Kevin G. Coleman

 

Posts by Kevin G. Coleman

Ever consider the massive amount of intelligence that the United States collects and uses in the defense of the country and our allies? It is surely massive given the scope of our collection effort.

Many people do not realize that the U.S. intelligence community is comprised of 16 separate agencies, not including the Office of the Director of National Intelligence which is responsible for leading intelligence integration. These agencies are tasked with foreign and domestic intelligence collection, analysis support of military planning, and in some cases performing acts of espionage:

  1. Central Intelligence Agency (CIA)
  2. Air Force Intelligence, Surveillance and Reconnaissance Agency (AFISRA)
  3. Army Intelligence and Security Command (INSCOM)
  4. Defense Intelligence Agency (DIA)
  5. Marine Corps Intelligence Activity (MCIA)
  6. National Geospatial-Intelligence Agency (NGA)
  7. National Reconnaissance Office (NRO)
  8. National Security Agency (NSA)
  9. Office of Naval Intelligence (ONI)
  10. Office of Intelligence and Counterintelligence (OICI)
  11. Office of Intelligence and Analysis (I&A)
  12. Coast Guard Intelligence (CGI)
  13. Federal Bureau of Investigation (FBI)
  14. Office of National Security Intelligence (DEA/ONSI)
  15. Bureau of Intelligence and Research (INR)
  16. Dept of Treasury’s Office of Terrorism and Financial Intelligence (TFI)

Source: Wikipedia

Now we have to add U.S. Cyber Command to that list.

In addition, we have to add all the private sector organizations that have established their own security intelligence and cyber intelligence gathering and analysis capabilities as well as those in industry protecting against cybersecurity threats as well.

Oh – we should not forget the state and local law enforcement intelligence units that exist around the country.

Now let’s add the black-ops (clandestine) intelligence community members.

Add them all up and that paints a reasonable picture of the intelligence coverage we have in place. It sounds like allot, but given the number of kinetic and non-kinetic threat we face, it’s not!

One has to wonder how much more effective our intelligence efforts could be if regulations requiring separation did not exist and a collaborative/sharing environment along with the systems required for collaborative support were in place.

While those regulations were probably put in place for good reason when they were enacted, times have changed. Maybe it is time to revisit the restrictions.

Kevin G. Coleman is a long-time security technology executive and former Chief Strategist at Netscape. He is Senior Fellow with the Technolytics Institute where he provides consulting services on strategic technology and security issues. He writes a weekly blog for Breaking Gov on the topic of cyber intelligence.


As we approach the 2012 presidential election, concerns are being raised about the likelihood of cyber attacks leading up to and during that event. There are many individuals, groups and rogue nation states that would like nothing better than to disrupt this year’s election.

Several months ago, a video was posted by those claiming to be from the well know hacktivist group Anonymous that alluded to plans for launching cyber initiatives that target the 2012 presidential election. Keep reading →


After years of the public and private sectors having listened to the nearly constant cyber threat warnings issued by military and government officials, as well as industry experts, over the past few years, addressing the threats posed to our systems by cyber attacks is now appropriately considered as a work-in-process.

There are some signs that the private sector might be moving to address the new heightened level of cyber security threats, however. Keep reading →

The head of Iran’s Presidential Center for International Legal Affairs has announced that Iran plans to bring legal action against those that launched cyber attacks against their uranium enrichment equipment in a move that promises to raise the stakes for the U.S. cybersecurity policy officials.

Majid Jafarzadeh made the announcement this week after consulting Iranian and foreign legal experts, saying Iran has decided to file a lawsuit against the “cyber terrorists” who have attacked the country’s nuclear enrichment infrastructure. Keep reading →

Underground movements are not uncommon, but the apparent ground swell that has taken place in the cyber underground has caught the attention of traditional and cyber intelligence organizations around the world.

Call them covert, clandestine, black-market – whatever title you choose to put on these activities – the fact remains there is a growing community of underground groups and individuals with diverse missions and objectives. These groups develop and acquire sophisticated cyber weapons that are used in highly targeted attacks against their enemies. Keep reading →

Few people would dispute that the United States is in the cross-hairs when it comes to cyber attacks. After all, the U.S. is the country that is the most dependent on the Internet as a component of our critical infrastructure.

Cyber attacks on our critical infrastructure have evolved over the years and pose a substantial threat that should concern everyone. Keep reading →


Just recently, nCircle conducted a survey of 181 IT security professionals at Blackhat’s annual conference.

That survey found that 36 percent of those surveyed admitted to returning cyber fire. That is out-right retaliatory hacking! But that should not be a surprise to anyone involved in this area. Keep reading →


The Bipartisan Policy Center produced a report that is getting a fair amount of attention and raising some concerns. The report stated that the number of cyber attacks appears to be on the rise, along with financial losses.

This data was based on information from October 2011 through February 2012. The report indicates, that over 50,000 cyber attacks on private and government networks were reported to the Department of Homeland Security, including 86 attacks on “critical infrastructure networks.” Information also indicated that many private firms keep the fact that they experienced a cyber attack secret “because of fears, some justified, including harm to their reputations and potential loss of customers.” Keep reading →

We have entered a new age of modern conflict. This new age is different from those we have experienced in the past and perhaps even more challenging. The military has dubbed cyber as the 5th domain and have embarked on establishing the capabilities for offensive, defensive and intelligence collection and analysis in this domain.

However, many are attempting to address this threat as they did traditional forms of conflict. Some have gone as far as to compare what has been called a cyber arms race to the cold war. Recent conversations and witnessed actions are cause for concern. Keep reading →

Conventional arms transfers – Exports (US$ millions – 2005; 1990 prices). Refers to the voluntary transfer of weapons destined for the armed forces or intelligence agencies of another country. It includes ships, aircraft, missiles, artillery, armored vehicles and guidance and radar systems. It excludes trucks, services, ammunition, small arms, support items, components and component technology. SOURCE: Stockholm International Peace Research Institute.

The 193 United Nations diplomats are driving a treaty that would be the first legally binding global treaty that would regulate the international arms trade. This treaty is expected to promote transparency and accountability in the arms trade. This is not new! Keep reading →

Page 2 of 8123456...8