Dramatic Improvement in Intelligence Sharing Because of ISIS

European countries are voluntarily providing the United States with large amounts of information about their citizens, particularly as those citizens attempt to travel, the nation's top counterterrorism official said.

ObamaCompared to the summer of 2013, US intelligence professionals have seen a "pendulum swing" in the willingness of European law enforcement to share information with the United States on European citizens, said Nicholas J. Rasmussen, director? of the National Counterterrorism Center, or NCTC, on Wednesday.

Things have turned around since summer 2013, when NSA contractor Edward Snowden first disclosed some of the nations closely kept secrets on surveillance capabilities. Rasmussen said that "the politics are difficult for some of our European partners" but tracking Islamic State fighters, or ISIS, has become a priority.

Rasmussen, before the House Committee on Homeland Security, said that European partners continue to differ form US counterparts on the issue of bulk metadata collection. But European reservations about data sharing in more targeted investigations had "seen a dramatic improvement," particularly in populating the NCTC's database, called the Terrorist Identities Datamart Environment, or TIDE. It is one of the key person-of-interest watch lists that the US and other countries use to track potential or suspected terrorists.

Thanks in part to better collaboration, he said, the Turkish "banned from entry list" now includes 10,000 individuals who are primarily European citizens. Turkey is seen as the most direct route that foreign fighters in Europe use to join ISIS in Iraq and Syria.

More than 20,000 fighters have flocked to Syria and Iraq to join ISIS, including 3,400 from Western countries and 150 Americans, according to previously-submitted written testimony from Rasmussen, first obtained by the Associated Press.

Many security experts and even some Navy SEALs argue that encryption keeps the nation safer from cyber attacks by keeping user information more secure.

http://www.defenseone.com/technology/2015/02/dramatic-improvement

« Cybercrime and the value of personal data
Cyber Soldiers: UK Announces Creation Of The 77th Battalion »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Blue Frost Security

Blue Frost Security

Blue Frost Security provides high-level IT security consulting, penetration testing services, ISO 27001 Solutions, PCI compliance solutions and training.

HackerOne

HackerOne

HackerOne was started by hackers and security leaders who are driven by a passion to make the internet safer.

National Institute of Standards & Technology (NIST)

National Institute of Standards & Technology (NIST)

NIST is a measurement standards laboratory, and a non-regulatory agency of the United States Department of Commerce. Areas covered include IT and cybersecurity.

Mixed Mode

Mixed Mode

Mixed Mode is a specialist in embedded and software engineering for applications including IoT and secure embedded systems.

Appdome

Appdome

Appdome is the industry's first mobile integration as a service company, providing solutions for enterprise mobility and mobile application security.

Athena Dynamics

Athena Dynamics

Athena Dynamics focuses on Cyber Security, especially in Critical Information Infra-structure Protection and Enterprise IT Operation Management products and Services.

Veriato

Veriato

Veriato develops intelligent solutions that provide companies with visibility into the human behaviors and activities occurring within their network, making them more secure and productive.

Hypori

Hypori

Hypori is a virtual smartphone solution that makes truly secure BYOD a reality for organizations in healthcare, finance, government, and beyond.

sayTEC

sayTEC

sayTEC's mission is to develop and deliver next-generation products and services in encrypted data and voice transmission.

Pixm

Pixm

Pixm’s computer vision based approach offers a truly unique and effective means to protect organizations from web-based phishing attacks.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

See how to use next-generation firewalls (NGFWs) and how they boost your security posture.

TotalAV

TotalAV

TotalAV Antivirus is a free-to-use app packed with all the essential features to find and remove malware, keeping you safe.

National Cybersecurity Alliance

National Cybersecurity Alliance

The National Cybersecurity Alliance is a non-profit organization on a mission to create a more secure, interconnected world.

SHI International

SHI International

SHI International deliver against your IT and business needs, helping you build strategies and solutions that will drive innovation, collaboration and security.

Klarytee

Klarytee

Protect your data wherever it goes. Klarytee is a SaaS platform that builds security into sensitive content to enable granular control in AI, public cloud and SaaS.

Hartman Executive Advisors

Hartman Executive Advisors

Hartman Executive Advisors is an unbiased IT and cyber advisory firm uniquely designed to help mid-market executives maximize their IT investments.