US Intel Leaders “It’s time to be Data Serious”

The US Government says it’s time to get serious about data, how it is collected, curated, and capitalised by humans and machines, otherwise the country could lose its intelligence edge, the Office of the Director of National Intelligence says in a new 3-year Data Strategy Report.

Senior Management of the Senate Intelligence Committee has recently said that Congress has been making a “serious effort” to address emerging technologies, like Artificial Intelligence (AI) and Quantum Computing, but “whether it is enough is something that we really need to ask ourselves.”

“To bridge the gap between where we are today and optimising for the future, we have taken a step back to see what we need to do as a Community to accelerate our data and digital transformation over the next three years so that end-to-end data management is core to what we do and not seen as merely an enabling function,” says The IC (Intelligence Community) Data Strategy 2023-2025.

“To date, we have not significantly prioritised data as a strategic and operational [intelligence community] asset. The central challenge remains that the IC is not fielding data, analytics, and AI enabled capabilities at the pace and scale required to preserve our decision and intelligence advantage,” the document said.

To fix that, the IC wants to fine-tune the “data flow lifecycle from collection and acquisition, to transporting, ingesting, curating, exploiting, disseminating, and disposing of IC data.”

The strategy outlines four main goals: improve data management, ensure data is human and AI-ready with new services and tools, directly work with the private sector and academia, and develop intelligence officers who are fluent in how data works.

The ODNI’s strategy calls for automation to prepare and label data to reduce the time it takes to absorb datasets from days to minutes.

Also, every time data is collected or bought, intel agencies will have to lay out how it will be transported, ingested, curated, exploited, disseminated, and disposed of “with consideration for its ethical and appropriate use, consistent with law and policy,” according to the strategy.

That type of data management will help solidify “minimum common standards for the use, protection, dissemination, interoperability, and generation of IC data.”

Bolstering partnerships is another key pillar of the strategy, which could help with not having a full data workforce.

“Data acumen has to become a core skill for every member of the workforce, not just for data professionals. The workforce and supporting contractors need to know, understand, and value data utilisation and sharing for mission value and insight,” the document said.

But there’s still the need for people who can make that happen.

“How do we work across, not only inside our buildings, but across the IC, across the US government, swith our industry academic partners, so that we can really bring the best of what there is to bear in support of our mission,” said Lakshmi Raman, the Central Intelligence Agency’s director of AI innovation, during a panel discussion at the Intelligence and National Security Summit recently.
 
“We don't have enough resources to do everything that we need to do.”

Defense One:     DRI:     Meri Talk:     United States Senate:     ExecutiveGov:     DRI

 

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible

« JumpCloud Says Nation-State Hackers Hit Specific Customers
Software Faults Ground F-35 Warplanes »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Scale Computing

Scale Computing

Scale Computing is an industry leading application platform for EDGE computing environments covering retail, manufacturing, financial services and government.

Cybereason

Cybereason

Cybereason provides real-time detection of malicious activity enabling you to identify the cause and scope of an attack and ensure an effective response.

Yubico

Yubico

Yubico sets new global standards for simple and secure access to computers, mobile devices, servers, and internet accounts.

Shadowserver Foundation

Shadowserver Foundation

Shadowserver Foundation aims to improve internet security by raising awareness of compromised servers, malicious attackers and the spread of malware.

Simula Research Laboratory

Simula Research Laboratory

Simula Research Laboratory carries out research in the fields of communication systems, scientific computing and software engineering.

DCIT

DCIT

DCIT is a specialist in providing comprehensive consulting and auditing services in the field of information technology, PROVYS development software and security system AuditSquare.

Anect

Anect

Anect is a leading provider of ICT security and services for hybrid and cloud solutions.

TechArch

TechArch

TechArch helps customers to optimize their investments in cybersecurity by providing them independent and vendor-neutral consultation and guidance.

Ecubel

Ecubel

Ecubel is the market leader in Belgium in buying and selling used IT harware guaranteed by a certified data erasure.

Blockchain Reactor

Blockchain Reactor

Blockchain Reactor is a blockchain consultancy and implementation company providing cutting-edge blockchain solutions for start-ups and enterprises.

CACI International

CACI International

CACI is at the forefront of developing and delivering technological breakthroughs that transform and optimize government operations.

ISECURION Technology & Consulting

ISECURION Technology & Consulting

ISECURION is an information security consulting company. We provide a unique blend of services to our customers catering to the current information security landscape.

NACVIEW

NACVIEW

NACVIEW is a Network Access Control solution. It allows to control endpoints and identities that try to access the network - wired and wireless, including VPN connections.

CI-ISAC Australia

CI-ISAC Australia

CI-ISAC has been designed to support and promote existing legislation and Government initiatives that are working to uplift cyber resilience across critical infrastructure sectors.

Orca Technology

Orca Technology

Orca is a UK-based Managed Service Provider delivering end-to-end managed IT services, support, hosted desktop, cloud solutions and strategic guidance.

Miggo Security

Miggo Security

Miggo is the first Application Detection and Response (ADR) platform on a mission to stop application breaches.