Intelligence Community Help Wanted: Open Source Ninjas
OPINION – For those who have been privileged enough to read, write for, or brief the Intelligence Community’s President’s Daily Brief (PDB), the following quote […] More
OPINION – For those who have been privileged enough to read, write for, or brief the Intelligence Community’s President’s Daily Brief (PDB), the following quote […] More
OPINION — Publicly Available Information (PAI), and its related discipline Open Source Intelligence (OSINT), have long been perceived in government as less vital to national […] More
“The U.S. intelligence community must invest in understanding its own business model to make data-driven decisions for the future,” argue authors Katrina Mulligan, Cipher Brief […] More
Every morning, analysts, operators, and policymakers arrive at their desks to read the latest news and intelligence reporting that has come in during the past […] More
National Geospatial-Intelligence Agency Deputy Director Susan Gordon on Wednesday called for the government and Intelligence Community to prioritize innovation to better confront the broad array […] More
If there has been one constant in President Donald Trump’s administration, it is the steady stream of leaks of classified information. As investigators dig into […] More
Stranded during a historic Washington-area blizzard in February 2010, a U.S. soldier embarked on a mission that he had sworn to not fulfill: “…I joined […] More
The interesting thing about the Apple vs. FBI encryption debate is that that there is little disagreement that encryption is a valuable tool for protecting […] More
One of the key lessons of 2015 was that cybersecurity is more important than ever – a lesson that Sony and the Office of Personnel […] More
Countering cyber-threats can be difficult, and information sharing has come to be seen as a constructive way to attack the problem. Elaine Lammert, a former […] More
Threat intelligence sharing has a complex history within the security industry. The premise is simple: cybercriminals will often launch attacks with similar components, using the […] More
Late last year, the text of the Cybersecurity Information Sharing Act (CISA) found its way into a consolidated spending bill and was signed into law […] More
The government is in a bind – it wants to stop criminals and terrorists, but it also wants to support strong encryption. Navigating this quandary […] More
The private sector perspective on encryption technology is critical to understanding the crux of the debate. Amid news that Dell had agreed to buy RSA’s […] More
Michael Chertoff, the former Secretary of the Department of Homeland Security, sat down with The Cipher Brief to explain why he believes a secure communications […] More
When the Clinton Administration decontrolled encryption in the late 1990s after a long and acrimonious debate, it did so because it had decided that the […] More
“Are we so mistrustful of government—and of law enforcement—that we are willing to let bad guys walk away…willing to leave victims in search of justice?” […] More
According to press reports, the White House has considered and rejected four options to address the so-called “going dark” problem where the growing ubiquity of […] More
Mike Rogers is a former Congressman who served as the chairman of the House Permanent Select Committee on Intelligence. In a discussion with The Cipher […] More
Search