US Intelligence Ignores Open Source Data

The US' ability to monitor and analyse data and information requires that the US Intelligence Community (IC) gather, analyse information and strategic intelligence to anticipate geo- strategic shifts, as well as shorter-term intelligence so that the United States can respond to the actions and provocations of rivals both from within the US and externally

However, the US intelligence community has continued to ignore the usefulness of the enormous open sources of intelligence, simply because the information is publicly available and isn’t secret.

The intelligence community refers to monitor others using secret expensive classified satellites and intelligence-collection programs rather than to gather unclassified free information on the Internet. But intelligence should engage with open source as well as classified information and data.

Russia has conducted a strategic misinformation campaign to influence the results of elections in multiple countries, including the UK, Ukraine, France and the US and they did it on social media in view of everyone, except the intelligence officers who only look at classified sources. Because they did not engage with social media US officials said they were not warned about the fake news and misinformation. This also applied to China when senior advisors to the US government say  they do not understand enough about Beijing’s strategic goals and intentions.

Congress should have an open-source centre  that translates important Chinese documents for consumption by English-language readers. The US did have a method of analysis, but the US government took down its own open source center website.

This process of ignoring open sources also happened in  January when the Capitol in Washington DC was invaded by people who had organised, planned, and announced their plans to riot on-line.

The US government has an urgent need for intelligence based on open source information to understand and reveal foreign governments’ campaigns to harm the US and to identify the sources of online radicalisation campaigns and to better understand other countries’ strategy and tactics.

“And so the US Intelligence Community stands at the dawn of a new era of technological innovation and transformation unprecedented in its history.

“Driven by artificial intelligence (AI) and associated emerging technologies, including cloud computing, advanced sensors, and big data analytics, the approaching “AI era” will transform both the nature of the global threats the IC is responsible for assessing and the IC’s ability to accurately detect and assess them,” says the opening of a January 2021 report by the Centre for Strategic and International Studies.

CSIS:     RAND:      Washington Post:      Defense One:        

You Might Also Read: 

EU Court Rules Out Mass Online Surveillance:

 

« New Effective Network Firewall Security
More Women Cyber Security Professionals Needed »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

UCD Centre for Cybersecurity and Cybercrime Investigation

UCD Centre for Cybersecurity and Cybercrime Investigation

UCD Centre for Cybersecurity and Cybercrime Investigation is Europe's leading centre for research & education in cybersecurity, cybercrime and digital forensics.

ISACA

ISACA

ISACA is a global professional association and learning organization for members who work in information security, governance, assurance, rissk and privacy.

2Secure

2Secure

2Secure is one of Sweden's largest private security companies. Service inlcude personal security, corporate security, information and cyber security.

BPC Banking Technologies

BPC Banking Technologies

BPC’s advanced fraud prevention solution helps card issuers and acquirers combat the growing threat by monitoring 100% of transactions, online, in real-time across all channels.

eXate

eXate

eXate provides pioneering technology that empowers organisations to protect, control and manage their sensitive data centrally, providing a complete data privacy solution.

Allied Telesis

Allied Telesis

Allied Telesis delivers the secure, flexible, and agile solutions needed to meet the expectations of any industry’s critical mission.

Smoothstack

Smoothstack

Smoothstack is a technology talent incubator whose immersive training program kick starts IT careers and delivers a fresh source of IT talent.

AdvIntel

AdvIntel

AdvIntel is a next-generation threat prevention and loss prevention company launched by a team of certified investigators, reverse engineers, and security experts.

ProArch

ProArch

ProArch is a global team of multidisciplinary experts in cloud, infrastructure, data analytics, cybersecurity, compliance, and software development.

Rezonate

Rezonate

Rezonate discovers, profiles, and protects Identities and their entire access journey to cloud infrastructure and critical SaaS applications. Preventing and stopping cyberattacks.

Arsen Cybersecurity

Arsen Cybersecurity

Arsen is a French cybersecurity startup, dedicated to enhancing human behaviors in cybersecurity.

Converged Communication Solutions

Converged Communication Solutions

Converged is an independent Internet Service Provider, telephony, IT support and security specialist.

Precision Cybertechnologies & Digital Solutions (Precision-Cyber)

Precision Cybertechnologies & Digital Solutions (Precision-Cyber)

Precision-Cyber was founded on the philosophy of state-of-the-art cybersecurity and digital solutions. Our guiding principle is simply that we will provide and secure all your digital needs.

Aberrant

Aberrant

A radically new approach to managing information security. Aberrant is the single pane of glass through which a security program can be viewed.

EyBrids

EyBrids

As a forward-thinking cybersecurity consulting firm, we believe that robust security is the foundation for innovation and growth in today’s digital landscape.

Prequel

Prequel

Prequel is your real-time problem detection and resolution platform, powered by the global reliability community.