Hearing before the House Permanent Select Committee on Intelligence. Homeland Security and Intelligence: Next Steps in Evolving the Mission



Similar documents
Department of Homeland Security Information Sharing Strategy

An Overview of Large US Military Cybersecurity Organizations

The Need to Share: The U.S. Intelligence Community and Law Enforcement

JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015

The Comprehensive National Cybersecurity Initiative

STATEMENT OF JOSEPH M. DEMAREST, JR. ASSISTANT DIRECTOR CYBER DIVISION FEDERAL BUREAU OF INVESTIGATION

CYBER SECURITY GUIDANCE

AT A HEARING ENTITLED THREATS TO THE HOMELAND

HOMELAND SECURITY INTELLIGENCE RPAD 556

The Next Generation Security Operations Center

Statement of. Mike Sena. President, National Fusion Center Association. Director, Northern California Regional Intelligence Center (NCRIC)

CyberSkills Management Support Initiative

Keynote: FBI Wednesday, February 4 noon 1:10 p.m.

WORLDWIDE SECURITY PROTECTION

NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY

Intelligence Analysis for Homeland Security RPAD 557

Chairman Johnson, Ranking Member Carper, and Members of the committee:

INTELLIGENCE AND ANALYSIS

Middle Class Economics: Cybersecurity Updated August 7, 2015

Law Enforcement and Homeland Security Anti-Terrorism Training

Integrating Cybersecurity with Emergency Operations Plans (EOPs) for K-12 Education

Cyber Security Research and Development: A Homeland Security Perspective

Application of Technology to Create an Integrated, Multidisciplinary Approach to Safe and Secure Ports

How To Create An Insight Analysis For Cyber Security

IN THE WAR ON TERRORISM

TESTIMONY OF ZOË BAIRD, PRESIDENT, MARKLE FOUNDATION CHAIRMAN, TASK FORCE ON NATIONAL SECURITY IN THE INFORMATION AGE

CYBER SECURITY INFORMATION SHARING & COLLABORATION

WRITTEN TESTIMONY OF

GAO CRITICAL INFRASTRUCTURE PROTECTION. Significant Challenges in Developing Analysis, Warning, and Response Capabilities.

Cybersecurity Enhancement Account. FY 2017 President s Budget

Written Statement of Richard Dewey Executive Vice President New York Independent System Operator

The Path Ahead for Security Leaders

DECLARATION STRENGTHENING CYBER-SECURITY IN THE AMERICAS

CyberSecurity Solutions. Delivering

DHS. CMSI Webinar Series

STATE OF MARYLAND Strategy for Homeland Security

Integrating Cybersecurity with Emergency Operations Plans (EOPs) for Institutions of Higher Education (IHEs)

v. 03/03/2015 Page ii

Course Title: HSE-101 Introduction to Homeland Security Prerequisites: None Credit Hours: 3 lectures, 3 hours

Issue Paper. Wargaming Homeland Security and Army Reserve Component Issues. By Professor Michael Pasquarett

U.S. Office of Personnel Management. Actions to Strengthen Cybersecurity and Protect Critical IT Systems

Working with the FBI

Department of Homeland Security

DoD Strategy for Defending Networks, Systems, and Data

National Security Overview - Australia

Utility-Scale Applications of Microgrids: Moving Beyond Pilots Cyber Security

ESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY AND DEFENCE SECTOR REFORM

Purpose of the Governor s strategy. Guiding Principles

US-CERT Year in Review. United States Computer Emergency Readiness Team

Establishing a State Cyber Crimes Unit White Paper

Cyber/IT Risk: Threat Intelligence Countering Advanced Adversaries Jeff Lunglhofer, Principal, Booz Allen. 14th Annual Risk Management Convention

BlacKnight. Cyber Security international A BUSINESS / MARKETING PRESENTATION

Intelligence Officer Career Guide

El Camino College Homeland Security Spring 2016 Courses

OVERVIEW OF THE ADMINISTRATION S FY 2005 REQUEST FOR HOMELAND SECURITY By Steven M. Kosiak

NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA

Image credits: Front cover: U.S. Army photo by Sgt. Brandon Little, Task Force XII PAO, MND-B Inside back cover: U.S Army photo by Staff Sgt.

Cyber Adversary Characterization. Know thy enemy!

Defense Security Service

COJUMA s. Legal Considerations for Defense Support to Civil Authorities. U.S. Southern Command Miami, Florida Draft

COUNTERINTELLIGENCE. Protecting Key Assets: A Corporate Counterintelligence Guide

7 Homeland. ty Grant Program HOMELAND SECURITY GRANT PROGRAM. Fiscal Year 2008

Confrontation or Collaboration?

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

(U) Appendix D: Evaluation of the Comprehensive National Cybersecurity Initiative

S. ll IN THE SENATE OF THE UNITED STATES

Liability Management Evolving Cyber and Physical Security Standards and the SAFETY Act

CRS Report for Congress

TESTIMONY. Analyzing Terrorism Risk HENRY WILLIS CT-252. November 2005

For More Information

FREQUENTLY ASKED QUESTIONS

THE WHITE HOUSE. Office of the Press Secretary. For Immediate Release February 12, February 12, 2013

PHILADELPHIA POLICE DEPARTMENT DIRECTIVE 7.17

INFORMATION SESSION GRADUATE CERTIFICATE IN TERRORISM ANALYSIS AT THE UNIVERSITY OF MARYLAND

Big Data Platform (BDP) and Cyber Situational Awareness Analytic Capabilities (CSAAC)

Testimony of Dan Nutkis CEO of HITRUST Alliance. Before the Oversight and Government Reform Committee, Subcommittee on Information Technology

JOB ANNOUNCEMENT. Chief Security Officer, Cheniere Energy, Inc.

NGA Paper. Act and Adjust: A Call to Action for Governors. for cybersecurity;

U.S. Defense Priorities OSD PA&E

The Geospatial Approach to Cybersecurity: An Executive Overview. An Esri White Paper January 2014

WENTWORTH MILITARY ACADEMY JUNIOR COLLEGE Lexington, MO Course Syllabus

TEXAS HOMELAND SECURITY STRATEGIC PLAN : PRIORITY ACTIONS

Statement for the Record. The Honorable Janet Napolitano. Secretary United States Department of Homeland Security

DHS, National Cyber Security Division Overview

Cyber security. Cyber Security. Digital Employee Experience. Digital Customer Experience. Digital Insight. Payments. Internet of Things

RETHINKING CYBER SECURITY

Transcription:

Hearing before the House Permanent Select Committee on Intelligence Homeland Security and Intelligence: Next Steps in Evolving the Mission 18 January 2012

American expectations of how their government secures the United States have evolved substantially, especially during the post-9/11 decade. From the post-world War II, 20th-century evolution of the national security architecture in the United States, focused on countering overseas nation-states with conventional forces, we now face requirements to protect at home. And not only to protect, but to prevent: the new, domestic security architecture is targeted more at securing borders, infrastructure, and cyberspace with defensive measures as it is at pursuing any single adversary with offensive measures. The growth of our expectations of domestic security, and the evolution of threats away from traditional state actors toward non-state entities -- drug cartels, organized crime, and terrorism are prominent examples -- suggest that the DHS intelligence mission should be threat agnostic. Though the impetus for creating this new agency, in the wake of the 9/11 attacks, was clearly terrorismbased, the kinds of tools now deployed, from border security to cyber protection, are equally critical in fights against emerging adversaries. The DHS enterprise is more complex than other agencies responsible for America s security, and its intelligence mission is correspondingly multifaceted. Its intelligence missions range from providing homeland security-specific intelligence at the federal level; integrating intelligence vertically through DHS elements; and working with state/local/private sector partners to draw their intelligence capabilities into a national picture and provide them with information. DHS, as it works to sharpen these missions, benefits from both a legislative mandate and a competitive advantage in a few areas that are unique within the federal intelligence community: 1

Securing borders and analyzing travel -- from threats such as terrorists, drug cartels, and alien smugglers -- including integrating travel data with other federal information; Protecting critical infrastructure, from advising transportation partners on how to secure new transport nodes to providing sectors with after-action analysis of the infrastructure vulnerabilities exposed by overseas attacks; and Preventing cyber intrusions, from red-teaming vulnerabilities in the US private sector to sharing best practices among corporate entities. Many agencies conduct all-source analysis of threat based on more traditional models of intelligence. As DHS grows its intelligence mission, though, we should understand that its development will benefit from unique data and responsibilities that other agencies do not share. The foundation for a separate DHS intelligence mission includes a few key elements: Access to unique, homeland-relevant data, such as CPB and ICE information; Responsibility for securing the border and critical infrastructure; Access to personnel who have intimate tactical knowledge of current issues and trends in these areas; and Responsibility for serving state/local partners as well as private sector partners in key infrastructure sectors. In an age of budget constraints, pressure on DHS to focus on core areas of responsibility and capability -- and to avoid emphasis on areas performed by other entities -- may allow for greater focus on these areas of core competency while the agency sheds intelligence functions less central to the DHS mission. Analysts and managers in Washington s sprawling intelligence architecture often 2

speak of the value of competitive analysis -- analysts at different agencies, for example, looking at similar problems to ensure that we miss no new perspective, no potentially valuable data source. There remains room for this type of analysis, but there are enough agencies pursuing the terrorist adversary to allow DHS to build a new analytic foundation that emphasizes data, analytic questions, and customer groups that are not the focus for other agencies. Analysis that helps private-sector partners better understand how to mitigate threats to infrastructure, for example, should win more resourcing than a focus on all-source analysis of general threats, such as work on assessing the perpetrators of attacks. Conversely, all-source analysis of terrorist groups and general terrorist trends should remain the domain of other intelligence agencies. In contrast to intelligence agencies that have responsibilities for more traditional areas of national security, DHS s mandate should allow for collection, dissemination, and analytic work that is focused on more specific homeward-focused areas. First, the intelligence mission could be directed toward areas where DHS has inherent strengths and unique value (e.g., where its personnel and data are centered) that overlap with its legislative mandate. Second, this mission direction should emphasize areas that are not served by other agencies, particularly state/local partners whose needs are not a primary focus for any other federal agency. In all these domains, public and private, DHS customers will require information with limited classification; in contrast to most other federal intelligence entities, DHS should focus on products that start at lower classification levels, especially unclassified and FOUO, and that can be disseminated by means almost unknown in the federal intelligence community (phone trees, Blackberries, etc.). 3

Partnerships and collaboration will be a determining factor in whether this refined mission succeeds. As threat grows more localized, the prospect that a state/local partner will generate the first lead to help understand a new threat, or even an emerging cell, will grow. And the federal government s need to train, and even staff, local agencies, such as major city police departments, will grow. Because major cities are the focus for threat, these urban areas also will become the sources of intelligence that will help understand these threats at the national level, DHS might move toward decentralizing more of its analytic workforce to partner with state/local agencies in the collection and dissemination of intelligence from the local level. This new approach to intelligence -- serving local partners requirements, providing intelligence in areas (such as infrastructure) not previously served by intelligence agencies, and disseminating information by new means -- reflects a transition in how Americans perceive national security. For this reason, state/local agencies, as clients for DHS intelligence, should also be involved in the development of requirements for what kinds of intelligence on emerging threats would be most helpful, from changing tactics for smuggling aliens into the United States to how to understand overseas terrorist incidents and translate them into analysis for the US. Similarly, different private sectors in the United States, from the hospitality industry to transportation, should drive requirements for DHS, in addition to serving as sources for information about what emerging vulnerabilities these industries are seeing. DHS should utilize existing public private partnerships to both drive requirements and aid distribution. 4

After the Mumbai attacks, for example, DHS intelligence might have partnered with private sector entities in the hospitality industries -- and state and local police agencies responsible for major hotel centers and ports -- to develop unclassified graphics and text explaining how the terrorists entered ports; how they breached perimeter security at facilities in the city; how security within facilities struggled during the ensuing battle; and how the attacks compared with other attacks in recent years against public buildings. Most or all of this information would have been available in public media, and it can be displayed in interactive, graphic format, with support from analysts who specialize not in international terrorism but instead in engineering, building security, port security, etc. The requirements for any product would have been driven by the hospitality industry and major city police chiefs. None of this bears any resemblance to what more traditional intelligence agencies have done since in post-wwii world of foreign intelligence; this type of analytic product is more closely aligned with the new, and growing, world of homeland security intelligence. By focusing intelligence collection, dissemination, and analysis in these areas, DHS could grow an intelligence architecture that builds on its core strengths, avoid competition with agencies in other areas, such as general terrorism analysis; and provide unique product and partnerships that other agencies not only lack but are will not view as their core competencies. Because homeland security intelligence requires a new understanding of products, customers, and delivery, training managers and analysts must reflect a way of doing business that is fundamentally different than the business practices taught at agencies that have focused historically on foreign intelligence. DHS might consider the development of a homeland security training institute that develops this training -- from new ways to portray information geospatially to different paths for developing requirements from state and local partners -- as an entirely new enterprise. This training 5

should include a separate element responsible for research, for bringing in American and foreign scholars who look at this issue, and for ensuring that doctrines for collecting, reporting, and analyzing knowledge in the homeland security environment is captured in one place and documented. The creation of DHS led to a rapid growth in a workforce, and a thirst for analytic product, that required the US Government to move quickly, before the foundations of homeland security intelligence were established and before we had the luxury of a full post-9/11 decade to understand where we need to go. We have an opportunity now to step back and review how much this new enterprise differs from traditional analysis, and how we can succeed, beyond what we understood even five years ago, in delivering new, innovative product to different customers. And in how we can develop simple processes through which they deliver clear requirements to analysts in Washington and at fusion centers across the country. This review provides that opportunity. 6