Alexander Will Be Last Intel Officer To Head NSA, Hayden Says
Posted on
CORRECTION Washington: Gen. Keith Alexander will likely be the last military intelligence officer to lead the National Security Agency, former CIA director Mike Hayden said today. “Keith Alexander [will be] the last intelligence officer to be the director of the National Security Agency,” was the hypothesis offered by Hayden during a intelligence and national security… Keep reading →
Sophisticated Missiles Looted in Libya; WH Terror Czar Worries al Qaeda May Get
Posted on
Washington: The White House’s top counterterrorism official expressed renewed worries today about terrorists getting their hands on sophisticated surface-to-air weapons as news reports confirmed mass looting of surface-air-missiles by Libya’s new transitional government. John Brennan, speaking at an intelligence conference organized by the Center for Strategic and International Studies and the Intelligence and National Security… Keep reading →
Air Force Tackles New Intel Mission
Posted on
Washington: The Pentagon’s top intelligence official has ordered the Air Force to set up a new intelligence unit to analyze the behavior of foreign-based commercial aircraft and integrate intelligence from the combatant commanders as the planes move through American airspace. Undersecretary of Defense for Intelligence Mike Vickers has tasked Air Force Secretary Michael Donley to… Keep reading →
Senate Presses DIA to Share Raw Data: ‘Connect the Dots’
Posted on
WASHINGTON: Lawmakers want the Pentagon’s intelligence shop to play nice with the rest of the intelligence community, and they have the program to do just that. Included in the Senate Armed Service Committee’s version of the fiscal year 2012 defense authorization bill, a Defense Intelligence Agency-led “pilot demonstration” program will allow the Pentagon to share… Keep reading →
DigitalAnts™ for Cyber-Defense
Posted on
Every computer attack is a battle between the owners of a computational infrastructure and adversaries bent on using these resources for their own purposes. The owners may span multiple organizations that have limited trust between them. Meanwhile, human adversaries are adaptively hostile, employing open-ended strategies and anti-forensic techniques. The problem of securing complex infrastructures in… Keep reading →