Tenet warns of terrorists combining physical, telecommunications attacks

Former CIA Director George Tenet on Wednesday said greater government regulation of the Internet and telecommunications networks is needed in order to guard against terrorist attacks.

The U.S. intelligence community needs to consider how terrorists might attempt to couple an attack on telecommunication networks with a physical attack, Tenet said during a keynote speech at the E-Gov Institute's homeland security conference in Washington.

"Efforts at physical security will not be enough, because the thinking enemy that we confront is going to school on our network vulnerabilities as well, and I think the two are inextricably linked," he said. "The number of known potential adversaries conducting research on information attacks is increasing rapidly and includes intelligence services, military organizations and nonstate entities."

According to Tenet "a loose collection of regional [terrorist] networks" now "thrive independently" worldwide by using telecommunications and the Internet to communicate with and learn from each other at almost no cost.

Telecommunications technology for government and business should have built-in protections, Tenet said, such as intrusion detection and protection systems, antivirus software, authentication and identify management services, and encryption.

"I know that these actions would be controversial in this age where we still think the Internet is a free and open society with no control or accountability," he added. "But, ultimately, the Wild West must give way to governance and control."

Many national media outlets were not allowed to attend Tenet's speech. The Associated Press reported that Tenet insisted that natoinal media be kept out, only allowing in reporters for trade publications that cover the government.

Tenet was also critical of the direction that intelligence reform is taking in Washington. "There's a big focus on structural change at the top. My perspective is, this is all about data," he said.

The U.S. government has "an enormous amount of knowledge" on terrorist activities that should be disseminated to state and local officials, Tenet continued. "We have to start treating them as equals with regard to data and teach them as much as we possibly can by pushing data to them at the lowest levels of classification. [We should] even begin a very serious process of learning how to write at the unclassified level so we can educate everybody about what we see going on in the world."

"I really believe data sharing and the movement of data is the most critical feature of reform. I think that's where this game gets won and lost," he said. "We're having discussions about power relationships between people in Washington. At the end of day, I don't think that's the right conversation."

Legislation to overhaul the U.S. intelligence community is currently stalled in Congress. A key component of that legislation is creating an intelligence director to oversee the nation's 15 intelligence agencies.

Tenet reiterated criticism he expressed to the 9/11 commission earlier this year that the person leading U.S. intelligence agencies should be affiliated with an agency. "If you're not getting your hands dirty every day in terms of risk, I don't think you can lead the men and women of American intelligence, or capably inform the president," he said.

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
FROM OUR SPONSORS
JOIN THE DISCUSSION
Close [ x ] More from GovExec
 
 

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.