US Intelligence Ignores Open Source Data

The US' ability to monitor and analyse data and information requires that the US Intelligence Community (IC) gather, analyse information and strategic intelligence to anticipate geo- strategic shifts, as well as shorter-term intelligence so that the United States can respond to the actions and provocations of rivals both from within the US and externally

However, the US intelligence community has continued to ignore the usefulness of the enormous open sources of intelligence, simply because the information is publicly available and isn’t secret.

The intelligence community refers to monitor others using secret expensive classified satellites and intelligence-collection programs rather than to gather unclassified free information on the Internet. But intelligence should engage with open source as well as classified information and data.

Russia has conducted a strategic misinformation campaign to influence the results of elections in multiple countries, including the UK, Ukraine, France and the US and they did it on social media in view of everyone, except the intelligence officers who only look at classified sources. Because they did not engage with social media US officials said they were not warned about the fake news and misinformation. This also applied to China when senior advisors to the US government say  they do not understand enough about Beijing’s strategic goals and intentions.

Congress should have an open-source centre  that translates important Chinese documents for consumption by English-language readers. The US did have a method of analysis, but the US government took down its own open source center website.

This process of ignoring open sources also happened in  January when the Capitol in Washington DC was invaded by people who had organised, planned, and announced their plans to riot on-line.

The US government has an urgent need for intelligence based on open source information to understand and reveal foreign governments’ campaigns to harm the US and to identify the sources of online radicalisation campaigns and to better understand other countries’ strategy and tactics.

“And so the US Intelligence Community stands at the dawn of a new era of technological innovation and transformation unprecedented in its history.

“Driven by artificial intelligence (AI) and associated emerging technologies, including cloud computing, advanced sensors, and big data analytics, the approaching “AI era” will transform both the nature of the global threats the IC is responsible for assessing and the IC’s ability to accurately detect and assess them,” says the opening of a January 2021 report by the Centre for Strategic and International Studies.

CSIS:     RAND:      Washington Post:      Defense One:        

You Might Also Read: 

EU Court Rules Out Mass Online Surveillance:

 

« New Effective Network Firewall Security
More Women Cyber Security Professionals Needed »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

ComSec LLC

ComSec LLC

ComSec perform threat assessments to identify vulnerabilities and help protect businesses against corporate espionage via electronic eavesdropping.

HackLabs

HackLabs

HackLabs is a penetration testing company providing services for network security, web application security and social engineering testing.

Verimatrix

Verimatrix

Verimatrix is a global provider of innovative cybersecurity solutions that protect content, devices, software and applications.

Proteus

Proteus

Proteus is an Information Security consulting firm specialized in Risk Analysis and Executive Control.

Gulf Computer Services Co (GCSC)

Gulf Computer Services Co (GCSC)

Gulf Computer Services is a major player in the field of networking & Communication solutions for emerging industries such as Internet Services and Information Technology in Saudi Arabia.

CTM360

CTM360

CTM360 is a unified external security platform offering 24x7x365 Cyber Threat Management for detecting and responding to cyber threats.

Zuratrust

Zuratrust

Zuratrust provide protection for all kinds of email related cyber attacks.

Innovent Recycling

Innovent Recycling

Innovent Recycling provides a secure IT recycling & data destruction service to all types of organizations across the UK.

SecureThings

SecureThings

SecureThings focus is to provide guidance and technology to secure connected vehicles in order to build end-to-end security for the automotive industry.

PreEmptive Solutions

PreEmptive Solutions

PreEmptive Protection hit the sweet spot between cost, convenience and functionality by helping you protect and secure your apps in a smarter way.

Fifosys

Fifosys

Fifosys is a professional technology infrastructure specialist, delivering a broad portfolio of high quality technical and strategic managed services.

GLIMPS

GLIMPS

GLIMPS-Malware automatically detects malware affecting standard computer systems, manufacturing systems, IOT or automotive domains.

Transparity Cyber

Transparity Cyber

Transparity Cyber is dedicated to cybersecurity. As part of the Transparity Group we’re an established name in the Microsoft Cloud landscape, with a focus on cybersecurity excellence.

Gravitee

Gravitee

Gravitee helps organizations manage and secure their entire API lifecycle with solutions for API design, management, security, productization, real-time observability, and more.

Protectt.ai Labs

Protectt.ai Labs

Protectt.ai Labs is India’s first mobile security start up building awareness & providing solutions for mobile app, device & transaction security.

SixMap

SixMap

SixMap is a continuous threat exposure management platform that automatically provides comprehensive enterprise visibility, contextual threat intelligence, and a suite of remediation actions.