Because it operates in the same realms as all the other military services, the U.S. Marine Corps counts interoperability as its intelligence.
The U.S. Coast Guard brings new capabilities to defense intelligence as it integrates operations with the other services.
The U.S. Army is expanding its intelligence activities both within its own forces and interoperably with the other services.
The growing customer list for defense intelligence is blurring traditional lines of distinction among activities and missions.
New threats such as cyberterrorism complement traditional threats such as weapons of mass destruction among the defense intelligence capabilities underpinning future intelligence activities.
Emerging and evolving threats join potential innovations as the drivers for intelligence technology development.
The National Security Agency is focusing inward and outward as it reshapes its technology policy.
Rather than devote valuable resources pursuing every possible technology solution, the intelligence community complements similar efforts in the commercial sector.
Intelligence oversight is an important function in a democracy. But, with transparency and secrecy requirements colliding, it becomes increasingly difficult the more it is pursued.
Other threats to the United States may make daily headlines, but space and cyberspace are below the public radar while at the top of many lists of concerns.
The United States has far better oversight and transparency about its intelligence operations than do many of the nations criticizing it, according to the two leading congressmen in the House Permanent Select Committee on Intelligence.
Defeating ISIL will require ground forces from Arab countries. The United States must step up and commit to supporting them if they are to prevail.
Technology-spawned information has become too untamed for government to manage it.
The flood of leaks from the intelligence community may be caused in part by classifying too much information as secret.
The Internet of Things offers the potential of a networking revolution. But, while the theory is sound, its realization must overcome many hurdles first.
The Internet of Things will be everything to malevolent cybermarauders. Terrorists, criminals and hackers will have a field day out-innovating the defenders of cyberspace.
The U.S. intelligence community had a good read on the unfolding events in Ukraine and with ISIL in Syria and Iraq. However, even the community's prescience has its limits.
Snowden and Manning have done serious damage to U.S. intelligence capabilities, and adversaries are adjusting their activities in response.
Cyber intelligence sharing must change its nature as well as expand its reach.
Organizations cannot hope to counter cyber intruders if they don't fully understand their own network and why they are targeted.