Reverse Deception: Organized Cyber Threat Counter-Exploitation (28 page)

Read Reverse Deception: Organized Cyber Threat Counter-Exploitation Online

Authors: Sean Bodmer

Tags: #General, #security, #Computers

BOOK: Reverse Deception: Organized Cyber Threat Counter-Exploitation
2.01Mb size Format: txt, pdf, ePub
Always use assets under your control (organic collection assets) before considering equipment or support from an external agency.
In some cases, agencies external to your organization might be the only ones who have the means for technical or human collection of information. And although you might work in proximity, they may still be the only ones with access to a specific asset or information. Build that rapport!
The folks back at headquarters can get collection assistance from other folks in the field to support your mission through information sharing. Share and share alike—you’ll be glad you did.
Communication is the key. Collection planning is a collaborative effort between the collector and the intended recipient. Communications is the key (did you get it that time?).
Collection planning is a living and dynamic process. Don’t let it wither on the vine. Don’t rely on only one collection method. There could be an unlikely situation where the batteries in the bug die. Now where are you a hero? Redundancy is your friend.
In the intelligence community, there are many means for collections. Be creative and strive to understand the different methods so that you will be a good steward of resources.

 

Principles of analysis exist at many levels, strategic through tactical—from the 10,000-foot level to down in the weeds. Regarding the NCIX core competencies, it appears there is latitude for interpretative flexibility. In staying on task, a solid winner returning the best bang for the buck would come from reflecting on the comments of one man, Richard Helms. Helms was the eighth Director of Central Intelligence (1966–1973). He believed in the following six specific principles of intelligence, which transcend time and organizations alike (“The Intelligence Professional Personified, A Life of Intelligence,” by David S. Robarge, in
The Richard Helms Collection
):

Focus on the core missions: collecting and analyzing foreign intelligence
Stick with your bread and butter; don’t be distracted by other tasks and activities.
Keep the game honest
Finished intelligence (completed and validated assessments) will feed national policy, so do your part. Don’t let policy manipulate intelligence, and don’t manipulate intelligence to guide policy.
Never wear two hats
Focus on foreign intelligence and do that job. Do not end up in debates or policy discussions. Leave that to the bureaucrats and red-tape manufacturers.
Stay at the table
Be involved and offer solutions. Not everyone likes the direction that senior management is going; do not become irrelevant. If you need to remind people that you are important, you’ve missed the boat. The US Army Forces Command (FORSCOM) is a major command that reports directly to the Secretary of the Army and is responsible for providing soldiers for combat to the Unified Combatant Commanders worldwide. Here is what they show as their mission statement (
www.forscom.army.mil/
): “U.S. Army Forces Command trains, mobilizes, deploys, sustains, transforms and reconstitutes conventional forces, providing relevant and ready land power to Combatant Commanders worldwide in defense of the Nation both at home and abroad.” Most of the wind goes right out of their sails when they insist to you that they are relevant. Reminding someone that you are important exposes that small truth that you are out of the game, well, you get the idea…
Serve only one President at a time
Keep on task with the current boss. Leadership will come and go. Change is inevitable.

Other books

A Lady Betrayed by Nicole Byrd
Asimov's SF, September 2010 by Dell Magazine Authors
Succubus Blues by Richelle Mead
Am I Normal Yet? by Holly Bourne
Clockwork Twist : Waking by Emily Thompson