The military is so busy combating cybermarauders that it has not been able to shape an overall strategic approach to securing cyberspace, said the head of intelligence for the Joint Staff. Rear Adm. Elizabeth Train, USN, director for intelligence, J-2, the Joint Staff, told the audience at the AFCEA Global Intelligence Forum in the National Press Club in Washington, D.C., that the cyberdomain is a multidimensional attack domain that threatens both the military and the private sector.
The same challenges facing the military now confront law enforcement as it embraces cyber capabilities. Disciplines ranging from data fusion to security are becoming integral parts of the curriculum for police officers.
Cathy Lanier, chief of the Washington, D.C., Metropolitan Police Department, did not understate the changes technology has wrought as she spoke at the AFCEA Global Intelligence Forum in the National Press Club in Washington, D.C. “It almost feels like completely reinventing police work,” she said.
New information technologies have advanced the state of the art in law enforcement at the local level, but police now find themselves facing challenges brought about these innovative capabilities. Problems of security and adversarial use of cyber have added to traditional problems that police departments have faced for decades.
Companies that are hacked have valuable information that can help prevent future cyber intrusions, said an FBI cyber expert. Rick McFeely, executive assistant director of the FBI’s Criminal, Cyber, Response and Services Branch, told the audience at the AFCEA Global Intelligence Forum in the National Press Club in Washington, D.C., that the bureau is depending on industry to share vital information on cyber attacks.
The FBI has created an information sharing portal for cyber defense modeled on its Guardian counterterrorism portal. Known as iGuardian, the trusted portal represents a new FBI thrust to working more closely with industry on defeating cyberthreats. It is being piloted within the longtime InfraGard portal, according to an FBI cyber expert.
Hackers need to pay a greater price for intrusions if network security is to be effective, said a former director of national intelligence. Adm. Dennis Blair, USN (Ret.), who also is a former commander of the U.S. Pacific Command, told the audience at the AFCEA Global Intelligence Forum in the National Press Club in Washington, D.C., that the nation needs to raise the cost to the hacker without breaking the bank for the defender.
Legislation that creates both positive and negative incentives may be necessary for industry to incorporate effective network security. The role of the insurance industry also can be brought to bear to convince companies it is in their best interest to ensure the sanctity of their data.
Many elected officials who opposed the National Security Agency’s (NSA’s) broad surveillance efforts were “demagogues” who did not know the real issues involved, said a member of the House Permanent Select Committee on Intelligence. Rep. Mac Thornberry (R-TX) told the morning audience at the AFCEA Global Intelligence Forum in the National Press Club in Washington, D.C., that the people in the House who voted to cut funding for the NSA’s surveillance efforts preferred taking a stand to understanding the situation.
The U.S. Senate is moving on a cyber bill that is more in line with the approach being taken by the House, said a member of the House Permanent Select Committee on Intelligence. Rep. Mac Thornberry (R-TX) told the morning audience at the AFCEA Global Intelligence Forum at the National Press Club in Washington, D.C., that this bill may be marked up by the Senate Commerce Committee this week.
Project Fishbowl spurs industry to meet military and intelligence community needs.
Robots slightly shorter than the average human may be able to connect portions of the offline world to the online world digitally. Knightscope Incorporated will soon be testing the K5 and K10 robots, which can autonomously prowl through large areas and small spaces, collecting significant amounts of data from their immediate surroundings. Applications include perimeter surveillance of military bases and inspection of power plants.
James Bond’s U.S. counterpart may be equipped more with commercial technologies than with systems developed in intelligence community laboratories. The private sector will be called upon to provide even more capabilities to help keep the intelligence community ahead of adversaries and budget cuts.
It’s time for military leaders, and yes, even members of the intelligence community, to come out from behind the curtain. They not only need to share with the public what networks and radios and tanks and guns mean to a warfighter’s safety but also what they mean to global security.
Planning for the AFCEA Intelligence symposium has begun, and it’s time to get with the program.
Free World intelligence communities are confronting a more difficult world in which dramatic changes are altering the geopolitical landscape faster than previously experienced. Both technology and human factors play a role in this dynamic realm, and both technological and human solutions will be necessary for the intelligence community to adjust accordingly.
The Emerging Professionals in Intelligence Committee (EPIC), one of AFCEA’s services to young professionals, sponsors its first speaker series event that will delve into congressional funding practices.
The 2013 Air Force ISR Industry Day scheduled for June 21, 2013, at the TASC Heritage Conference Center will now take place on October 31, 2013, at the National Geospatial-Intelligence Agency in Springfield, Virginia.
An established superpower is dealing with multiple threats to its interests around the world. An emerging global economic and military/naval power is making its presence felt throughout the world, particularly in Asia. The intelligence community is confronted with a complex environment punctuated by socio-economic power shifts and revolutions in communications, commerce and transportation. World intelligence organizations face internal and external terrorist and anarchist threats as well as exploding population growth and resource competition in strategically critical regions. Compounding these challenges are intelligence budgets that range from uncertain to non-existent.
One of the U.S. Defense Department’s top information technology officials says work is beginning on a multiaward contract for commercial cloud computing services, but the official says he has no timeline or total value for the business.