US Cyber Intelligence Agency – Will it work?

The Obama administration is about to create a new agency to monitor cybersecurity threats and share data about possible attacks among government departments.

The Cyber Threat Intelligence Integration Center will pool information from a variety of sources and ensure that the data flows among government agencies, including those that handle communications about security with the private sector. No government agency handles this function, which is critical to protecting the US from hacks, an administration official, speaking on the condition of anonymity.

The agency will be formed along the lines of the National Counterterrorism Center, which was created after the Sept. 11, 2001, attacks to better coordinate sharing of intelligence in the federal government.

Currently, the United States intelligence community comprises of 17 federal agencies assigned an array of missions relating to national defense, foreign relations, homeland security and law enforcement. These agencies form just the foundation of a sprawling enterprise that incorporates intelligence and non-intelligence components of many other federal agencies, state and local police, including fire and emergency response, international government partners, as well as private companies and organizations.

These entities connect through an array of information sharing platforms and portals, including the National Counterterrorism Center, the Joint Counterterrorism Assessment Team, 71 FBI Joint Terrorism Task Forces, 56 Field Intelligence Groups, and 78 state and local intelligence fusion centers, which can incorporate military and private sector participants. Information collected by any of them can be distributed through official information sharing systems like the Defense Department’s Secret Internet Protocol Router Network, or SIPRNet and many others.

FBI and Department of Homeland Security officials operate several private sector intelligence sharing organizations as well, including the Domestic Security Advisory Council, InfraGard, and the National Cyber Forensics and Training Alliance. In 2010, the Washington Post documented almost 2,000 private companies working on counterterrorism, homeland security, and intelligence. Over 5 million government employees and private contractors now hold security clearances giving them access to classified information.

US intelligence agencies also have close working relationships with international partners, including the governments of the United Kingdom, Canada, Australia and New Zealand under the “five eyes” agreement. They share intelligence with other nations such as Israel and Saudi Arabia through memoranda of understanding, or other less formal agreements. The U.S. military maintains from 598 to 1,000 bases and installations in at least 40 foreign countries.

The annual intelligence budget exceeds $70 billion per year, but that figure represents just a small portion of what the US spends on national defense and homeland security. In a recent interview, Ben Friedman of the Cato Institute does the math:
The nonpartisan Project on Government Oversight and the Columbia Journalism Review back up Friedman’s estimate that the US now spends roughly $1 trillion a year for national security. This figure dwarfs the combined defense budgets of all possible contenders, combined.

Friedman argues that the threats we face today don’t justify such profligate spending. Protected by oceans and bordered by friendly nations, there’s little risk of a foreign invasion. Deaths from wars and other political violence abroad have sharply decreased as well. Terrorism and violent crime in the US are at historically low levels. Unfortunately, the excessive secrecy shrouding intelligence activities means Americans have little public information from which to evaluate whether the intelligence enterprise is worth the investment.

There are many culprits we can blame for spreading undue public fear, from a sensationalist media to manipulative politicians. But a significant part of the problem is that intelligence officials are incentivized to exaggerate threats, which risks the misapplication of security resources and poor national security policies.

http://cwonline.computerworld.com/t/9125365/1284819890/718635/17/

http://www.defenseone.com/ideas/2015/02/us-intelligence-community-bigger-ever-it-worth-it/104799/

« Data Breaches in Europe
Cyber Warfare: Technology backfires on the powerful. »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Council of Europe - Cybercrime Programme Office (C-PROC)

Council of Europe - Cybercrime Programme Office (C-PROC)

The Cybercrime Programme Office of the Council of Europe is responsible for assisting countries worldwide in strengthening their legal systems capacity to respond to cybercrime

Anomali

Anomali

Anomali delivers intelligence-driven cybersecurity solutions to enhance threat visibility, automate threat processing and detection, and accelerate threat investigation, response, and remediation.

Skkynet Cloud Systems

Skkynet Cloud Systems

Skkynet is a leader in real-time data systems for the secure management and control of industrial processes (SCADA) and embedded devices (M2M).

Inky Technology Corp

Inky Technology Corp

Inky® Phish Fence is an email protection gateway that uses sophisticated AI, machine learning and computer vision algorithms to block deep sea phishing attacks that get through every other system.

Dermalog Identification Systems

Dermalog Identification Systems

Dermalog Identification Systems is a pioneer in biometry and the largest German manufacturer of biometric devices and systems.

Emsisoft

Emsisoft

Emsisoft protects your devices against all types of malware, ransomware and other threats with no-bloat anti-malware & antivirus solutions.

RangeForce

RangeForce

RangeForce delivers the only integrated cybersecurity simulation and skills analysis platform that combines a virtual cyber range with hand-on training.

ACROS Security

ACROS Security

ACROS Security is a leading provider of security research, real penetration testing and code review for customers with the highest security requirements.

British Blockchain Association (BBA)

British Blockchain Association (BBA)

British Blockchain Association (BBA) is a not-for-profit organisation that promotes evidence-based adoption of Blockchain and Distributed Ledger Technologies (DLT) across the public and private sector

Granted Consultancy

Granted Consultancy

Granted Consultancy is a business consultancy that specialises in securing funding to support companies with the development and commercialisation of new and innovative products and technologies.

FifthDomain

FifthDomain

We are a specialist cyber security education and training company tackling the global cyber security skills shortage.

ISARR

ISARR

The ISARR software platform - your bespoke Risk, Resilience & Security Management solution. Simple, cost effective and adaptable, now and into the future.

iON United

iON United

iON United is a full-service IT security solutions provider and one of the most trusted names in cybersecurity in Canada.

Cyber Coaching

Cyber Coaching

Cyber Coaching is a community for enhancing technical cyber skills, through unofficial certification training, cyber mentorship, and personalised occupational transition programs.

Dataships

Dataships

We help companies automate their privacy compliance while building healthy, transparent data relationships with their customers.

Willyama Services

Willyama Services

Willyama Services is a certified Information Technology and Cybersecurity professional services business providing services to government and private sector clients.