Tenet warns of terrorists combining physical, telecommunications attacks

Former CIA Director George Tenet on Wednesday said greater government regulation of the Internet and telecommunications networks is needed in order to guard against terrorist attacks.

The U.S. intelligence community needs to consider how terrorists might attempt to couple an attack on telecommunication networks with a physical attack, Tenet said during a keynote speech at the E-Gov Institute's homeland security conference in Washington.

"Efforts at physical security will not be enough, because the thinking enemy that we confront is going to school on our network vulnerabilities as well, and I think the two are inextricably linked," he said. "The number of known potential adversaries conducting research on information attacks is increasing rapidly and includes intelligence services, military organizations and nonstate entities."

According to Tenet "a loose collection of regional [terrorist] networks" now "thrive independently" worldwide by using telecommunications and the Internet to communicate with and learn from each other at almost no cost.

Telecommunications technology for government and business should have built-in protections, Tenet said, such as intrusion detection and protection systems, antivirus software, authentication and identify management services, and encryption.

"I know that these actions would be controversial in this age where we still think the Internet is a free and open society with no control or accountability," he added. "But, ultimately, the Wild West must give way to governance and control."

Many national media outlets were not allowed to attend Tenet's speech. The Associated Press reported that Tenet insisted that natoinal media be kept out, only allowing in reporters for trade publications that cover the government.

Tenet was also critical of the direction that intelligence reform is taking in Washington. "There's a big focus on structural change at the top. My perspective is, this is all about data," he said.

The U.S. government has "an enormous amount of knowledge" on terrorist activities that should be disseminated to state and local officials, Tenet continued. "We have to start treating them as equals with regard to data and teach them as much as we possibly can by pushing data to them at the lowest levels of classification. [We should] even begin a very serious process of learning how to write at the unclassified level so we can educate everybody about what we see going on in the world."

"I really believe data sharing and the movement of data is the most critical feature of reform. I think that's where this game gets won and lost," he said. "We're having discussions about power relationships between people in Washington. At the end of day, I don't think that's the right conversation."

Legislation to overhaul the U.S. intelligence community is currently stalled in Congress. A key component of that legislation is creating an intelligence director to oversee the nation's 15 intelligence agencies.

Tenet reiterated criticism he expressed to the 9/11 commission earlier this year that the person leading U.S. intelligence agencies should be affiliated with an agency. "If you're not getting your hands dirty every day in terms of risk, I don't think you can lead the men and women of American intelligence, or capably inform the president," he said.

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
Close [ x ] More from GovExec

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by Brocade

    Best of 2016 Federal Forum eBook

    Earlier this summer, Federal and tech industry leaders convened to talk security, machine learning, network modernization, DevOps, and much more at the 2016 Federal Forum. This eBook includes a useful summary highlighting the best content shared at the 2016 Federal Forum to help agencies modernize their network infrastructure.

  • Sponsored by CDW-G

    GBC Flash Poll Series: Merger & Acquisitions

    Download this GBC Flash Poll to learn more about federal perspectives on the impact of industry consolidation.

  • Sponsored by One Identity

    One Nation Under Guard: Securing User Identities Across State and Local Government

    In 2016, the government can expect even more sophisticated threats on the horizon, making it all the more imperative that agencies enforce proper identity and access management (IAM) practices. In order to better measure the current state of IAM at the state and local level, Government Business Council (GBC) conducted an in-depth research study of state and local employees.

  • Sponsored by Aquilent

    The Next Federal Evolution of Cloud

    This GBC report explains the evolution of cloud computing in federal government, and provides an outlook for the future of the cloud in government IT.

  • Sponsored by Aquilent

    A DevOps Roadmap for the Federal Government

    This GBC Report discusses how DevOps is steadily gaining traction among some of government's leading IT developers and agencies.

  • Sponsored by LTC Partners, administrators of the Federal Long Term Care Insurance Program

    Approaching the Brink of Federal Retirement

    Approximately 10,000 baby boomers are reaching retirement age per day, and a growing number of federal employees are preparing themselves for the next chapter of their lives. Learn how to tackle the challenges that today's workforce faces in laying the groundwork for a smooth and secure retirement.

  • Sponsored by Hewlett Packard Enterprise

    Cyber Defense 101: Arming the Next Generation of Government Employees

    Read this issue brief to learn about the sector's most potent challenges in the new cyber landscape and how government organizations are building a robust, threat-aware infrastructure

  • Sponsored by Aquilent

    GBC Issue Brief: Cultivating Digital Services in the Federal Landscape

    Read this GBC issue brief to learn more about the current state of digital services in the government, and how key players are pushing enhancements towards a user-centric approach.

  • Sponsored by CDW-G

    Joint Enterprise Licensing Agreements

    Read this eBook to learn how defense agencies can achieve savings and efficiencies with an Enterprise Software Agreement.

  • Sponsored by Cloudera

    Government Forum Content Library

    Get all the essential resources needed for effective technology strategies in the federal landscape.


When you download a report, your information may be shared with the underwriters of that document.