US Intel Leaders “It’s time to be Data Serious”

The US Government says it’s time to get serious about data, how it is collected, curated, and capitalised by humans and machines, otherwise the country could lose its intelligence edge, the Office of the Director of National Intelligence says in a new 3-year Data Strategy Report.

Senior Management of the Senate Intelligence Committee has recently said that Congress has been making a “serious effort” to address emerging technologies, like Artificial Intelligence (AI) and Quantum Computing, but “whether it is enough is something that we really need to ask ourselves.”

“To bridge the gap between where we are today and optimising for the future, we have taken a step back to see what we need to do as a Community to accelerate our data and digital transformation over the next three years so that end-to-end data management is core to what we do and not seen as merely an enabling function,” says The IC (Intelligence Community) Data Strategy 2023-2025.

“To date, we have not significantly prioritised data as a strategic and operational [intelligence community] asset. The central challenge remains that the IC is not fielding data, analytics, and AI enabled capabilities at the pace and scale required to preserve our decision and intelligence advantage,” the document said.

To fix that, the IC wants to fine-tune the “data flow lifecycle from collection and acquisition, to transporting, ingesting, curating, exploiting, disseminating, and disposing of IC data.”

The strategy outlines four main goals: improve data management, ensure data is human and AI-ready with new services and tools, directly work with the private sector and academia, and develop intelligence officers who are fluent in how data works.

The ODNI’s strategy calls for automation to prepare and label data to reduce the time it takes to absorb datasets from days to minutes.

Also, every time data is collected or bought, intel agencies will have to lay out how it will be transported, ingested, curated, exploited, disseminated, and disposed of “with consideration for its ethical and appropriate use, consistent with law and policy,” according to the strategy.

That type of data management will help solidify “minimum common standards for the use, protection, dissemination, interoperability, and generation of IC data.”

Bolstering partnerships is another key pillar of the strategy, which could help with not having a full data workforce.

“Data acumen has to become a core skill for every member of the workforce, not just for data professionals. The workforce and supporting contractors need to know, understand, and value data utilisation and sharing for mission value and insight,” the document said.

But there’s still the need for people who can make that happen.

“How do we work across, not only inside our buildings, but across the IC, across the US government, swith our industry academic partners, so that we can really bring the best of what there is to bear in support of our mission,” said Lakshmi Raman, the Central Intelligence Agency’s director of AI innovation, during a panel discussion at the Intelligence and National Security Summit recently.
 
“We don't have enough resources to do everything that we need to do.”

Defense One:     DRI:     Meri Talk:     United States Senate:     ExecutiveGov:     DRI

 

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible

« JumpCloud Says Nation-State Hackers Hit Specific Customers
Software Faults Ground F-35 Warplanes »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Solarflare

Solarflare

Solarflare is a leading provider of intelligent networking I/O software and hardware platforms that accelerate, monitor and secure network data.

InteliSecure

InteliSecure

InteliSecure offer Professional Services, Security Assessments and Managed Services for data and threat protection.

Australian Signals Directorate (ASD)

Australian Signals Directorate (ASD)

The Australian Signals Directorate is an intelligence agency in the Australian Government Department of Defence.

Karlsruhe Institute of Technology (KIT)

Karlsruhe Institute of Technology (KIT)

KIT is a leading research and education institutions with strong capabilities in information systems and security.

Somansa

Somansa

Somansa is a global leader in Data Security and Compliance solutions designed to protect valuable company information from leakage and help meet regulatory compliance requirements.

Pentera Security

Pentera Security

Pentera (formerly Pcysys) is focused on the inside threat. Our automated penetration-testing platform mimics the hacker's attack - automating the discovery of vulnerabilities.

OnDefend

OnDefend

OnDefend delivers information security solutions that improve overall security posture, reduce risks and defend against continually evolving and persistent cyber adversaries.

Emagined Security

Emagined Security

Emagined Security is a leading provider of professional services for Information Security and Compliance solutions.

R-Tech

R-Tech

R-Tech GmbH manages the digital start-up initiative, whose goal is to build a sustainable start-up culture in the field of digitization throughout the Upper Palatinate district of Bavaria.

Eviden

Eviden

Eviden is an Atos business that brings together its digital, big data and security business lines. It will be a global leader in data-driven, trusted and sustainable digital transformation.

Cybersecurity Dubai

Cybersecurity Dubai

Protect your business from cyber-attacks with Cybersecurity Dubai, your partner in online security solutions.

NetHope

NetHope

NetHope is a membership-based organization serving the international nonprofit humanitarian, development, and conservation sector through digital transformation.

LOCH Technologies

LOCH Technologies

LOCH Wireless Machine Vision platform delivers next generation cybersecurity, performance monitoring, and cost management for all 5G and for broad-spectrum IoT, IoMT and OT wireless environments.

Nordic Defender

Nordic Defender

Nordic Defender is the first crowd-powered modern cybersecurity solution provider in the Nordic region.

Mode

Mode

Mode is an out-of-band communication and crisis collaboration platform. One platform to manage your cyber crisis response. Stay connected when it's needed most.

Southern Cyber

Southern Cyber

At Southern Cyber, our mission is to deliver world-class information security solutions that align businesses with leading security frameworks and compliance standards.