIL) by suggesting targets for its own lone wolves. John Mulligan, deputy director of the National Counterterrorism Center, added, “We’ve seen a real change in the landscape with the rise of ISIL.” The current generation of terrorists is very technologically astute, and the center is working “in a much more compressed environment.”

CIA Director John Brennan stated that the intelligence community cannot focus on just one type of terrorist threat or organization. There is no one-size-fits-all approach to combating terrorism, as any terrorist group could be moving down the timeline toward execution. Adm. Mike Rogers, USN, commander of the US Cyber Command and director of the National Security Agency, went further by saying that no group or nation-state could be identified as the greatest threat to the United States. Conditions change daily, he said.

On the domestic front, FBI Director James Comey decried a recent change in the national mood. The American people should be skeptical of government, he said, but that skepticism has become cynicism. Although Brennan admitted that the CIA definitely has made mistakes, he charged that many criticisms actually are skewed misrepresentations.

Each agency is taking a different approach to cyber challenges. Comey said the FBI has to find people with the right values and teach them cyber skills. Adm. Rogers said terrorists’ ability to reach out to a much broader group of people, largely through cyber, is a big issue. The admiral also said no one is satisfied with US cybersecurity—except for nations that are consistently stealing information.

Sean Kanuck, national intelligence officer for cyber, Office of the DNI, said ubiquitous intrusions already are having a negative cumulative effect on US national security and economic competitiveness. “Just because the lights haven’t gone out for a week doesn’t mean the problem isn’t already upon us,” he said.

Melissa Hathaway, president of Hathaway Global Strategies, noted that global connectivity was established without consideration given to security and resilience. She foresees the Internet destabilizing over the next few years, as both government and business activities there are eroding trust. Democracies and dictatorships alike are creating victims of their own citizens, she stated.

Hathaway argued that government has given industry minimum security standards that it is not meeting itself, citing the recent Office of Personnel Management data theft. “It’s time we held government accountable,” she declared.

Hathaway said there are only three truly critical infrastructure elements—telecommunications, power and financial. Sabotaging these could be disastrous. But Kanuck pointed out that these three infrastructure elements are held by the private sector and, according to the international rules of warfare, are legitimate military targets.
AFCEA: http://bit.ly/1R08Jxm

 

 

« Cyber Warfare Specialists NSO Group Explore $1Billion Sale
De-escalation Is The Answer To Growing Cyber Tension »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CEPS

CEPS

CEPS is a leading think tank and forum for debate on EU affairs, ranking among the top think tanks in Europe. Topic areas include Innovation, Digital economy and Cyber-security.

SecurePay

SecurePay

SecurePay is Australia's premier payment gateway, with a range of secure online payment solutions for online retailers, SMEs and enterprise businesses.

Precise Biometrics

Precise Biometrics

Precise Biometrics develop and sell fingerprint software for convenient and secure authentication of people’s identity in mobile devices, smart cards and other products with fingerprint sensors.

Compnet

Compnet

Compnet is a service company that assists customers in integrating complete ICT systems including network infrastructure and security solutions.

NESECO

NESECO

NESECO is an IT security integration and consulting firm providing security products, solutions, support, consulting, and training services.

Cytomic

Cytomic

Cytomic is the business unit of Panda Security specialized in providing advanced cybersecurity solutions and services to large enterprises.

Go Grow

Go Grow

Go Grow is a business oriented accelerator program at Copenhagen School of Entrepreneurship. Targeted technologies include IoT, AI and Cybersecurity.

Agio

Agio

Agio is a hybrid managed IT and cybersecurity provider servicing the financial services, health care and payments industries.

Hold Security

Hold Security

Hold Security works with companies of all sizes to provide unparalleled Threat Intelligence services that actually make a difference.

Cygenta

Cygenta

Cygenta brings a new approach to cybersecurity. We understand that true security means having digital, human and physical security working in harmony.

Centre for Cyber Security Research and Innovation (CSRI) - Deakin University

Centre for Cyber Security Research and Innovation (CSRI) - Deakin University

CSRI solves the cyber security threats of tomorrow, today. We work with industry and government leaders on innovative research that has real-world impact.

Bright Security

Bright Security

Bright Security is a developer-centric Dynamic Application Security Testing (DAST) solution that helps organizations ship secure applications and APIs quickly and cost-effectively.

Akamai Technologies

Akamai Technologies

Akamai's leading security, compute, and delivery solutions are helping global companies make life better for billions of people, billions of times a day.

Espria

Espria

Espria is a leading independent managed service provider with expertise in Cloud, IT, Communications and Document Solutions.

Credo AI

Credo AI

Credo have pioneered a Responsible AI platform that enables context driven, comprehensive and continuous governance, oversight and accountability of AI.

Xcede

Xcede

Xcede are global technology recruitment specialists. We connect companies with exceptional professionals who empower growth.