- @AirbusDefence @portalfab @parisairshow @salondubourget Congrats on the Stellwagen contract - clearly still a versatile platform 2 days ago
- How will Canada's military pilots train in the future? defenceiq.com/air-forces-and… https://t.co/m8JttN4aA1 2 days ago
- A #Gulfstream jet is the subject of a 'hidden code' in the latest episode of #TwinPeaks giphy.com/gifs/twin-peak… 2 days ago
- RT @GlobaIinf: Our Director of Audience Analysis @LucyFr2 shares best practice on measurement & evaluation in #CVE and tackling organised c… 2 days ago
- @RANDCorporation @BrianMJenkins V. interesting piece. One of our reporters is at our Countering Violent Extremism e… twitter.com/i/web/status/8… 4 days ago
We are the IQ of global defence.
Information Security Threats – Round Up From The 5th Hemispheric Security and Intelligence Forum
December 11, 2012Posted by on
By Alex Stephenson, Defence IQ’s man in Brazil
What breaks a company is lack of money, not lack of management or leadership. The same applies to criminal gangs. Imprisoning individuals is almost completely ineffective compared to denying a criminal organisation the proceeds of their activity. Concerning narcotics, one method is to interdict air, sea and land cargoes of substances – an alternative is to prevent the flow of the financial incentive in the other direction. No one sells a product if they cannot receive payment. A complete approach to narcotics includes both these elements.
But, there is a crime more profitable than narcotics. The sale of unknown vulnerabilities in computer software to criminal organisations who can exploit these weaknesses either to cause damage or steal intellectual property. So significant is this threat that it was contextualised as the threat of the modern era, paralleled by the nuclear threat of the cold war. A cyber threat to remain potent needs to remain unknown and then deliver chaos. An explicit parallel to the Hiroshima bomb; a capability unknown until it was deployed was drawn.
Linking both cyber security threats and counter narcotic threats I understood there to be three key takeaways:
- These are evolving risks, much like a game of chess they require continual attention, calculation and execution.
- Simplistically there are two approaches that can be used in tandem; tackling the problem and tackling the incentive – money makes the world go round
- Finally, the importance of sharing information, helping partners and collaborating.
This last point is perhaps the most important. Too often perhaps there is a concern about sharing information about a problem. Perhaps this is because there is a national sensitivity around admitting there is a problem. However, if it is happening on your patch it is probably happening on your neighbour’s and by working together the intelligence picture becomes more complete and hopefully solutions begin to appear.
It is a great privilege for me to be able to attend this conference by kind invitation of USSOUTHCOM and the Brazilian Ministry of Defence. Later during this weeklong conference I will be delivering two presentations, one to the Caribbean Regional Intelligence Conference and one to the Central American Regional Intelligence Conference. The subject of this presentation will be the Caribbean Basin Coastal Surveillance and Maritime Security Summit 2013.