US Intelligence Faces A Diversity of Challenges

A family of threats ranging from nation-states to individuals acting on behalf of a terrorist group challenges the US intelligence community as it tries to prevent kinetic and digital attacks on the homeland. Traditional arenas such as terrestrial battlespaces have been joined by cyberspace as both targets and media for adversaries bent on damaging or destroying allied military forces or civilian infrastructures.

The nature of these threats and steps that must be taken to stop them were among the issues discussed at the AFCEA/INSA Intelligence and National Security Summit recently held in Washington. Presenters included the director of national intelligence; the US intelligence agency directors; the heads of individual military service intelligence; and other government and industry intelligence community leaders.

James Clapper, director of national intelligence (DNI), addressed some of the more pressing challenges facing the US intelligence community. Many come from Russian activities, which Clapper describes as “a throwback to the Cold War.” He added that the Russians are quite serious about their stake in the Arctic. The US intelligence community is at a disadvantage here. “We do not have nearly the resources we did in the Cold War to allocate to Russia,” Clapper warned.

In addition, Edward Snowden has dealt a devastating blow to US intelligence, the DNI declared. “Snowden has done untold damage to our foreign collection capabilities,” he said. “Terrorists have gone to school on his revelations.”

Michael Chertoff, former Homeland Security secretary and co-founder of The Chertoff Group, stated that al-Qaida is imitating the Islamic State of Iraq and the Levant (ISIL) by suggesting targets for its own lone wolves. John Mulligan, deputy director of the National Counterterrorism Center, added, “We’ve seen a real change in the landscape with the rise of ISIL.” The current generation of terrorists is very technologically astute, and the center is working “in a much more compressed environment.”

CIA Director John Brennan stated that the intelligence community cannot focus on just one type of terrorist threat or organization. There is no one-size-fits-all approach to combating terrorism, as any terrorist group could be moving down the timeline toward execution. Adm. Mike Rogers, USN, commander of the US Cyber Command and director of the National Security Agency, went further by saying that no group or nation-state could be identified as the greatest threat to the United States. Conditions change daily, he said.

On the domestic front, FBI Director James Comey decried a recent change in the national mood. The American people should be skeptical of government, he said, but that skepticism has become cynicism. Although Brennan admitted that the CIA definitely has made mistakes, he charged that many criticisms actually are skewed misrepresentations.

Each agency is taking a different approach to cyber challenges. Comey said the FBI has to find people with the right values and teach them cyber skills. Adm. Rogers said terrorists’ ability to reach out to a much broader group of people, largely through cyber, is a big issue. The admiral also said no one is satisfied with US cybersecurity—except for nations that are consistently stealing information.

Sean Kanuck, national intelligence officer for cyber, Office of the DNI, said ubiquitous intrusions already are having a negative cumulative effect on US national security and economic competitiveness. “Just because the lights haven’t gone out for a week doesn’t mean the problem isn’t already upon us,” he said.

Melissa Hathaway, president of Hathaway Global Strategies, noted that global connectivity was established without consideration given to security and resilience. She foresees the Internet destabilizing over the next few years, as both government and business activities there are eroding trust. Democracies and dictatorships alike are creating victims of their own citizens, she stated.

Hathaway argued that government has given industry minimum security standards that it is not meeting itself, citing the recent Office of Personnel Management data theft. “It’s time we held government accountable,” she declared.

Hathaway said there are only three truly critical infrastructure elements—telecommunications, power and financial. Sabotaging these could be disastrous. But Kanuck pointed out that these three infrastructure elements are held by the private sector and, according to the international rules of warfare, are legitimate military targets.
AFCEA: http://bit.ly/1R08Jxm

 

 

« Cyber Warfare Specialists NSO Group Explore $1Billion Sale
De-escalation Is The Answer To Growing Cyber Tension »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Cybsecurity Foundation (CSF)

Cybsecurity Foundation (CSF)

Cybsecurity is a non-profit NGO, which aims to work on improvement of security levels in the Polish cyberspace.

APMG International (APM Group)

APMG International (APM Group)

APM Group is a global accreditation, certification and examination body specializing in certification schemes for individuals, organizations and software.

Intrusion

Intrusion

Intrusion provides IT professionals with the most robust tool set available for performing in-depth research and analysis of network traffic.

iProov

iProov

iProov delivers authentication and verification simply and securely, based on a genuine one-time biometric.

CloudSEK

CloudSEK

CloudSEK has set its sights on building the world’s fastest and most reliable AI technology, that identifies and resolves digital threats.

Infinidat

Infinidat

Infinidat delivers enterprise-proven solutions for data storage, data protection, business continuity, and sovereign cloud storage.

Dynamic Quest

Dynamic Quest

Dynamic Quest is a managed IT, cloud and security services companies, providing a comprehensive range of technology services including cybersecurity, backup and disaster recovery.

Advantex Network Solutions

Advantex Network Solutions

Advantex Network Solutions are a leading provider in Mitel, IT Solutions, Networking, and iP surveillance.

Oman Data Park

Oman Data Park

The Data Park is Oman’s premier IT Managed Services provider. We offer a superior Tier 3 Data Center network providing cyber security and cloud services.

Profian

Profian

Profian’s hardware-based solutions maintain your data's confidentiality and integrity in use, providing true confidential computing to meet regulatory and audit requirements.

inWebo

inWebo

inWebo is the specialist in multi-factor strong authentication (MFA). We guarantee the security of data and identities in a digital world with increasingly important economic and political stakes.

DuckDuckGoose

DuckDuckGoose

DuckDuckGoose offer advanced solutions to protect against manipulated videos, images, voices and texts.

Abstract Security

Abstract Security

Abstract Security has created a revolutionary platform, equipped with an AI-powered assistant, to better centralize the management of security analytics.

Zafran

Zafran

Zafran is a Risk & Mitigation Platform that defuses threat exploitation by mobilizing existing security tools.

Hudson Rock

Hudson Rock

Hudson Rock’s products — Cavalier & Bayonet — are powered by our cybercrime database, composed of millions of machines compromised by Infostealers in global malware spreading campaigns.

Windstream

Windstream

Windstream is a leading provider of advanced network communications and technology solutions for consumers, small businesses, enterprise organizations and carrier partners across the US.