A New Counterintelligence Strategy
The National Counterintelligence and Strategy Center rolled out their roadmap for the next two years and, on paper at least, it looks good.
The National Counterintelligence and Strategy Center rolled out their roadmap for the next two years and, on paper at least, it looks like a step in the right direction. If you've read Blogs of War or listened to Covert Contact over the past few years you'll recognize a lot of points that people like myself and William J. Tucker (and plenty of others) have been making for some time.
Director Bill Evanina has been making rounds in the media to support the rollout and I get these sense that we'll hear more. That's good because you can't pull off a "whole-of-society" strategy without clear, consistent, and persistent communication. This has to be both a sprint and a marathon.
Can we execute a robust counterintelligence strategy in the current political environment? I have my doubts. We have committed, skilled, and patriotic people working on this but they are facing stiff headwinds. I wish them the absolute best. Really. The stakes couldn't be higher.
In the meantime, we're still eating punches. Every. Single. Day.
Here's a quick round-up of previous counterintelligence related podcasts and posts:
Covert Contact Episodes
- Counterintelligence in the Trump Era
- Economic Espionage: No One Is Immune
- Russian Hackers Run Wild on the DNC
- Lieutenant Commander Edward Lin: Identity, Espionage, and Counterintelligence
- The Jerry Chun Shing Lee Case
- Government Email Problems, Wikileaks, Russia, Drone Leaks, NASA Security and Other Counterintelligence Nightmares
- Counterintelligence: William J. Tucker Breaks Down the Challenges
Blogs of War Posts
- Beyond Russia: Overlooked Counterintelligence Threats
- Everybody Spies - and for Good Reason
- William J. Tucker: Hawaii a Priority Target for Foreign Espionage
- William M. Nolte: Counterintelligence after Snowden
I have more thoughts on this, a lot more, but I'll have to get to them in future posts. Until then, please set aside some time to think about your personal vulnerabilities and perform the same analysis at work. We each have a role to play in this mess.