News & Events

Last chance to secure your seat! Special Session: Monitoring the Iran Nuclear Deal – August 31 – Register Now!

Presented by:

 

Monitoring the Iran Nuclear Deal

The ability of the United States and other states to monitor the terms of the nuclear deal with Iran is obviously a key issue in the decision to accept this accord, or not. Monitoring and verifying arms control agreements is an area where the United States has over forty years of experience but the overall process if far from straightforward.

This briefing will review the following topics:

  • What do we mean by monitoring? Who does that?
  • What do we mean by verification? Who does that?
  • How do these differ from nuclear safeguard agreements?
  • What are the key monitoring and verification concerns in the Iran agreement?

Date: Monday, August 31, 2015

Time: 8:30 – 11:30 am

Location:
4121 Wilson Boulevard, Suite 200 (2nd Floor)
CENTRA Technology Conference Center
Arlington, Virginia 22203

Registration fee: $300

Requirements: U.S. citizenship; private sector

Joseph DeTrani
President of INSA; former Senior Advisor to the Director of National Intelligence and the Director of the National Counterproliferation Center and the Intelligence Community Mission Manager for North Korea; Special Envoy for Six-Party Talks with North Korea, with the rank of Ambassador, and as the U.S. Representative to the Korea Energy Development Organization (KEDO).

Mark Lowenthal
President of the Intelligence & Security Academy; former Assistant Director of Central Intelligence for Analysis & Production; participant in U.S. arms control deliberations, 1983-89.

Follow this link to register through INSA today!

 

Special Session: Monitoring the Iran Nuclear Deal – August 31 – Register Now!

Presented by:

Monitoring the Iran Nuclear Deal

The ability of the United States and other states to monitor the terms of the nuclear deal with Iran is obviously a key issue in the decision to accept this accord, or not. Monitoring and verifying arms control agreements is an area where the United States has over forty years of experience but the overall process if far from straightforward.

This briefing will review the following topics:

  • What do we mean by monitoring? Who does that?
  • What do we mean by verification? Who does that?
  • How do these differ from nuclear safeguard agreements?
  • What are the key monitoring and verification concerns in the Iran agreement?

Date: Monday, August 31, 2015

Time: 8:30 – 11:30 am

Location:
4121 Wilson Boulevard, Suite 200 (2nd Floor)
CENTRA Technology Conference Center
Arlington, Virginia 22203

Registration fee: $300

Requirements: U.S. citizenship; private sector

Joseph DeTrani
President of INSA; former Senior Advisor to the Director of National Intelligence and the Director of the National Counterproliferation Center and the Intelligence Community Mission Manager for North Korea; Special Envoy for Six-Party Talks with North Korea, with the rank of Ambassador, and as the U.S. Representative to the Korea Energy Development Organization (KEDO).

Mark Lowenthal
President of the Intelligence & Security Academy; former Assistant Director of Central Intelligence for Analysis & Production; participant in U.S. arms control deliberations, 1983-89.

Follow this link to register through INSA today!

 

Cyberforce Superiority™: Executive/Managers Course – October 2015

Secure your seat now for
Cyberforce Superiority™

Cyberforce Superiority™, training cyber operators
to be more broadly based, integrating offense, defense and
forensics into a holistic program. 

Executive/Managers Course
October 26-30, 2015

Arlington, Virginia

The Executive/Managers Course gives students a technical sampling of the complete belt series in an immersive five-day offering.

Unlike most cyber training courses that emphasize either computer security or hacking skills, our course is designed to give students a preliminary integrated understanding of the methodologies and interrelated offensive and defensive factors that come into play when training a cyber warrior.  Students will learn a sample of the introductory, mid-level, and high-level tactics used for Computer Network Operations (CNO) including Computer Network Attack (CNA) & Computer Network Exploitation (CNE), Computer Network Defense (CND), as well as Computer forensics.  Topics of instruction include: ethical hacking, Boolean Logic, networking for both advanced Unix and Windows, vulnerability identification, computer exploit development, and reverse engineering.

This is a practical course with instruction that is focused on in-class computer exercises and lab work.   This course is ideal for executives, managers and supervisory personnel who play a role in planning, operations, risk assessment, policy, and ethics.  This course also allows the more technical student to benchmark his or her skills against the entirety of curriculum learning objectives.

These courses are offered in partnership with Raytheon Solipsys. 

 

CIA plans major reorganization and a focus on digital espionage

CIA plans major reorganization and a focus on digital espionage

The Washington Post
By Greg Miller
March 6, 2015

The CIA embarked on a sweeping restructuring Friday that will bring an end to divisions that have been in place for decades, create 10 new centers that team analysts with operators, and significantly expand the agency’s focus on digital espionage.

The plans were unveiled by CIA Director John Brennan to a workforce in which thousands of employees are likely to see changes in which departments they work for, the lines of authority they report to and even where they sit.

The overhaul is designed to foster deeper collaboration and an intensified focus on a range of security issues and threats, replacing long-standing divisions that cover the Middle East, Africa and other regions with hybrid “mission centers” modeled on the CIA’s Counterterrorism Center.

The CIA will also create a directorate focused exclusively on exploiting advances in computer technology and communications. The Directorate of Digital Innovation will rank alongside the agency’s operations and analysis branches, and it will be responsible for missions ranging from ­cyber-espionage to the security of the CIA’s internal e-mail.

In a briefing with reporters, Brennan described the far-reaching changes as “part of the natural evolution of an intelligence agency” that has not seen a significant reorganization in decades.

A central aim, he said, is to eliminate “seams” in coverage that lead to confusion over which part of the agency is responsible for tracking a specific issue or threat. After the reorganization, Brennan said, the CIA should be in position to “cover the entire universe, regionally and functionally, and so something that’s going on in the world falls into one of those buckets.”

The changes, however, are also likely to create turmoil at a time that Brennan and others frequently characterize as the most complicated and challenging period for intelligence agencies in a generation. Brennan said the plan has been received enthusiastically by most at the agency, but there have also been signs of friction and disagreement.

The head of the CIA’s clandestine service recently decided to retire abruptly in part because of opposition to a plan that would strip his position of much of its authority over the agency’s covert operations overseas and the teams of spies that it deploys.

CIA veterans and experts described the restructuring as among the most ambitious since the agency was founded in 1947.

“This is a major reorganization, one of the largest and most fundamental they’ve had,” said Mark M. Lowenthal, a former senior CIA officer and an expert on the history of the U.S. intelligence community. Lowenthal also expressed concern that replicating the Counterterrorism Center may also mean replicating an approach criticized at times for being too driven by short-term objectives such as finding the next target for a drone strike.

“Where in this does John have what I would think of as his intellectual strategic reserve, people not worried about day-to-day stuff but who think about what is going to happen two years out?” Lowenthal said. “The centers tend not to do that. They tend to answer today’s mail.”

But Brennan defended the reforms as critical to the agency’s viability in an era of technological and social upheaval. At one point he compared the initiatives to an effort to avoid the fate of Kodak, the company that failed to foresee the impact of digital technology on its film franchise. “Things just passed them by,” Brennan said.

Brennan’s plan was endorsed by others in the Obama administration who noted the advantages of allowing operators and analysts to collaborate.

“I strongly endorse Director Brennan’s vision,” Director of National Intelligence James R. Clapper Jr. said in a statement. “I see many advantages to this, but the one I want to highlight specifically is the impact this change will have in promoting integration.”

As part of Brennan’s plan, long-standing divisions focused on Africa, the Middle East and other regions will give way to centers of corresponding geographic boundaries. The Directorates of Intelligence and Operations — as the analysis and spying branches are known — will continue to exist but will function mainly as talent pools, recruiting and training personnel who can be deployed to the new centers.

“Some who grew up in the old structure will have heartburn with this, but those costs will be short term,” said Michael Morell, former deputy director of the CIA. Morell said that existing centers have “proven to be a very powerful combination” and that the Counterterrorism Center is “the most successful agency component over the last decade.”

The Directorate of Digital Innovation will perform a similar role, and absorb existing entities including the Open Source Center, which monitors Twitter and other social media sites for intelligence on such adversaries as the Islamic State, as well as the Information Operations Center, a secret organization that handles missions including cyber-penetrations and sabotage and is now the second-largest center at the CIA.

But Brennan made clear that the digital directorate will have a much broader mandate, responsible not only for devising new ways to steal secrets from cellphones and other devices, but also for helping CIA officers evade detection overseas in an age when their phones, computers and ATM cards leave digital trails. The head of the new directorate will be responsible for “overseeing the career development of our digital experts as well as the standards of our digital tradecraft,” Brennan said.

Brennan did not present a timetable for the reorganization, or provide names of those who will be picked to lead the new centers. Other aspects of the plan are also unclear, including how much power the new assistant directors will exert over CIA stations overseas.

Brennan began exploring plans for the restructuring last year, when he established a panel to evaluate his proposed changes. The leader of that group, a veteran paramilitary officer whose first name is Greg, was recently put in charge of the Directorate of Operations, one of several departments that will revert to more traditional titles after being rebranded in recent years.

Greg Miller covers the intelligence beat for The Washington Post.

 

C.I.A. to Be Overhauled to Fight Modern Threats

C.I.A. to Be Overhauled to Fight Modern Threats

The New York Times
By Mark Mazzetti
March 6, 2015

LANGLEY, Va. — John O. Brennan, director of the Central Intelligence Agency, is planning to reassign thousands of undercover spies and intelligence analysts into new departments as part of a restructuring of the 67-year-old agency, a move he said would make it more successful against modern threats and crises.

Drawing from disparate sources — from the Pentagon to corporate America — Mr. Brennan’s plan would partly abandon the agency’s current structure that keeps spies and analysts separate as they target specific regions or countries. Instead, C.I.A. officers will be assigned to 10 new mission centers focused on terrorism, weapons proliferation, the Middle East and other areas with responsibility for espionage operations, intelligence analysis and covert actions.

During a briefing with reporters on Wednesday, Mr. Brennan gave few specifics about how a new structure would make the C.I.A. better at spying in an era of continued terrorism, cyberspying and tumult across the Middle East. But he said the current structure of having undercover spies and analysts cloistered separately — with little interaction and answering to different bosses — was anachronistic given the myriad global issues the agency faces.

“I’ve never seen a time when we have been confronted with such an array of very challenging, complex and serious threats to our national security, and issues that we have to grapple with,” he said.

One model for the new divisions is the agency’s Counterterrorism Center, an amalgam of undercover spies and analysts charged with hunting, and often killing, militant suspects across the globe. Once a small, occasionally neglected office in the C.I.A., the Counterterrorism Center has grown into a behemoth with thousands of officers since the Sept. 11 attacks as the C.I.A. has taken charge of a number of secret wars overseas.

But Mr. Brennan also cited another model for his new plan: the American military. He said that the Defense Department’s structure of having a single military commander in charge of all operations in a particular region — the way a four-star commander runs United States Central Command — was an efficient structure that led to better accountability.

Mark M. Lowenthal, a former senior C.I.A. analyst, said that the reorganization “is not going to go down smoothly” at the agency, especially among clandestine spies who have long been able to withhold information from analysts, such as the identity of their foreign agents. “The clandestine service is very, very guarded about giving too much information about sources to the analysts,” he said.

But Mr. Lowenthal, who said he had not been briefed about the reorganization and was basing his understanding of Mr. Brennan’s plan on news accounts, said that the new mission centers could help avoid a debacle like the intelligence assessments before the Iraq war, when analysts trusted information from sources they knew little about, and who were later discredited.

During his two years as C.I.A. director, Mr. Brennan has become known for working long days but also for being loath to delegate decisions to lower levels of C.I.A. bureaucracy. During the briefing on Wednesday, he showed flashes of frustration that, under the C.I.A.’s current structure, there is not one single person in charge of — and to hold accountable for — a number of pressing issues.

He avoided citing any specific examples of how the C.I.A.’s current structure was hampering operations, and often used management jargon while describing his vision for the agency.

He spoke of wanting to “wring efficiencies” out of the system and trying to identify “seams” in the agency’s current structure that hinder the C.I.A. from adequately addressing complex problems. The C.I.A. needed to modernize even if the current system was not “broken,” he said, citing how Kodak failed to anticipate the advent of digital cameras.

Mr. Brennan said he was also adding a new directorate at the agency responsible for all of the C.I.A.’s digital operations — from cyberespionage to data warehousing and analysis.

Mr. Brennan discussed his plans with reporters on the condition that nothing be made public until he met with C.I.A. employees to discuss the new structure. That meeting was Friday.

While adding the new digital directorate, Mr. Brennan chose not to scuttle the C.I.A.’s four traditional directorates sitting at the top of the bureaucracy — those in charge of clandestine operations, intelligence analysis, science and technology research, and personnel support.

The C.I.A.’s clandestine service, the cadre of undercover spies known for decades as the Directorate of Operations and in recent years renamed the National Clandestine Service, will get its original name back under Mr. Brennan’s plan.

Amy Zegart, an intelligence expert at Stanford, said that the C.I.A. risked being drawn further into the daily churn of events rather than focusing on “over-the-horizon threats” at a time when the C.I.A. has already come under criticism for paying little attention to long-term trends.

For his part, Mr. Brennan said this was the very thing he was trying to avoid — reacting to the world’s crises and not giving policy makers sufficient warning before they happened.

“I don’t want to just be part of an agency that reports on the world’s fires, and the collapse of various countries and systems,” he said.

 

 

Cyberforce Superiority: Executive/Managers Course – March 2015

Secure your seat now for
Cyberforce Superiority™

Cyberforce Superiority™, training cyber operators
to be more broadly based, integrating offense, defense and
forensics into a holistic program. 

Executive/Managers Course
March 23-27, 2015

Arlington, Virginia

The Executive/Managers Course gives students a technical sampling of the complete belt series in an immersive five-day offering.

Unlike most cyber training courses that emphasize either computer security or hacking skills, our course is designed to give students a preliminary integrated understanding of the methodologies and interrelated offensive and defensive factors that come into play when training a cyber warrior.  Students will learn a sample of the introductory, mid-level, and high-level tactics used for Computer Network Operations (CNO) including Computer Network Attack (CNA) & Computer Network Exploitation (CNE), Computer Network Defense (CND), as well as Computer forensics.  Topics of instruction include: ethical hacking, Boolean Logic, networking for both advanced Unix and Windows, vulnerability identification, computer exploit development, and reverse engineering.

This is a practical course with instruction that is focused on in-class computer exercises and lab work.   This course is ideal for executives, managers and supervisory personnel who play a role in planning, operations, risk assessment, policy, and ethics.  This course also allows the more technical student to benchmark his or her skills against the entirety of curriculum learning objectives.

These courses are offered in partnership with Raytheon Solipsys. 

 

Individual enrollment courses scheduled!

The Intelligence & Security Academy offers the following courses for individual enrollment…registration is open, reserve your seat now!

Academy faculty brings to bear decades of senior executive experience in intelligence, national security and policy analysis. Each of the Academy’s courses is a dynamic, compact and highly informative exploration of a key intelligence issue.

 

The American Interest, Episode 45: The Torture Report in the Age of Fear (Podcast)

The American Interest
Episode 45: The Torture Report in the Age of Fear (Podcast)
Host: Richard Aldous

Link to podcast

Good evening, podcast listeners! We have a truly excellent episode for you today, as we welcome to the show two expert guests ready to discuss the Senate Intelligence Committee’s recent report on the CIA’s use of torture.

First, we speak with Mark M. Lowenthal, president and CEO of the Intelligence & Security Academy and former Assistant Director of Central Intelligence for Analysis & Production from 2002 to 2005, about the recent Senate Intelligence Committee report. He points out that political machinations were very much at play in the writing and release of the Committee’s report, and notes that many members of Congress had been briefed on the CIA’s activities. He notes that by not talking to many of the people involved, and by relying so extensively on documents as evidence, the report’s objectivity has been called into question.

He plays down the possibility of prosecution of those involved, pointing out the Administration’s careful avoidance of using the word torture, but notes that many of the people named in the report will be very careful about traveling outside of the United States for fear of extraterritorial indictment. He also reminds us that it’s difficult to recapture the atmosphere of fear that gripped the U.S. intelligence community in the wake of the 9/11 attacks.

 

Senate Report not about openness: Opposing view (Mark M. Lowenthal)

USA TODAY, OPINION, December 9, 2014

One of the inherent contradictions of running an intelligence service in a democracy is the inevitable clash between openness and secrecy. Both are necessary for different reasons at different times. But neither openness nor secrecy can constantly trump the other as the absolute and ultimate virtue.

In recent years, the call has arisen for “transparency” across a range of intelligence operations. Simply put, we cannot conduct necessarily secret operations with a view to making them transparent.

Some operations, such as the raid against Osama bin Laden, can succeed only if they are kept secret until after their completion. And some must remain secret even after completion.

As it is, the U.S. intelligence community operates in a more transparent atmosphere than most other democratic services. Budgets and operations are shared in excruciating detail with the congressional oversight committees.

That certainly was the case with the rendition and interrogation programs. Their existence and conduct was not kept from Congress. There was transparency within the rules and laws governing U.S. intelligence.

Aside from the fact that there is no “public right to know” enumerated in the Constitution (freedom of speech and the press are not the same thing), we must acknowledge that there was also no public outcry for the release of this report.

The public wants to know that intelligence operates under law and with oversight and that intelligence seeks to keep them safe. All those conditions have been met.

At core, the debate over releasing the Senate Select Committee on Intelligence report is less about openness than about the Congress attempting to divest itself of its role in urging and authorizing a range of activities that are not viewed in the same light as they were in the aftermath of 9/11.

This is not a debate about openness. It is about the washing of hands like Pontius Pilate.

Mark M. Lowenthal, president of the Intelligence & Security Academy, was assistant CIA director for analysis and production during the Bush administration, and staff director to the House Intelligence Committee.

 

Cyberforce Superiority™ – Secure your seat now!

Don’t miss out on the opportunity this Fall to take one of our
Cyberforce Superiority™ courses!

New location: Arlington, Virginia

Executive/Managers Course
October 27-31, 2014 (Arlington, Virginia)

White Belt Course
November 17-21, 2014 (Arlington, Virginia)

Cyberforce Superiority™, training cyber operators to be more broadly based, integrating offense, defense and forensics into a holistic program.  Select courses above to link to detailed course learning objectives and content.

These courses are offered in partnership with Raytheon Solipsys.