US Intelligence Faces A Diversity of Challenges

A family of threats ranging from nation-states to individuals acting on behalf of a terrorist group challenges the US intelligence community as it tries to prevent kinetic and digital attacks on the homeland. Traditional arenas such as terrestrial battlespaces have been joined by cyberspace as both targets and media for adversaries bent on damaging or destroying allied military forces or civilian infrastructures.

The nature of these threats and steps that must be taken to stop them were among the issues discussed at the AFCEA/INSA Intelligence and National Security Summit recently held in Washington. Presenters included the director of national intelligence; the US intelligence agency directors; the heads of individual military service intelligence; and other government and industry intelligence community leaders.

James Clapper, director of national intelligence (DNI), addressed some of the more pressing challenges facing the US intelligence community. Many come from Russian activities, which Clapper describes as “a throwback to the Cold War.” He added that the Russians are quite serious about their stake in the Arctic. The US intelligence community is at a disadvantage here. “We do not have nearly the resources we did in the Cold War to allocate to Russia,” Clapper warned.

In addition, Edward Snowden has dealt a devastating blow to US intelligence, the DNI declared. “Snowden has done untold damage to our foreign collection capabilities,” he said. “Terrorists have gone to school on his revelations.”

Michael Chertoff, former Homeland Security secretary and co-founder of The Chertoff Group, stated that al-Qaida is imitating the Islamic State of Iraq and the Levant (ISIL) by suggesting targets for its own lone wolves. John Mulligan, deputy director of the National Counterterrorism Center, added, “We’ve seen a real change in the landscape with the rise of ISIL.” The current generation of terrorists is very technologically astute, and the center is working “in a much more compressed environment.”

CIA Director John Brennan stated that the intelligence community cannot focus on just one type of terrorist threat or organization. There is no one-size-fits-all approach to combating terrorism, as any terrorist group could be moving down the timeline toward execution. Adm. Mike Rogers, USN, commander of the US Cyber Command and director of the National Security Agency, went further by saying that no group or nation-state could be identified as the greatest threat to the United States. Conditions change daily, he said.

On the domestic front, FBI Director James Comey decried a recent change in the national mood. The American people should be skeptical of government, he said, but that skepticism has become cynicism. Although Brennan admitted that the CIA definitely has made mistakes, he charged that many criticisms actually are skewed misrepresentations.

Each agency is taking a different approach to cyber challenges. Comey said the FBI has to find people with the right values and teach them cyber skills. Adm. Rogers said terrorists’ ability to reach out to a much broader group of people, largely through cyber, is a big issue. The admiral also said no one is satisfied with US cybersecurity—except for nations that are consistently stealing information.

Sean Kanuck, national intelligence officer for cyber, Office of the DNI, said ubiquitous intrusions already are having a negative cumulative effect on US national security and economic competitiveness. “Just because the lights haven’t gone out for a week doesn’t mean the problem isn’t already upon us,” he said.

Melissa Hathaway, president of Hathaway Global Strategies, noted that global connectivity was established without consideration given to security and resilience. She foresees the Internet destabilizing over the next few years, as both government and business activities there are eroding trust. Democracies and dictatorships alike are creating victims of their own citizens, she stated.

Hathaway argued that government has given industry minimum security standards that it is not meeting itself, citing the recent Office of Personnel Management data theft. “It’s time we held government accountable,” she declared.

Hathaway said there are only three truly critical infrastructure elements—telecommunications, power and financial. Sabotaging these could be disastrous. But Kanuck pointed out that these three infrastructure elements are held by the private sector and, according to the international rules of warfare, are legitimate military targets.
AFCEA: http://bit.ly/1R08Jxm

 

 

« Cyber Warfare Specialists NSO Group Explore $1Billion Sale
De-escalation Is The Answer To Growing Cyber Tension »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

ZDL Group

ZDL Group

At ZDL (formerly ZeroDayLab) we take a comprehensive view of our clients cyber security risks and provide quality services to address those risk

Splunk

Splunk

Splunk provide real-time Security Information & Event Management solutions for Enterprise Networks, Cloud and small-scale IT environments

Optimal IdM

Optimal IdM

Optimal IdM is a leading global provider of identity management solutions and services.

Cyberia Group

Cyberia Group

Cyberia is a leading Internet and Security services provider with operations in Saudi Arabia, Lebanon and Jordan.

Waratek

Waratek

Waratek is a pioneer in the next generation of application security solutions known as Runtime Application Self-Protection or RASP.

XignSYS

XignSYS

XignSys develops innovative password-free and user-friendly Authentication solutions and electronic signature systems for B2B and B2C applications.

Applied Science and Technology Research Institute Company Limited (ASTRI)

Applied Science and Technology Research Institute Company Limited (ASTRI)

ASTRI's mission is to enhance Hong Kong’s competitiveness in technology-based industries through applied research in areas including Security & Data Sciences which encompasses cybersecurity.

AFNOR Group

AFNOR Group

AFNOR Group designs and deploys solutions based on voluntary standards around the world and provides services including training, professional and technical information, assessment and certification.

RISE

RISE

RISE is an independent, State-owned research institute, which offers unique expertise and over 100 testbeds and demonstration environments for future-proof technologies, products and services.

Security Management Partners (SMP)

Security Management Partners (SMP)

Security Management Partners (SMP) is a trusted partner to financial services, healthcare and businesses that need to manage their information, securely.

QuSecure

QuSecure

QuSecure provides a software-driven security architecture that overlays your current infrastructure and provides next-generation security to protect your entire network from quantum threats.

Neosec

Neosec

We’re reinventing API security. Understanding behavior requires data, analytics, and intelligence. Neosec brings XDR techniques to application security.

BigBear.ai

BigBear.ai

BigBear.ai delivers high-end analytics capabilities across the data and digital spectrum to deliver information superiority and decision support.

Probity

Probity

Probity Inc. is a certified software development and systems engineering company, providing support to federal government and national defense related clients.

Infosec Institute

Infosec Institute

Infosec is a leading cybersecurity training company, we help IT and security professionals advance their careers with skills development and certifications.

Falconfeeds

Falconfeeds

Falconfeeds empowers businesses and security professionals with immediate access to the latest and historical threat intelligence data.