{"id":23912,"date":"2015-12-15T11:00:37","date_gmt":"2015-12-15T00:00:37","guid":{"rendered":"http:\/\/www.aspistrategist.ru\/?p=23912"},"modified":"2015-12-15T11:16:23","modified_gmt":"2015-12-15T00:16:23","slug":"whats-next-for-intelligence-in-an-encrypted-world","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/whats-next-for-intelligence-in-an-encrypted-world\/","title":{"rendered":"What\u2019s next for intelligence in an encrypted world?"},"content":{"rendered":"

\"1232005_d775d2c6bb_z\"<\/a><\/p>\n

John Coyne\u2019s recent Strategist post<\/em><\/a> raises some interesting questions for intelligence agencies and their paymasters; namely, what are the capabilities that agencies require to continue to protect our security, and what\u2019s a reasonable expectation of their success in doing so?<\/p>\n

The role of intelligence agencies has evolved, a point noted by Barack Obama<\/a> in January 2014. Rather than just collecting information on states for the use of policymakers, they\u2019re also expected to pre\u2011empt attacks planned by organisations in remote parts of the globe, closer to home or both, that by their nature can\u2019t be easily penetrated by human sources. Those organisations are also now increasingly aware of how to avoid technical collection methods<\/a> using readily available encryption technology and good operational security measures. In this environment, there\u2019s a need for new thinking on intelligence collection and management, and a better understanding among policymakers on what intelligence agencies are actually capable of.<\/p>\n

Similar to John and David Lang\u2019s<\/a> Strategist<\/em> posts, Thomas Rid<\/a> observed shortly after the Paris attacks that \u2018the encryption train has left the station\u2019. Rid further notes that the Trans-Pacific Partnership includes a clause prohibiting signatory states from banning or regulating encryption. However, the most difficult discussion isn\u2019t about encryption\u2014it\u2019s about looking at how security and intelligence agencies will collect and analyse information to produce actionable intelligence against the next generation of national security threats.<\/p>\n

In the wake of the Paris attacks, reports are emerging that there was information<\/a> stored on government databases that, if identified as information of interest and connected with other data, may have given an indication of the plot. Events such as Paris inevitably prompt renewed pledges to streamline the sharing of information, but information sharing in and of itself isn\u2019t the answer to preventing future tragedies.<\/p>\n

The principal challenge for intelligence agencies isn\u2019t necessarily collecting more information. Greater diversification of collection sources is a critical need, but without the means to collate and make sense of the vast repositories of information made available in the digital age, that\u2019s only a half measure. Additional technological solutions will be critical to sorting the wheat from the chaff, and more creative recruitment and training methods for analysts will be critical to make use of the information provided in more innovative ways, perhaps overcoming the lack of imagination noted by the 9\/11 Commission<\/a> as one of four key failures that attack revealed.<\/p>\n

It\u2019s been estimated that in 2014<\/a> there were 204 million emails sent every minute of the day, and Google processes<\/a> about 20 petabytes<\/a> of data every day. The amount of data available to intelligence agencies exceeds the capacity of governments to maintain human analysis assets. In this environment, more effort needs to be applied to technical means of cataloguing and classifying information, and more importantly, to automating data mining and analysis<\/a> to better identify patterns and anomalous behaviour at a scale not possible with human analysis, such as the Bayesian Learning Program<\/a> that is partly funded by DARPA and the US Air Force. This is even more critical for states like Australia that have access to the enormous collective knowledge of the Five Eyes enterprise. As John notes, this is particularly critical as signals intelligence declines as a source of actionable intelligence.<\/p>\n

With more efficient technical identification of people and networks of interest, intelligence agencies can expend a greater amount of effort on a smaller number of targets, better utilising human analysis personnel. That has obvious benefits, one of which is the ability to overcome some of the challenges of end-to-end encryption by accessing the devices the messages are sent to<\/a>. Other collection techniques can also be more efficiently targeted, including human sources, surveillance and imagery, to build a rich picture of actors and their networks.<\/p>\n

The other challenge for intelligence agencies is shaping expectations of their ability to detect and pre\u2011empt threats to security. Countless historical events teach us that intelligence agencies are fallible, if only because they are working to predict events that often fall outside regular expectations<\/a>. Beyond the unexpected, the hunt for Bin Laden<\/a>, and Saddam\u2019s weapons of mass destruction<\/a> should give some further indication of the limits of intelligence in contemporary circumstances. However there\u2019s some expectation, possibly perpetuated by dramatic portrayals of intelligence agencies, that they\u2019re all-knowing. Even as they work to more efficiently manage and use information collected from traditional and new sources, intelligence agencies need to work with their paymasters to better shape their expectations of what isn\u2019t possible.<\/p>\n

The 13\/11 attack in Paris and the intelligence \u2018failures\u2019 that occurred demonstrate ongoing issues in both the collection and analysis side of the intelligence production cycle, and more broadly, unrealistic expectations about the ability of intelligence and security agencies to prevent or pre\u2011empt attacks. More effort should certainly be placed on developing better links between organisations that have information that\u2019s of intelligence value and those agencies that need it. Information sharing is undoubtedly a key aspect to defeating the next generation of threats. Sharing that information in a meaningful way is the challenge that must be overcome. The solution to this will involve both humans and technology, but automation would appear to be critical to sifting the ever increasing amounts of data.<\/p>\n","protected":false},"excerpt":{"rendered":"

John Coyne\u2019s recent Strategist post raises some interesting questions for intelligence agencies and their paymasters; namely, what are the capabilities that agencies require to continue to protect our security, and what\u2019s a reasonable expectation of …<\/p>\n","protected":false},"author":364,"featured_media":23913,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[1],"tags":[391,1570,170,301],"class_list":["post-23912","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general","tag-cyber","tag-encryption","tag-intelligence","tag-national-security-2"],"acf":[],"yoast_head":"\nWhat\u2019s next for intelligence in an encrypted world? | The Strategist<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.aspistrategist.ru\/whats-next-for-intelligence-in-an-encrypted-world\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What\u2019s next for intelligence in an encrypted world? | The Strategist\" \/>\n<meta property=\"og:description\" content=\"John Coyne\u2019s recent Strategist post raises some interesting questions for intelligence agencies and their paymasters; namely, what are the capabilities that agencies require to continue to protect our security, and what\u2019s a reasonable expectation of ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aspistrategist.ru\/whats-next-for-intelligence-in-an-encrypted-world\/\" \/>\n<meta property=\"og:site_name\" content=\"The Strategist\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ASPI.org\" \/>\n<meta property=\"article:published_time\" content=\"2015-12-15T00:00:37+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2015-12-15T00:16:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/12\/1232005_d775d2c6bb_z.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"480\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Liam Nevill\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:site\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Liam Nevill\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\",\"url\":\"https:\/\/www.aspistrategist.ru\/\",\"name\":\"The Strategist\",\"description\":\"ASPI's analysis and commentary site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.aspistrategist.ru\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-AU\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/whats-next-for-intelligence-in-an-encrypted-world\/#primaryimage\",\"url\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/12\/1232005_d775d2c6bb_z.jpg\",\"contentUrl\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/12\/1232005_d775d2c6bb_z.jpg\",\"width\":640,\"height\":480},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aspistrategist.ru\/whats-next-for-intelligence-in-an-encrypted-world\/\",\"url\":\"https:\/\/www.aspistrategist.ru\/whats-next-for-intelligence-in-an-encrypted-world\/\",\"name\":\"What\u2019s next for intelligence in an encrypted world? | The Strategist\",\"isPartOf\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/whats-next-for-intelligence-in-an-encrypted-world\/#primaryimage\"},\"datePublished\":\"2015-12-15T00:00:37+00:00\",\"dateModified\":\"2015-12-15T00:16:23+00:00\",\"author\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/d81d6aff5a42bb8e53d00720fad0e936\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/whats-next-for-intelligence-in-an-encrypted-world\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.aspistrategist.ru\/whats-next-for-intelligence-in-an-encrypted-world\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.aspistrategist.ru\/whats-next-for-intelligence-in-an-encrypted-world\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.aspistrategist.ru\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What\u2019s next for intelligence in an encrypted world?\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/d81d6aff5a42bb8e53d00720fad0e936\",\"name\":\"Liam Nevill\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cfa81d9fb18f77771edc760e855ec75f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cfa81d9fb18f77771edc760e855ec75f?s=96&d=mm&r=g\",\"caption\":\"Liam Nevill\"},\"url\":\"https:\/\/www.aspistrategist.ru\/author\/liam-nevill\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What\u2019s next for intelligence in an encrypted world? | The Strategist","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.aspistrategist.ru\/whats-next-for-intelligence-in-an-encrypted-world\/","og_locale":"en_US","og_type":"article","og_title":"What\u2019s next for intelligence in an encrypted world? | The Strategist","og_description":"John Coyne\u2019s recent Strategist post raises some interesting questions for intelligence agencies and their paymasters; namely, what are the capabilities that agencies require to continue to protect our security, and what\u2019s a reasonable expectation of ...","og_url":"https:\/\/www.aspistrategist.ru\/whats-next-for-intelligence-in-an-encrypted-world\/","og_site_name":"The Strategist","article_publisher":"https:\/\/www.facebook.com\/ASPI.org","article_published_time":"2015-12-15T00:00:37+00:00","article_modified_time":"2015-12-15T00:16:23+00:00","og_image":[{"width":640,"height":480,"url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/12\/1232005_d775d2c6bb_z.jpg","type":"image\/jpeg"}],"author":"Liam Nevill","twitter_card":"summary_large_image","twitter_creator":"@ASPI_org","twitter_site":"@ASPI_org","twitter_misc":{"Written by":"Liam Nevill","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.aspistrategist.ru\/#website","url":"https:\/\/www.aspistrategist.ru\/","name":"The Strategist","description":"ASPI's analysis and commentary site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.aspistrategist.ru\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-AU"},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/whats-next-for-intelligence-in-an-encrypted-world\/#primaryimage","url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/12\/1232005_d775d2c6bb_z.jpg","contentUrl":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/12\/1232005_d775d2c6bb_z.jpg","width":640,"height":480},{"@type":"WebPage","@id":"https:\/\/www.aspistrategist.ru\/whats-next-for-intelligence-in-an-encrypted-world\/","url":"https:\/\/www.aspistrategist.ru\/whats-next-for-intelligence-in-an-encrypted-world\/","name":"What\u2019s next for intelligence in an encrypted world? | The Strategist","isPartOf":{"@id":"https:\/\/www.aspistrategist.ru\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.aspistrategist.ru\/whats-next-for-intelligence-in-an-encrypted-world\/#primaryimage"},"datePublished":"2015-12-15T00:00:37+00:00","dateModified":"2015-12-15T00:16:23+00:00","author":{"@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/d81d6aff5a42bb8e53d00720fad0e936"},"breadcrumb":{"@id":"https:\/\/www.aspistrategist.ru\/whats-next-for-intelligence-in-an-encrypted-world\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.aspistrategist.ru\/whats-next-for-intelligence-in-an-encrypted-world\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.aspistrategist.ru\/whats-next-for-intelligence-in-an-encrypted-world\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.aspistrategist.ru\/"},{"@type":"ListItem","position":2,"name":"What\u2019s next for intelligence in an encrypted world?"}]},{"@type":"Person","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/d81d6aff5a42bb8e53d00720fad0e936","name":"Liam Nevill","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cfa81d9fb18f77771edc760e855ec75f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cfa81d9fb18f77771edc760e855ec75f?s=96&d=mm&r=g","caption":"Liam Nevill"},"url":"https:\/\/www.aspistrategist.ru\/author\/liam-nevill\/"}]}},"_links":{"self":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/23912"}],"collection":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/users\/364"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/comments?post=23912"}],"version-history":[{"count":4,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/23912\/revisions"}],"predecessor-version":[{"id":23936,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/23912\/revisions\/23936"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media\/23913"}],"wp:attachment":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media?parent=23912"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/categories?post=23912"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/tags?post=23912"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}