US Intelligence Faces A Diversity of Challenges

A family of threats ranging from nation-states to individuals acting on behalf of a terrorist group challenges the US intelligence community as it tries to prevent kinetic and digital attacks on the homeland. Traditional arenas such as terrestrial battlespaces have been joined by cyberspace as both targets and media for adversaries bent on damaging or destroying allied military forces or civilian infrastructures.

The nature of these threats and steps that must be taken to stop them were among the issues discussed at the AFCEA/INSA Intelligence and National Security Summit recently held in Washington. Presenters included the director of national intelligence; the US intelligence agency directors; the heads of individual military service intelligence; and other government and industry intelligence community leaders.

James Clapper, director of national intelligence (DNI), addressed some of the more pressing challenges facing the US intelligence community. Many come from Russian activities, which Clapper describes as “a throwback to the Cold War.” He added that the Russians are quite serious about their stake in the Arctic. The US intelligence community is at a disadvantage here. “We do not have nearly the resources we did in the Cold War to allocate to Russia,” Clapper warned.

In addition, Edward Snowden has dealt a devastating blow to US intelligence, the DNI declared. “Snowden has done untold damage to our foreign collection capabilities,” he said. “Terrorists have gone to school on his revelations.”

Michael Chertoff, former Homeland Security secretary and co-founder of The Chertoff Group, stated that al-Qaida is imitating the Islamic State of Iraq and the Levant (ISIL) by suggesting targets for its own lone wolves. John Mulligan, deputy director of the National Counterterrorism Center, added, “We’ve seen a real change in the landscape with the rise of ISIL.” The current generation of terrorists is very technologically astute, and the center is working “in a much more compressed environment.”

CIA Director John Brennan stated that the intelligence community cannot focus on just one type of terrorist threat or organization. There is no one-size-fits-all approach to combating terrorism, as any terrorist group could be moving down the timeline toward execution. Adm. Mike Rogers, USN, commander of the US Cyber Command and director of the National Security Agency, went further by saying that no group or nation-state could be identified as the greatest threat to the United States. Conditions change daily, he said.

On the domestic front, FBI Director James Comey decried a recent change in the national mood. The American people should be skeptical of government, he said, but that skepticism has become cynicism. Although Brennan admitted that the CIA definitely has made mistakes, he charged that many criticisms actually are skewed misrepresentations.

Each agency is taking a different approach to cyber challenges. Comey said the FBI has to find people with the right values and teach them cyber skills. Adm. Rogers said terrorists’ ability to reach out to a much broader group of people, largely through cyber, is a big issue. The admiral also said no one is satisfied with US cybersecurity—except for nations that are consistently stealing information.

Sean Kanuck, national intelligence officer for cyber, Office of the DNI, said ubiquitous intrusions already are having a negative cumulative effect on US national security and economic competitiveness. “Just because the lights haven’t gone out for a week doesn’t mean the problem isn’t already upon us,” he said.

Melissa Hathaway, president of Hathaway Global Strategies, noted that global connectivity was established without consideration given to security and resilience. She foresees the Internet destabilizing over the next few years, as both government and business activities there are eroding trust. Democracies and dictatorships alike are creating victims of their own citizens, she stated.

Hathaway argued that government has given industry minimum security standards that it is not meeting itself, citing the recent Office of Personnel Management data theft. “It’s time we held government accountable,” she declared.

Hathaway said there are only three truly critical infrastructure elements—telecommunications, power and financial. Sabotaging these could be disastrous. But Kanuck pointed out that these three infrastructure elements are held by the private sector and, according to the international rules of warfare, are legitimate military targets.
AFCEA: http://bit.ly/1R08Jxm

 

 

« Cyber Warfare Specialists NSO Group Explore $1Billion Sale
De-escalation Is The Answer To Growing Cyber Tension »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Talend

Talend

Talend is a leader in cloud and big data integration software. Applications include Risk and Compliance management.

Ixia

Ixia

Ixia provides testing, visibility, and security solutions to strengthen applications across physical and virtual networks.

Softtek

Softtek

Softtek helps its clients to gain a competitive edge by implementing digital solutions that propel their business strategies.

Octopus Cybercrime Community

Octopus Cybercrime Community

The Octopus Community is a platform for information sharing and cooperation on cybercrime and electronic evidence.

Information Security Research Group - University of South Wales

Information Security Research Group - University of South Wales

The Information Security Research Group has an international reputation in the areas of network security, computer forensics and threat analysis.

NEC

NEC

NEC offers a complete array of solutions to governments and enterprises to protect themselves from the threats of digital disruption.

Fox-IT

Fox-IT

Fox-IT prevents, solves and mitigates the most serious cyber threats with smart solutions for governmental bodies, defense, law enforcement, critical infrastructure, banking and large enterprises.

Raz-Lee Security

Raz-Lee Security

Raz-Lee Security is the leading security solution provider for IBM Power i, otherwise known as iSeries or AS/400 servers.

Axonius

Axonius

Axonius is the only solution that offers a unified view of all assets and their coverage, empowering customers to take action to enforce their organization’s security policies.

Agility Networks

Agility Networks

Agility Networks is a technology company providing integrated services and solutions for Digital Transformation and Cyber Security.

Fischer Identity

Fischer Identity

Fischer Identity provide identity & access management and identity governance administration solutions.

Cyber Pathways

Cyber Pathways

Cyber Pathways brings together the next generation of Cyber professionals along with delegates who are looking to cross train and enter the cyber market.

Netgo

Netgo

Netgo group meet the requirements of a complex, digitized world with IT consulting, IT solutions & services, managed & cloud services and software products & development.

Baselime

Baselime

Baselime, the cloud-native observability platform. Resolve issues in your cloud application before they become problems.

Graphiant

Graphiant

Graphiant’s Data Assurance service gives businesses end-to-end control and visibility into how data travels throughout the entire business network.

Hive Systems

Hive Systems

Hive Systems specialize in tailored solutions that unify risk assessments, IT, security awareness, and cybersecurity operations for businesses of all sizes.