In my opinion this article is well written and explained the pro is all the information given, that could be used to protect one’s organization, and the con is that even though the information is given to the public, as the author stated, it is not for everyone, only large organizations with big global networks, for which threat intelligence gateways might benefit them for relatively inexpensive cost.
Hello, Dominique. I’ve enjoyed reading your post. Like you said prevent of inside threat is one of ways to conduct strategic counter intelligence. As we know, cyber security is crucial to protecting US computers, networks, programs and data unauthorized access. There are many cases that our government data has been stolen by the hackers from foreign entities including 4 million federal employee records. However, we can’t rule out the inside threats. There are so many spying cases from the insider whom worked either for foreign governments or businesses. These inside threats were not unnoticed for months and sometimes years and it caused great damage to US interests. Therefore, pursue of the real creation of a discipline in strategic counterintelligence
The DNI has modestly more power than the old Directors of Central Intelligence (DCIs), but not enough to give the ODNI/AIS real clout. “Herding cats” remains a decent description of the ODNI’s basic role. The DNI has several duties and responsibilities, but for the subject of improving intelligence information sharing the focus will be directed towards: Improving Analytics, Improving Information Security, Improving Foreign Liaison Relationships, and the end state of Improving Information Sharing.
H.R. 1731, the National Cybersecurity Protection Advancement (NCPA) Act, is bipartisan bill passed unanimously by the Committee on Homeland Security. This pro-privacy, pro-security bill ensures the sharing of cyber threats is transparent and timely. It strengthens the NCCIC’s role as the lead civilian interface for cyber threat information sharing by: Providing liability protections for the voluntary sharing of cyber threat indicators and defensive measures with the NCCIC or private-to-private. Granting liability protections for private companies to conduct network awareness of their own information systems. Allowing companies to operate defensive measures and conduct network awareness on information systems they own or operate. The NCPA Act also ensures personal information
Perhaps the most important change in how the federal government was reorganized after September 11th is the creation of both the Director of National Intelligence (DNI) position and the Office of the Director of National Intelligence (ODNI) in 2004 with the passage of the same IRTPA that created TSA. This concept had been first suggested in 1955 after a study by Congress then and was recommended time and again but only became a reality after the September 11th attacks drove the need for major intelligence reform home and the 9/11 Commission continued the push for the creation of such a position (ODNI, n.d., paras. 1-5). As one can see from the mission and vision of the ODNI, the importance cannot be overstated. The mission includes leading intelligence integration while having the IC produce the most insightful intelligence products possible and the vision is fully integrating the IC thus making the nation more secure (ODNI, n.d., paras. 1-2).
The world of cyber security continues to introduce new threats each year against network infrastructures and computer devices. In the recent years, the impact from cyber-attacks has wreaked havoc on many company brands and organizational reputations. As this issue grows so does the technology to prevent and protect against these malicious attacks. It is absolutely crucial for organizations and businesses to shift focus from defense for different types of attacks to improving safeguards to mitigate the loss of sensitive data when an attack occurs. In addition to the traditional security technology used to detect an attack, companies will have to include
The best way to address this issue is the use of a threat intelligence management platform. The “threat intelligence management platform” filters, gathers and analyzes data, and then delivers it in a standard format for inclusion in a variety of security systems and appliances (Comparing). Finally, it is important to remember that the organizations budget will play a major role in the choice of selecting threat intelligence services. The appropriate choice is to strive for consistency when interviewing potential service providers.
Intelligence in this day in age is a vital component of a countries security. The newest proposal increases intelligence spending between 2 and 3 billion dollars, a total adding to nearly $35 billion. In addition to military enhancement, the FBI and other law enforcement/intelligence agencies will also be included in this proposal. A new system has been proposed by President Bush that all information be shared among all agencies. DoD, FBI, and the Department of Counterterrorist Center have drawn closer together to create a Terrorist Threat Integration Center to evaluate information blended from all sources associated with terrorism and to act upon those findings accordingly.
In today’s IT world every organization has a responsibility to protect the information and sensitive data they have. Protecting data is not only responsibility of security and IT staff but every individual is involved in protecting the information. The risks to information security are not digital only, but it involves technology, people and process that an organization may have. These threats may represent the problems that are associated to complex and expensive solution, but doing nothing about these risks is not the solution.
The production, analysis, or dissemination of intelligence can be improve to provide actual benefit to homeland security leaders and practitioners in numerous ways. For this to happening, everyone who receives access to intelligence reports must be educated about intelligence itself and willing to understand it. The Washington Post reported in 2004, no more than six senators read beyond the five-page executive summary of the NIE, although 77 senators voted to authorize the use of force in Iraq. (Lowenthal, 2008). Even though it was inevitable of going to war with Iraq. The NIE can foreshadow problems to occur, and could have aid senators in different ways. From understanding the situation better, to helping with foreign policy. Homeland security leaders and practitioners must be direct of what types of reports they are requiring.
The ever changing threat landscape has resulted in increased challenges for organizations to safeguard their information assets. Today, organizations are forced to assess their entire IT ecosystem, both their own IT infrastructure and the IT infrastructure of third party service providers and vendors. The close interconnection
National security and the other intelligence agencies have played a major role in today’s society in regards to protecting our country. In this analytic paper I will discuss and reflect on the personal skills, abilities, and benefits of the five different intelligence community agencies that operate under their own instruction and training, but serves as the same purpose of defending the United States of America. The five different intelligence agencies are the Federal Bureau of Investigation (FBI), Department of Homeland Security, U.S. Navy Intelligence, Drug Enforcement Administration (DEA), and the Central Intelligence Agency (CIA).
West, J., & Mar, S. (2017). Fundamentals of a cybersecurity program. Internal Auditor. Retrieved from
Espionage has been a part of America since its earliest days. Today it is not surprising to hear of newer forms of spying like a cyber-attack on a federal agency or intrusions into nuclear power plants that could potentially cause grave damage. One current example of an espionage event officially named by the FBI as Operation Ghost Stories occurred around the 2010-time frame. The FBI ran an investigation of at least ten Russian spies that had embedded themselves in communities, universities, and jobs without anyone suspecting (FBI). These deep-cover spies used stolen identities to obtain a front of being “normal” Americans that to all but knew their true identities. They assimilated into the fabric of our country, and their intent was to gather intelligence and to strike at a strategic time that could occur years down the road. It is not wonder that organizations are concerned when they have so much riding on keeping their networks secure. One method that companies have used to keep their secrets more secure is by using an intranet.
Good post and you did bring out some interesting points regarding intelligence products. I would have to agree with you on the power point aspect, because we do use power point to support our briefings and those are the same power points are sent out across the field as finished products. There are positive and negative points to using power point, but even then we still have to comply with some academic formats, especially when it comes to references. Nonetheless, I would not consider those scholarly works, but more of intelligence products developed to be used in operational environment.
The business tool ultimately aims at identifying weaknesses and threats and focuses on how these can be transformed into