US Intelligence Ignores Open Source Data

The US' ability to monitor and analyse data and information requires that the US Intelligence Community (IC) gather, analyse information and strategic intelligence to anticipate geo- strategic shifts, as well as shorter-term intelligence so that the United States can respond to the actions and provocations of rivals both from within the US and externally

However, the US intelligence community has continued to ignore the usefulness of the enormous open sources of intelligence, simply because the information is publicly available and isn’t secret.

The intelligence community refers to monitor others using secret expensive classified satellites and intelligence-collection programs rather than to gather unclassified free information on the Internet. But intelligence should engage with open source as well as classified information and data.

Russia has conducted a strategic misinformation campaign to influence the results of elections in multiple countries, including the UK, Ukraine, France and the US and they did it on social media in view of everyone, except the intelligence officers who only look at classified sources. Because they did not engage with social media US officials said they were not warned about the fake news and misinformation. This also applied to China when senior advisors to the US government say  they do not understand enough about Beijing’s strategic goals and intentions.

Congress should have an open-source centre  that translates important Chinese documents for consumption by English-language readers. The US did have a method of analysis, but the US government took down its own open source center website.

This process of ignoring open sources also happened in  January when the Capitol in Washington DC was invaded by people who had organised, planned, and announced their plans to riot on-line.

The US government has an urgent need for intelligence based on open source information to understand and reveal foreign governments’ campaigns to harm the US and to identify the sources of online radicalisation campaigns and to better understand other countries’ strategy and tactics.

“And so the US Intelligence Community stands at the dawn of a new era of technological innovation and transformation unprecedented in its history.

“Driven by artificial intelligence (AI) and associated emerging technologies, including cloud computing, advanced sensors, and big data analytics, the approaching “AI era” will transform both the nature of the global threats the IC is responsible for assessing and the IC’s ability to accurately detect and assess them,” says the opening of a January 2021 report by the Centre for Strategic and International Studies.

CSIS:     RAND:      Washington Post:      Defense One:        

You Might Also Read: 

EU Court Rules Out Mass Online Surveillance:

 

« New Effective Network Firewall Security
More Women Cyber Security Professionals Needed »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Link11 GmbH

Link11 GmbH

Link11 provides DDoS protection solutions to protect websites and complete server infrastructures from DDoS attacks.

SiteGuarding

SiteGuarding

SiteGuarding provide website security tools and services to protect your website against malware and hacker exploits.

Protocol Policy Systems

Protocol Policy Systems

Protocol Policy Systems specialise in IT policy deployment and management systems that deliver compliance and secure computing environments.

Cybraics

Cybraics

Cybraics nLighten platform implements a unique and sophisticated artificial intelligence engine that rapidly learns your environment and alerts security teams to threats and vulnerabilities.

Remediant

Remediant

Remediant is the leader in Precision Privileged Access Management. We protect organizations from ransomware and data theft via stolen credentials and lateral movement.

Ceerus

Ceerus

Ceerus was created to simplify the process of deploying and managing security across all the channels in an organisation.

Horangi

Horangi

Horangi provides security products and services that enable the rapid delivery of Incident Response and threat detection for our customers who lack the scale, expertise, or time to do it themselves.

Data Security Inc

Data Security Inc

Data Security, Inc. is the leading American manufacturer and supplier of hard drive degaussers, magnetic tape degaussers as well as hard drive and solid state destruction devices.

Fend

Fend

Fend secures smart infrastructure. We provide a robust, highly secure way to have situational awareness of IoT enabled assets.

Phy-Cy.X Security Group

Phy-Cy.X Security Group

Phy-Cy.X specialize in the “Physics” of Information Security through both physical and cyber domains. We are not an IT company, we ARE an Information Security company.

Gray Analytics

Gray Analytics

Gray Analytics is a Cybersecurity Risk Management company providing best-practice services across a broad spectrum of cyber scenarios for both government and commercial customers.

Cufflink

Cufflink

Cufflink makes your business more secure, compliant and trusted. We limit the likelihood and impact of a data breach by controlling exactly what can and can't be done with personal data.

Singtel Innov8

Singtel Innov8

Singtel Innov8, the venture capital arm of the Singtel Group, invests in and partners with innovative technology start-ups globally.

Execweb

Execweb

Execweb are a cybersecurity executive network, comprised of 400+ security practitioners who work at Fortune 500 and SME companies.

Ignite Cyber

Ignite Cyber

IGNITE Cyber is focused on enabling secure technology adoption through intelligent business decisions. We are focused on providing a secure and stable business environment for everyone.

Kaine Mathrick Tech (KMT)

Kaine Mathrick Tech (KMT)

KMT deliver comprehensive cyber-first outsourced technology support and solutions that scale with your business.