Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

3/25/2015
02:30 PM
Connect Directly
Twitter
RSS
E-Mail
100%
0%

FBI Threat Intelligence Cyber-Analysts Still Marginalized In Agency

Despite good progress, 9/11 Review Commission says that analysts could have a greater impact on FBI counter-terrorism activities if they had more domain awareness, forensics capabilities, and were more empowered to question agents.

FBI threat intelligence analysts, a position created post-9/11, have proven their worth to counter-terror operations, but their impact has been limited by a lack of domain awareness, insufficient computing technology, and a lack of status within the Bureau, according to a report released today by the FBI 9/11 Review Commission. While the analysts are providing agents with tactical input, they are not yet participating in any strategic way.

Part of the intelligence analysts' job description, as described by FBIAgentEdu.org, is cyber-forensics and cyber-surveillance -- investigating computer evidence at crime scenes, retrieving information secured on info systems, and using linguistic and decryption technologies to decipher high-priority intel.  

[Everything you need to know about today’s IT security challenges – but were afraid to ask. Register with Discount Code DRBLOG to save $100 for this special one-day event, Dark Reading's Cyber Security Crash Course at Interop on Wednesday, April 29.]

The Commission credits the Bureau with making a lot of progress to this point. Ten years ago, the FBI changed its focus, "re-aligned its intelligence and law enforcement missions and re-invented itself into a threat-based organization." This includes threats to critical infrastructure -- both physical and logical components, and the control systems that combine the two. 

The Bureau tripled the size of its intelligence workforce and creating more definitive career tracks for these staff members. However, what these cyber-threat intelligence analysts have not been given are opportunities to develop the sort of domain intelligence that traditional FBI agents have -- and this is where the Commission thinks the Bureau needs to improve.

For example, the report cites the example of Nidal Hasan, a US citizen and US Army Major who shot 13 people to death and wounded 32 others in 2009 at a Soldier Readiness Center in Texas, after learning he would be deployed to Afghanistan. In 2008, before this attack, it was known that Hasan was having email conversations with Anwar Al-Aulaqi, a Yemen-based al-Qa'ida operative.

As the report explains, "Despite the fact that an active-duty US Army Major was e-mailing a known al-Qa’ida ideologue and facilitator who was the subject of an ongoing FBI investigation, the e-mail generated little concern in the context of what the Webster Commission termed a 'crushing' volume of data."

An analyst with both access to the data and more background knowledge of the threat would have a better time helping identify the most important pieces in that "'crushing volume of data,'" but as the report states:

"Intelligence analysts embedded in counterterrorism squads were valued for the tactical intelligence support they provided for the cases, but domain intelligence needs to be enhanced to identify plots in the relevant field offices’ area of responsibility and intelligence analysts must be empowered to question special agents’ operational assumptions."

To improve that going forward, the Commission recommends the FBI "increase opportunities for sabbaticals and academic training, detail assignments to other agencies, temporary overseas duty tours, and outreach to scholars on core national security issues. The purpose of these trainings and assignment opportunities is to facilitate innovative thinking and, therefore, better enable the FBI’s intelligence analysts (IAs) to identify emerging threats."

Similarly, the Commission found that the cyber division was more segmented, put in a support capacity, and underfunded, so that when new threats hit, they weren't given new resources to respond, and just had to shuffle those resources around.

The Commission reviewed the case of David Headley, a US citizen who helped plan an al-Qa'ida attack on a Danish newspaper in 2009 and provided intelligence, surveillance and reconnaisance for the Lashkar-e-Taiba attack in Mumbai in 2008. In Headley's case, there were a variety of leads that pointed to him, but they were spread across a variety of agencies that collect such data. It highlighted weaknesses in the information sharing, computer system integration, and data analysis capabilities across the U.S. Intelligence Community, and how the sheer volume of data compounds the problem. As the report states:  

"The Headley case raises the important question faced by all intelligence agencies––certainly important to the FBI––of how to scan and assess voluminous amounts of collected information strategically and identifying valuable intelligence leads. Still, more than a decade after 9/11, the FBI must prioritize empowering and equipping its analytic cadre to make these connections with cutting edge technology, to minimize the risk of the FBI missing important intelligence information."

Sara Peters is Senior Editor at Dark Reading and formerly the editor-in-chief of Enterprise Efficiency. Prior that she was senior editor for the Computer Security Institute, writing and speaking about virtualization, identity management, cybersecurity law, and a myriad ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Marilyn Cohodas
50%
50%
Marilyn Cohodas,
User Rank: Strategist
3/26/2015 | 4:42:26 PM
Very disturbing...
It's tragic to read about the credible threat intellegience that could have prevented US Army Major Nidal Hasan from killing 13 people. Will more be done in the future? I hope so. But, sadly, I'm not holding my breath.
Where Businesses Waste Endpoint Security Budgets
Kelly Sheridan, Staff Editor, Dark Reading,  7/15/2019
US Mayors Commit to Just Saying No to Ransomware
Robert Lemos, Contributing Writer,  7/16/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Building and Managing an IT Security Operations Program
As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-14230
PUBLISHED: 2019-07-21
An issue was discovered in the Viral Quiz Maker - OnionBuzz plugin before 1.2.7 for WordPress. One could exploit the id parameter in the set_count ajax nopriv handler due to there being no sanitization prior to use in a SQL query in saveQuestionVote. This allows an unauthenticated/unprivileged user ...
CVE-2019-14231
PUBLISHED: 2019-07-21
An issue was discovered in the Viral Quiz Maker - OnionBuzz plugin before 1.2.2 for WordPress. One could exploit the points parameter in the ob_get_results ajax nopriv handler due to there being no sanitization prior to use in a SQL query in getResultByPointsTrivia. This allows an unauthenticated/un...
CVE-2019-14207
PUBLISHED: 2019-07-21
An issue was discovered in Foxit PhantomPDF before 8.3.11. The application could crash when calling the clone function due to an endless loop resulting from confusing relationships between a child and parent object (caused by an append error).
CVE-2019-14208
PUBLISHED: 2019-07-21
An issue was discovered in Foxit PhantomPDF before 8.3.10. The application could be exposed to a NULL pointer dereference and crash when getting a PDF object from a document, or parsing a certain portfolio that contains a null dictionary.
CVE-2019-14209
PUBLISHED: 2019-07-21
An issue was discovered in Foxit PhantomPDF before 8.3.10. The application could be exposed to Heap Corruption due to data desynchrony when adding AcroForm.