The Internet of Things promises to change everyday life—and intelligence operations—but it remains far from reality, according to government and industry experts. Aspects ranging from security to architectures remain to be determined as changing technologies alter outlooks.
Intelligence community leaders who strive for greater transparency are vexed by leaks that undermine secrecy concerns. Yet, news reporters complain of stifling government security and seek to establish their own transparency through news leaks by government officials.
The very technologies that the intelligence community relies on to carry out its missions are threatening its ability to provide an accurate picture of its challenges and opportunities. Technology-driven information has no accountability, and many of its disseminators have very little perspective on truth, noted a panel during the final plenary session of the first day of the AFCEA/INSA Intelligence and National Security Summit 2014, being held September 18-19 in Washington, D.C.
U.S. forces will need to be actively supporting other nations’ ground forces if the Islamic State in the Levant (ISIL) is to be defeated and removed as a threat, said two leading members of the House Permanent Select Committee on Intelligence. Speaking at a plenary session during the AFCEA/INSA Intelligence and National Security Summit 2014, being held September 18-19 in Washington, D.C., the congressmen presented a bipartisan approach to several key intelligence issues.
The key to exploiting cyber intelligence is to understand your own organization in a threat context, said panelists at the AFCEA/INSA Intelligence and National Security Summit 2014, being held September 18-19 in Washington, D.C. Government and industry must understand their cyberthreats at both the tactical and strategic levels, panelists offered.
Defeating cyberthreats will require greater sharing among government and industry in new ways, according to cyber intelligence experts. A panel at the AFCEA/INSA Intelligence and National Security Summit 2014, being held September 18-19 in Washington, D.C., explored new issues in cyber intelligence information sharing.
The leaders of the U.S. intelligence community stated that the Snowden and Manning revelations of U.S. intelligence collection activities have done serious harm to U.S. national security in several ways. Three agency directors and one acting director stated that the ability to view the threat picture has been hamstrung as it is changing to an increasing degree.
U.S. intelligence agencies gave administration officials good advance information on Ukraine and the Islamic State in Iraq and the Levant (ISIL) activities before the crises unfolded, according to leaders of the agencies. Yet, inherent limitations prevented them from being able to measure transitional events.
The Internet of Things that will connect virtually all electronic devices in a surge of ubiquitous networking will be a target-rich environment to terrorists, saboteurs, criminals and other cybermarauders, according to a panel focusing on that aspect of future cyberspace.
Common aspects of life have increased in importance as the intelligence community girds to provide an accurate assessment of threats to decision makers. Food, water, energy and disease are moving up the priority list as disruptive elements worldwide, according to the U.S. director of national intelligence (DNI).
Demands that the intelligence community pursue operations that are absent any controversy are putting the nation at risk, warned the U.S. director of national intelligence (DNI). James R. Clapper described how a “perfect storm” of document leaks and budget cuts have led to a loss of trust with allies and partners and forced decisions to stop intelligence collection on some targets.
The Office of the Director of National Intelligence (ODNI) today released its 2014 National Intelligence Strategy of the United States of America in one version only—unclassified. James R. Clapper, U.S. director of national intelligence (DNI), rolled out the new strategy in his address to the opening plenary session at the AFCEA/INSA Intelligence and National Security Summit 2014, being held September 18-19 in Washington, D.C.
The intelligence community is striving to determine how it can work with industry early, before requirements for capabilities are confirmed, to get out ahead of challenges. Leaders want to adopt technology in some of the first phases rather than at the end. The Office of the Director of National Intelligence (ODNI) is looking to standardize capabilities across the intelligence community, determining how its many members can collaborate.
Cyber is the prime concern of the intelligence community, Sean Kanuck, national intelligence officer for cyber issues, Office of the Director of National Intelligence, said today at the Global Identity Summit in Tampa. Not only is cyber an immense problem in itself, but it also pervades all other national security concerns, including biometrics.
The password won’t die, but it’s killing us.
That was the message this morning from Jeremy Grant, senior executive adviser, National Strategy for Trusted Identities in Cyberspace (NSTIC), at the Global Identity Summit in Tampa. Estimates put the blame for 76 percent of network intrusions on weak passwords. Beyond security, they also affect commerce, as the majority of customers will leave websites rather than create accounts. Passwords are not beloved and are not doing us any favors, Grant explained.
“I’ve always assumed they enjoyed telling my story from their point of view.”
Frank Abagnale, the famous teenage confidence man turned law-enforcement adviser and expert on forgery, embezzlement and secure documents, spoke those words today to a crowd at the Global Identity Summit in Tampa, explaining that he never met most of the people who have created entertainment products about his life. Nor has he earned any money, because of his agreement with the U.S. government. The benefit has been an unsought notoriety that now allows him to tell his story of redemption and to explain that no technology can take the place of people with good character.
The National Strategy for Trusted Identities in Cyberspace (NSTIC) announced three new pilot programs this morning worth approximately $3 million. An additional almost $7 million is allocated for continued efforts in subsequent years.
Confyrm was awarded the largest contract, valued at around $1.2 million. It will pilot a shared signals solution to mitigate the impact of account takeovers and fake accounts through early fraud detection and notification with special emphasis on consumer privacy.
The FBI’s Next Generation Identification (NGI) system went live last week, replacing the Integrated Automated Fingerprint Identification System and improving accuracy. According to experts, the new system offers 99.6 percent correct identification versus 92 percent with the former. The NGI enables automation of 93 percent of searches. Other upgrades include connections with the National Palm Print System, an iris-modality repository and capabilities for more mobile detections.
The new generation of college graduates “don’t know or seem to care that their data is being [distributed] and sold to others, because they’re getting free stuff.” Duane Blackburn, currently with MITRE and formerly the assistant director for homeland security at the White House Office of Science and Technology Policy, made this point at the Global Identity Summit in Tampa today to explain generational differences regarding information sharing and privacy.
Biometric identification moved past fingerprints long ago, and the range of modalities is helping the keepers of law and order make a big difference in several ways. Last year, authorities apprehended a former European finance minister who had stolen thousands of Euros by using voice recognition software to identify the perpetrator through a phone message. Another tool combines facial recognition with a breathalyzer so that in addition to capturing blood alcohol content, the device can send a photo of the person to a repository website.