US Intelligence Faces A Diversity of Challenges

A family of threats ranging from nation-states to individuals acting on behalf of a terrorist group challenges the US intelligence community as it tries to prevent kinetic and digital attacks on the homeland. Traditional arenas such as terrestrial battlespaces have been joined by cyberspace as both targets and media for adversaries bent on damaging or destroying allied military forces or civilian infrastructures.

The nature of these threats and steps that must be taken to stop them were among the issues discussed at the AFCEA/INSA Intelligence and National Security Summit recently held in Washington. Presenters included the director of national intelligence; the US intelligence agency directors; the heads of individual military service intelligence; and other government and industry intelligence community leaders.

James Clapper, director of national intelligence (DNI), addressed some of the more pressing challenges facing the US intelligence community. Many come from Russian activities, which Clapper describes as “a throwback to the Cold War.” He added that the Russians are quite serious about their stake in the Arctic. The US intelligence community is at a disadvantage here. “We do not have nearly the resources we did in the Cold War to allocate to Russia,” Clapper warned.

In addition, Edward Snowden has dealt a devastating blow to US intelligence, the DNI declared. “Snowden has done untold damage to our foreign collection capabilities,” he said. “Terrorists have gone to school on his revelations.”

Michael Chertoff, former Homeland Security secretary and co-founder of The Chertoff Group, stated that al-Qaida is imitating the Islamic State of Iraq and the Levant (ISIL) by suggesting targets for its own lone wolves. John Mulligan, deputy director of the National Counterterrorism Center, added, “We’ve seen a real change in the landscape with the rise of ISIL.” The current generation of terrorists is very technologically astute, and the center is working “in a much more compressed environment.”

CIA Director John Brennan stated that the intelligence community cannot focus on just one type of terrorist threat or organization. There is no one-size-fits-all approach to combating terrorism, as any terrorist group could be moving down the timeline toward execution. Adm. Mike Rogers, USN, commander of the US Cyber Command and director of the National Security Agency, went further by saying that no group or nation-state could be identified as the greatest threat to the United States. Conditions change daily, he said.

On the domestic front, FBI Director James Comey decried a recent change in the national mood. The American people should be skeptical of government, he said, but that skepticism has become cynicism. Although Brennan admitted that the CIA definitely has made mistakes, he charged that many criticisms actually are skewed misrepresentations.

Each agency is taking a different approach to cyber challenges. Comey said the FBI has to find people with the right values and teach them cyber skills. Adm. Rogers said terrorists’ ability to reach out to a much broader group of people, largely through cyber, is a big issue. The admiral also said no one is satisfied with US cybersecurity—except for nations that are consistently stealing information.

Sean Kanuck, national intelligence officer for cyber, Office of the DNI, said ubiquitous intrusions already are having a negative cumulative effect on US national security and economic competitiveness. “Just because the lights haven’t gone out for a week doesn’t mean the problem isn’t already upon us,” he said.

Melissa Hathaway, president of Hathaway Global Strategies, noted that global connectivity was established without consideration given to security and resilience. She foresees the Internet destabilizing over the next few years, as both government and business activities there are eroding trust. Democracies and dictatorships alike are creating victims of their own citizens, she stated.

Hathaway argued that government has given industry minimum security standards that it is not meeting itself, citing the recent Office of Personnel Management data theft. “It’s time we held government accountable,” she declared.

Hathaway said there are only three truly critical infrastructure elements—telecommunications, power and financial. Sabotaging these could be disastrous. But Kanuck pointed out that these three infrastructure elements are held by the private sector and, according to the international rules of warfare, are legitimate military targets.
AFCEA: http://bit.ly/1R08Jxm

 

 

« Cyber Warfare Specialists NSO Group Explore $1Billion Sale
De-escalation Is The Answer To Growing Cyber Tension »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

IS Decisions

IS Decisions

IS Decisions builds affordable and easy-to-use Access Management software solutions, allowing IT teams to effectively secure access to Active Directory infrastructures, SaaS apps and data within.

I-Tracing

I-Tracing

I-TRACING are experts in IT security, specialized in legal compliance of information systems, security of information systems, and the collection of digital evidence and traces.

CERT-PY

CERT-PY

CERT-PY is the national Computer Emergency Response Team for Paraguay.

Open Systems International (OSI)

Open Systems International (OSI)

Our innovative Operations Technology (OT) solutions are highly scalable and can be deployed by various utility companies to monitor, control and optimize their real-time operations.

UM Labs

UM Labs

UM Labs is a developer of security products for Voice over IP (VoIP), protecting SIP trunk connections, safeguarding mobile phone communications and enabling BYOD.

RedSeal

RedSeal

RedSeal’s network modeling and risk scoring platform is the foundation for enabling enterprise networks to be resilient to cyber events.

Air Informatics

Air Informatics

Air Informatics LLC provides security, information management, analytics and informatics for IT and wirelessly enabled airplanes and operations.

Metrarc

Metrarc

Metrarc has developed a ground-breaking technology called ICMetrics™ for deriving secure encryption keys from the properties of digital systems without the need to store any of the encryption keys.

Smart Protection

Smart Protection

Smart Protection are experts in brand and trademark protection - we fight against counterfeits and unauthorized usages of brands with machine learning technology.

PixelPlex

PixelPlex

PixelPlex is a blockchain and custom software development company with offices and developers in New York, Geneva, and Seoul.

InterGuard

InterGuard

As the pioneer for Unified Insider Threat Prevention and productivity monitoring tools, InterGuard offers on premise and SaaS-based services that are easily available and affordable.

Aryaka

Aryaka

Aryaka’s SmartServices offer connectivity, application acceleration, security, cloud networking and insights leveraging global orchestration and provisioning.

Althammer & Kill

Althammer & Kill

Althammer & Kill offers pragmatic solution concepts for data protection and digitization. We advise in the field of data protection, information security and compliance.

Wavenet

Wavenet

Wavenet has grown from simple beginnings to become one of the UK’s market leaders in unified communications, business telephony, and Cyber Security solutions.

Sacumen

Sacumen

Sacumen is a niche player in the cybersecurity market, solving critical problems for security product companies.

Sasken Technologies

Sasken Technologies

Sasken’s Cybersecurity Services enables enterprises to develop, maintain, and take digital products to the market with security postures that empower operational excellence.