Just as an earlier panelist at the AFCEA Global Intelligence Forum in the National Press Club in Washington, D.C., emphasized the importance of the human element in cyber intelligence, a subsequent panel sounded the alarm for acquiring and keeping cyber personnel. Obsolete hiring rules and competition from the private sector loom large as impediments to the government’s ability to hire and retain effective cyber intelligence personnel.
Many elected officials who opposed the National Security Agency’s (NSA’s) broad surveillance efforts were “demagogues” who did not know the real issues involved, said a member of the House Permanent Select Committee on Intelligence. Rep. Mac Thornberry (R-TX) told the morning audience at the AFCEA Global Intelligence Forum in the National Press Club in Washington, D.C., that the people in the House who voted to cut funding for the NSA’s surveillance efforts preferred taking a stand to understanding the situation. Those who voted against cutting the NSA’s funding were the people who’ve been getting the intelligence briefings.
Legislation that creates both positive and negative incentives may be necessary for industry to incorporate effective network security. The role of the insurance industry also can be brought to bear to convince companies it is in their best interest to ensure the sanctity of their data.
These points were offered by Rep. Mac Thornberry (R-TX). He told the morning audience at the AFCEA Global Intelligence Forum in the National Press Club in Washington, D.C., that the government should pursue a private sector approach as part of its efforts to strengthen information security in the United States.
Hackers need to pay a greater price for intrusions if network security is to be effective, said a former director of national intelligence. Adm. Dennis Blair, USN (Ret.), who also is a former commander of the U.S. Pacific Command, told the audience at the AFCEA Global Intelligence Forum in the National Press Club in Washington, D.C., that the nation needs to raise the cost to the hacker without breaking the bank for the defender.
The admiral emphasized that he is not advocating the legalization of counter-cyber attacks—as much as the concept appeals to him. Instead, he called for legalization of “a myriad of nondestructive counter cyber attacks” that would raise the minimal cost to these hackers.
The FBI has created an information sharing portal for cyber defense modeled on its Guardian counterterrorism portal. Known as iGuardian, the trusted portal represents a new FBI thrust to working more closely with industry on defeating cyberthreats. It is being piloted within the longtime InfraGard portal, according to an FBI cyber expert.
Rick McFeely, executive assistant director of the FBI’s Criminal, Cyber, Response and Services Branch, told the audience at the AFCEA Global Intelligence Forum in the National Press Club in Washington, D.C., that information sharing with private industry is absolutely essential for defeating the cyberattacks on private networks.
The U.S. Senate is moving on a cyber bill that is more in line with the approach being taken by the House, said a member of the House Permanent Select Committee on Intelligence. Rep. Mac Thornberry (R-TX) told the morning audience at the AFCEA Global Intelligence Forum at the National Press Club in Washington, D.C., that this bill may be marked up by the Senate Commerce Committee this week. It would turn to standards established by the National Institute of Standards and Technology (NIST) for private sector guidelines.
Robots slightly shorter than the average human may be able to connect portions of the offline world to the online world digitally. Knightscope Incorporated will soon be testing the K5 and K10 robots, which can autonomously prowl through large areas and small spaces, collecting significant amounts of data from their immediate surroundings. Applications include perimeter surveillance of military bases and inspection of power plants.
The National Network of Fusion Centers, developed in the aftermath of the September 11, 2001, attacks, are a vital part of the nation’s homeland security efforts, according to experts on the Intelligence and Information Sharing Panel at AFCEA’s Homeland Security Conference in Washington, D.C.
The fusion centers serve as the primary focal point for the receipt, gathering and sharing of threat-related information among federal, state, local, tribal and territorial partners. Although largely funded through federal homeland security grants, the centers are owned and operated by local entities.
Greetings Fiscal Cliff Dwellers! By the time you read this there will be less than two weeks before automatic sequestration cuts take effect - - - a week of which the Congress will be in recess! What was meant to be a “poison pill” to force the legislative and executive branches to compromise on rational budgets so the government could reduce the deficit by $1.2 trillion over the next ten years now appears inevitable. Since January we have been fed a steady stream of increasingly dire consequences from Navy aircraft carriers not deploying, to Army readiness declining, to Air Force airplanes not being maintained, to civilian workers being furloughed, and to contracts being canceled unless there is some relief from the automatic 9.4% se
Unless we are existing in a weird parallel universe, the Mayan’s were clearly wrong about the world ending last month, but the National Intelligence Council’s “Global Trends 2030: Alternative Worlds” does warn the U.S. will likely lose its status as the planet’s only superpower by then. And how about that fiscal cliff?!? Lots of drama for New Year’s Day legislation that only raised taxes on those making $400k or more without any meaningful impact on reducing the deficit or dealing with sequestration. More or less a two month “U” turn at the fiscal cliff or a demonstration of “Democracy Inaction!”
The National Security Agency (NSA) is poised to deliver an initial cloud computing capability for the entire intelligence community (IC) that will significantly enhance cybersecurity and mission performance, and unleash the power of innovation for intelligence agencies, Lonny Anderson, NSA chief information officer, says.
A vision-driven robotic arm will enable the precise long-range delivery of a payload weighing up to one pound into difficult-to-reach environments. The capability is being made possible through a Defense Advanced Research Projects Agency (DARPA) project that adds depth perception to the range of unmanned aerial hover vehicles’ features. Using stereo vision, the unmanned aerial vehicle can estimate a target’s position relative to the hovering aircraft in real time, and then the system tracks where the payload must be placed and the motion of a robotic arm. Control logic maneuvers the vehicle and directs the robotic arm to engage a designated target and to place the payload.
Last month when we gathered around the browser, I was expressing my concerns about a “guns of October” scenario emerging in the Middle East and assuring you that I did not believe the attack in Benghazi on September 11 represented an intelligence failure. Within days of posting, the conflict in Syria expanded to Turkey retaliating with cross border fire against Assad’s government forces. Then on September 28th the DNI issued a statement clarifying that subsequent intelligence showed the attack on the US Consulate in Benghazi was not a spontaneous reaction to the YouTube “Innocence of Muslims” film trailer but rather it was a planned terrorist attack meant to kill Americans and embarrass the United States (
The U.S. government is adopting changes to the cloud computing certification program that will better protect against potential insider threats. The improvements include additional penetration testing, more thorough testing of mobile devices, tighter controls over systems being carried from a facility and more stringent scrutiny of systems connecting from outside the network.
The business world is taking a cue from the gaming world, increasingly using a system of incentives and old-fashioned competition to spur employee engagement. Gamification, which started out on video game screens with top score designations and leaderboards, is now helping companies meet real-life objectives.
“We’re taking what we know from games … and applying that to non-game contexts,” said Mike Campanelli, senior systems engineer at RadiantBlue Technologies, in a presentation from the AFCEA Emerging Professionals in Intelligence Committee to the entire Intelligence Committee.
The U.S. intelligence community has suffered significant damage from a perfect storm of insider revelations and budget cutbacks. Simultaneously, the threat picture confronting the United States has grown to an unprecedented level just when intelligence organizations are hampered in their efforts to continue to protect the nation.
The National Geospatial-Intelligence Agency is looking toward small business to provide vital technologies as the agency confronts budget constraints. Enticement efforts include targeted outreach, reshaped acquisition patterns and improved networking among potential contractors.
The relationship between small business and the National Geospatial-Intelligence Agency (NGA) is growing, says Sandra Broadnax, the small business director for the NGA. “We’re doing a lot more to embrace and bring industry to the table so that they can better understand our processes,” she states.
The United States is in the midst of preparing its largest intelligence hub outside of its own national borders. The center will accommodate operations with reach into several global areas, including those rife with anti-terrorism operations. Hundreds of millions of dollars are being poured into the work that includes consolidating resources from other installations.
Where human analysis might fail in the intelligence community, technological solutions are at the ready to fill the void. Companies are ginning up software programs that can prove to be key for intelligence analysts as they track the bad guys, so to speak—be they insider threats or an outside enemy.
The amount of data produced in the increasingly connected and virtual world makes it difficult for human beings to scour, catalog and process and mounting information and produce actionable intelligence. So industry is devising technological workarounds or complementary programs to ease the workload and make their efforts more effective.
Two closely related science and technology programs aim to improve image location and search capabilities, saving intelligence analysts significant time and effort.
U.S. intelligence analysts often must wade through enormous amounts of imagery—both photographs and videos—to uncover the exact information needed. To make matters worse, data often does not contain geolocation tags, which indicate where the images were taken.