EXPERT OPINION — More than 200 U.S. officers have been hunted around the globe and targeted by an adversary using a mysterious weapon that causes permanent brain injury. It’s time to get serious about fighting back.

The Authors:

Paul Kolbe served for 25 years in the CIA’s Directorate of Operations. He is currently Director of the Intelligence Project at Harvard Kennedy School’s Belfer Center for Science and International Affairs.

Marc Polymeropoulos worked for the CIA for 26 years. He is author of “Clarity in Crisis: Leadership Lessons from the CIA.

John Sipher worked for the CIA’s clandestine service for 28 years. He is now a nonresident senior fellow at the Atlantic Council and a co-founder of Spycraft Entertainment.

Prior to 9/11, al Qaida declared war on the United States, bombed the USS Cole, and blew up U.S. embassies in Nairobi and Dar es Salam. Despite heavy casualties, America viewed successive al Qaida terrorist attacks as somehow unique, not representative of a larger threat or state of war. We went about our business and failed to take hard action against al Qaida despite clear warning. Our failure to respond forcefully led to 9/11 and the two decades of war that followed.

Fast forward to today.  Since 2016, more than 200 U.S. officials have reportedly suffered from a mysterious series of symptoms which have caused long-lasting, debilitating injuries. Suffering from searing headaches, vertigo, vision impairment, and nausea, many victims have been formally diagnosed with traumatic brain injuries (TBI) at the Walter Reed National Military Medical Center and other leading hospitals. Family members and young children have suffered as well. Some medical tests can now confirm the markers of brain injury, similar to those suffered by victims of concussive injuries in Iraq and Afghanistan.

These injuries began with a cluster of reports from Cuba in 2016 and have become commonly referred to as Havana Syndrome. Moscow, Vienna, Belgrade, and Hanoi are among more than a dozen cities where U.S. officials reportedly have been attacked and injured. In residences, on the street, in vehicles, and even at secure U.S. facilities, U.S. officers are being hunted. Stunningly, even a close aide to CIA Director Bill Burns was reportedly attacked on a trip to India just this past August.

The CIA, after a period of confusion, delay, and even denial at times, now appears to take these threats very seriously. CIA Director Burns and Deputy Director David Cohen have publicly stated that U.S. officials are being “attacked.” They have improved health care for CIA officers who are hurt. And an agency task force is hard at work trying to obtain additional intelligence on those responsible. We credit Director Burns for his solid leadership.

The cause of these injuries? The National Academy of Sciences has pointed to Directed Energy Weapons – devices which emit microwave pulses which can inflict pain and damage tissue. The United States, Russia, China, and others have all developed Directed Energy Weapons to destroy equipment, counter drones, and control crowds. This is not science fiction.

Directed energy weapons would account for the highly directional and locational nature of these incidents. When victims can “move off the x,” the signature sounds, sensations, and pain that goes with the attacks often stop, though damage has already occurred. The amount of exposure seems to affect the degree of injury. Other technologies could be at play and are being investigated, but microwaves appear to be the most likely vector. Russia has used them before, flooding the U.S. Embassy in Moscow with microwave radiation for decades.

Regardless of form, the weapons being used in these attacks are nothing less than weapons of terror, designed to cause injury to non-combatants. Who would use such a weapon to attack U.S. intelligence officers, diplomats, and military personnel, and to what conceivable end?


The Cipher Brief hosts private briefings with the world’s most experienced national and global security experts.  Become a member today.


CIA Deputy Director Cohen stated at a recent intelligence summit, that the U.S. was closer to identifying the culprit, and Politico has reported that members of the Senate Intelligence Committee are increasingly convinced that Russia or another hostile adversary is behind the attack, although reportedly, no smoking gun has been found.

As former CIA operations officers with extensive experience dealing with both counterterrorism and counterintelligence issues, we have few doubts about who will be named as the culprit. For at least a decade, Russia has conducted itself as in a state of conflict with the West in general and the United States in particular. Russia has launched cyberattacks impacting critical infrastructure and supply chains, assassinated opponents with nuclear poisons and chemical weapons, gunned down people in the streets using criminal proxies, sabotaged a Czech ammunition depot, and mounted a violent coup attempt in Montenegro. It has also bombarded the U.S. embassy in Moscow with microwave radiation and used carcinogenic “spy dust” without regard to health effects. The attacks on U.S. officials would fit this pattern of behavior.

We recognize that it is important to let the intelligence community do its job and its findings must inform policy action. Congress and the administration must work together to formulate a range of possible responses and it is not too early to begin. As Senator Collins and others have stated, these attacks are “an act of war,” and as such, preparation for a future attribution call by the national security establishment is in order. So how could the U.S. respond?

Let’s start with what doesn’t work – sanctions. Sanctions feel good and satisfy an action imperative but they are feckless. Sanctions have not stopped Russia from killing dissidents, halted the Nordstream II pipeline, compelled a pull back from occupied territories, reduced support for tyrants, or hindered oil and gas production. Sanctions have simply forced Russia to develop more creative money laundering and sanction circumvention mechanisms.

So, what would work? For starters, we must understand that the Putin regime considers itself in a state of conflict with the U.S., short of war, but nonetheless deadly real. We are dealing with a state sponsor of terror which conducts operations across the globe to weaken the U.S. abroad, divide it from its allies, and sow discord at home. Our policy must be calibrated to win this conflict, without sparking a shooting war, but at risk of one.

Russia understands reciprocity and strength. When four Russian diplomats were kidnapped by extremists in Beirut in 1985, and one of them was killed, Russia reportedly responded by kidnapping and gruesomely killing a relative of the group’s leader. The surviving diplomats were released immediately. The story may be apocryphal, but it does illustrate the Russian approach. Tempting as it may be for America to retaliate tit for tat, we need not mirror Russia’s actions. Instead, we should play to our greater economic, diplomatic, and military advantages.

We offer five elements to frame a response: enlist U.S. allies, expand forward deterrence, limit the adversary’s reach, choke off money, and bring those accountable to justice.

NATO: With proof of the attacks on U.S. officials, we should activate NATO’s Article Five collective defense clause. The only other time this was enacted was after 9/11. As justification, in addition to the Havana Syndrome attacks, (which also caused Canadian casualties), we would include GRU and FSB assassination operations across Europe, deadly sabotage in the Czech Republic, a coup attempt in Montenegro, persistent cyberattacks, and a litany of other actions that can only be described as irregular warfare directed against NATO members.


Go beyond the headlines with expert perspectives on today’s news with The Cipher Brief’s Daily Open-Source Podcast.  Listen here or wherever you listen to podcasts.


Forward Presence: A crystal clear signal that we understand the nature of Russian hybrid warfare and are responding would be to enhance our deployed military presence in Poland, the Baltic States, and in the Black Sea region. These units would pose no offensive threat to Russia but would be a clear signal that the U.S. is prepared to counter any Russian shenanigans. We should also significantly ramp up our lethal aid and training to the Ukraine, where the nature of Russian aggression is well known. Weakness in Eastern Europe is an invitation to conflict.

Travel and Presence: We should drastically limit Russian business and tourist travel which is being used as cover for FSB and GRU operations. We would reduce Russian diplomatic presence in each capital to the bare minimum – handfuls not hundreds. American and European counterintelligence experts believe there are more Russian intelligence officers operating from embassies than during the Cold War. Limiting the size of Russia’s espionage infrastructure will complicate the planning and execution of all of its intelligence operations.

Finance: A key tool in counterterrorism operations is the ability to target sources of finance which constitute material support to terrorism. In this case, we would apply that principle to the Russian government, state enterprises, and individuals who provide cover, tools, and sources of funding to Russia’s campaign to undermine the West with violence, terror, and media manipulation. Russia’s dirty money has been used to undermine the west and poison our politics. We should limit the easy access of shady money to western banks.

Criminal Cases: We need bring war crime cases to the International Court of Justice (ICJ) in the Hague. Following a decade of conflict in the Balkans, the ICJ brought to justice 161 indicted Serbian, Croatian, and Bosnian war criminals. This was an astounding success – a manhunt which included American and European law enforcement and intelligence services. Just as in Nuremberg after World War II, these actions to hold war criminals accountable drew a line in the sand.

This is a start.  Successive Democratic and Republican administrations have pursued Russia policies which represent the triumph of hope over experience. We have treated the symptoms of malign Russian actions rather than the underlying pathology. It is now time to finally acknowledge that we are in a long-term hybrid conflict and forget the fantasy of changing Putin’s behavior. Only a new regime in the Kremlin would hold the hope of bringing about a change in actions. Eventually, the Putin regime will wither or collapse, but until it does, we and our allies must do a better job of defending ourselves.

Read more expert-driven national security insights, perspective and analysis in The Cipher Brief

The post Havana and the Global Hunt for U.S. Officers appeared first on The Cipher Brief.

find more fun & mates at SoShow now !

When you think the internet can’t get any more niche, it finds a way to get even more specific. We’re, of course, talking about an Instagram account @BagDogs that is solely dedicated to sharing people’s photos of dogs chilling in bags as they are being transported from point A to point B. Scroll down to see some of their best photos!

Dog in a bag.

Dog in a bag.

Dog in a bag.

Dog in a bag.

Dog in a bag.

Dog in a bag.

Dog in a bag.

Dog in a bag.

Dog in a bag.

Dog in a bag.

Dog in a bag.

Dog in a bag.

Dog in a bag.

Dog in a bag.

Dog in a bag.

Dog in a bag.

Dog in a bag.

Dog in a bag.

Dog in a bag.

Dog in a bag.

Dog in a bag.

Dog in a bag.

The post This Instagram Account Shows People Carrying Dogs In Bags, And It’s Hilariously Adorable first appeared on .

find more fun & mates at SoShow now !

When the PRC decides to move on Taiwan, it is unlikely to move in a manner that makes a US decision on intervention clear cut.  Should China decide, initially at least, against a full-scale invasion of that island nation, it could instead opt to try to “win without fighting.” Beijing might do so by using its large, state-controlled fishing fleet to cut smaller Taipei-controlled islands off from Taiwan itself much as the PRC is now massing fishing boats to expand Chinese-controlled seas to press claims on the Japanese Senkakus and Whitsun Reef in Philippine waters. Chinese state-owned fisheries companies – part of the so-called ‘Maritime Militia’ – serve as fronts for PLA intelligence. Using their fleets to operate in a manner somewhere between peace and conflict in the gray zone of contested control around Taiwan would allow Beijing to test whether the US and its allies are willing to help defend the island’s independence without being seen to initiate open conflict.

“The Cipher Brief has become the most popular outlet for former intelligence officers; no media outlet is even a close second to The Cipher Brief in terms of the number of articles published by formers.” – Sept. 2018, Studies in Intelligence, Vol. 62 No.

Access all of The Cipher Brief’s national-security focused expert insight by becoming a  Cipher Brief Level I Member .  

 

 

The post Why the China – Russia Relationship Should Worry You – Part Two appeared first on The Cipher Brief.

find more fun & mates at SoShow now !

Objects, including spacecraft, could pierce through the universe using several black holes as a ‘shortcut’, a new study suggests.

The new theory posited by French physicist Pascal Koiran marks a break from earlier research in the field of black hole studies. Previously, it was thought that a so-called ‘wormhole’ composed of two black holes would be prone to instantly collapse, thus making it impossible for an object to successfully travel all the way from one side and out the other. However, by employing different metrics, the French scientist’s new model has arrived at a very different conclusion: “We show that the particle reaches the wormhole throat for a finite value t′1 of the time marker t′.” In essence, that means an object, for instance, a spacecraft, could pass through this wormhole portal intact and reach some far-away region of the universe, taking far less time than would be needed if traveling conventionally.

Read more

FILE PHOTO: Jeff Bezos addresses the media about the New Shepard. ©REUTERS / Isaiah J. Downing
Amazon’s Bezos predicts only limited number of people will get to remain on Earth

The study in its entirety will see the light of day in the upcoming issue of the Journal of Modern Physics D, though an abstract has been available since early October.

Yet, there are too many ifs as to whether this purely theoretical model has any bearing on the way the universe actually works. For starters, to create such a time-and-space tunnel you would need a regular black hole and a so-called white hole, which is essentially a black hole in reverse. While black holes never let anything out, their ‘twins’ never let anything in. So, according to Albert Einstein’s theory of general relativity and Nathan Rosen’s additions to it, if you were to connect the two, they would make up a bridge across time and space. However, if the laws postulated by another branch of physics, thermodynamics, are anything to go by, such a construct would be highly unstable. Perhaps more importantly, the very existence of white holes has yet to be proven beyond a reasonable doubt. At present, they remain a pure theorization, thus putting any talk of space-and-time portals on rather shaky ground.

If you like this story, share it with a friend!

find more fun & mates at SoShow now !

Apple has finally caved to users demanding the ‘right to repair’, allowing owners of iPhones, MacBooks, and other devices to tinker with their electronics at home instead of bringing them to notoriously expensive service centers.

Called Self Service Repair, the feature is set to launch “early next year” in the US before expanding to other countries. Some 200 parts are expected to be available, along with instructions on how to replace them.

Initially, the company will offer repairs for the iPhone 12 and 13, to be followed by Macs with M1 chips. Users will be able to replace the phones’ display, battery, and camera – some of the earliest parts to cease functioning – using original equipment from the company. While Apple encourages only “individual technicians with the knowledge and experience to repair electronic devices,” urging users to take their devices to a professional before cracking them open themselves, the move nevertheless represents a major step for a company that has long been resistant to allowing users to even swap out a battery.

Read more

Apple Chief Executive Officer Tim Cook at the Apple Store on University Avenue,  Palo Alto, California, September 20, 2013.
Apple’s labor breach results in huge payments for employees

After rolling out repair instructions and parts for the iPhone 12 and 13, the company will gradually expand users’ abilities to fix their phones themselves without having to wait in line at the Apple Store. Users who attempt to make these repairs on their own will not void their warranty, according to TechCrunch, representing another major change for the tech giant.

Even this week, Apple was sealing off users’ ability to fix their own phones, barring users who replaced their own screens from being able to use Face ID recognition going forward. However, the various departments seem to be coordinating among themselves – users will receive a recycling credit for returning their used or broken part after completing the repair, and the company plans to sell “more than 200 individual parts and tools,” as well as repair manuals customers can peruse before attempting to repair their devices.

The decision to open up Apple’s “right to repair” might not have been entirely that of the company – the Federal Trade Commission wrote to the corporation earlier this year vowing to “address unlawful repair restrictions,” adding it would also “stand ready to work with legislators, either at the state or federal level, in order to ensure that consumers have choices when they need to repair products that they purchase and own.”

If you like this story, share it with a friend!

find more fun & mates at SoShow now !

The Funniest Clothing Labels Ever – When was the last time you read the label on your favorite shirt or most comfortable pair of jeans? Maybe it’s time to take a look, your clothing tags may hide a funny message.

The Perfect Gift For Someone You Hate – Hungry AND tired? You can rest on this soft body pillow shaped like smoked pig’s feet! What really amazes us are the details, it looks so real… and so disgusting.

Every Cat at 3AM – If you currently have or have ever had a cat, you’ll be able to relate to Gus Johnson’s video, in which he demonstrates one of the many ways in which our furry friends can be a-holes.

The Funniest Dog Videos Of All Time – We understand the value of a good funny dog video, so here’s a list of our six best viral pup videos of all time. You’re welcome.

Mildly Infuriating Things In Life – Sometimes the internet shows you a photo that’s ever so slightly wrong that it sticks in your brain forever…

Funny Images Showing How Differently Men and Women Act – Yup, we’re different and there is no denying that fact. We have different bodies, different brains and different ways of using both.

Dads Who Didn’t Want The Damn Dogs In Their Lives – Dad logic is a weird thing. They say they hate dogs, and then you end up with a gallery like this…

Random Funny Pictures – What do you do when you are bored at work? You just mindlessly scroll through random funny pictures, of course!

Mr. Bean Playing Every Role In Hollywood – When one thinks of a rugged, versatile actor capable of elevating any role given to them, Mr. Bean naturally springs to mind. And yet he was never cast as Frodo Baggins or Indiana Jones, which in our eyes is one of the saddest tragedies of modern filmmaking.

Funny Thanksgiving Cake Fails – Thanksgiving is a day to reflect and enjoy time with family… and sometimes to FAIL.

Still bored to tears and want to see more funny and entertaining links? You should check out Linkiest, Leenks, or Fark!

The post This Month’s Funniest Internet Finds first appeared on .

find more fun & mates at SoShow now !

France has imposed a curfew on its overseas territory of Guadeloupe and is sending extra police to the island, citing days of “violence,” unrest and vandalism in response to harsh pandemic restrictions.

“Given the ongoing social unrest and acts of vandalism, the prefect of Guadeloupe has decided to establish a curfew starting today from 6pm to 5am,” Alexandre Rochatte, who represents the archipelago as prefect, said on Friday.

Earlier on Friday, the French Interior Ministry noted that 200 French police officers and gendarmes would be shipped into Guadeloupe in the coming days to crack down on the “violence” and “restore republican order.”

READ MORE: Macron discloses whether lockdown for unvaccinated will be necessary in France

The move comes after nearly a week of heated protests over local Covid-19 policies – which include mandatory vaccinations for healthcare staff and other ‘essential’ workers, among other things. Demonstrators have torched cars and erected burning barricades in the streets, while doctors, firefighters and other professionals have walked off their jobs in protest, according to Reuters.

In footage circulating online earlier this week, men purported to be protesting firefighters were seen soaking police with a water hose hooked up to a nearby fire hydrant. Officers quickly shut off the spigot.

As in mainland France, residents are also required to present proof of vaccination, a negative PCR test or show they recently recovered from the virus in order to enter a number of public establishments, including restaurants and museums.

Those policies have proven unpopular for many locals, with trade unions launching indefinite strikes in protest over the past week, joined by other residents in street demonstrations.

Like this story? Share it with a friend!

find more fun & mates at SoShow now !

Hard-line cleric Ebrahim Raisi won Iran’s presidential election on Saturday in a move that is expected to bolster the conservative legacy of the country’s supreme leader, Ayatollah Ali Khamenei.

The decision is not expected to derail ongoing negotiations aimed at restoring the Joint Comprehensive Plan of Action (JCPOA) nuclear deal, even though Mr. Raisi himself is under US sanctions over accusations of human rights abuses.  Many voters stayed away from the polls as the outcome had been predicted for months with many progressive candidates barred from running.

The Islamic Republic has entered a post-revolutionary dynamic in which a fading revolutionary generation seeks to ensure that the rising political leadership sustains their revolutionary ideals,” says Norman T. Roule, former National Intelligence Manager for Iran at ODNI and Cipher Brief Expert. “The regime’s decision to bar so many candidates and the low turnout make this election a historic embarrassment for the regime and its supporters.”

The Cipher Brief talked with Roule about what the election means and what it doesn’t mean when it comes to relations with the west, the progressive movement within Iran and the election’s impact on the oil markets.


“The Cipher Brief has become the most popular outlet for former intelligence officers; no media outlet is even a close second to The Cipher Brief in terms of the number of articles published by formers.” – Sept. 2018, Studies in Intelligence, Vol. 62 No.

Access all of The Cipher Brief’s national-security focused expert insight by becoming a  Cipher Brief Level I Member .  

 

 

The post What Iran’s Election Tells Us About Where It’s Headed appeared first on The Cipher Brief.

find more fun & mates at SoShow now !

The EU must quickly seal its external borders to stem the flow of migrants who are no longer welcome in the 27-member bloc, according to Slovenia’s interior minister, whose country currently holds the presidency of the EU Council.

Speaking at the ‘Sarajevo Migration Dialogue’ on Thursday, Interior Minister Ales Hojs said EU countries were preoccupied recently with the coronavirus pandemic, the fall of the government in Afghanistan, and now a migrant crisis on the Poland-Belarus border, which he said was a hybrid war waged by Minsk against the EU.

Read more

Migrants gather on the Belarusian-Polish border on November 15, 2021. © AFP / OKSANA MANCHUK; (inset) German Chancellor Angela Merkel. © AFP / MARKUS SCHREIBER
Germany agreed on plan to open humanitarian corridor for refugees on Poland-Belarus border – Minsk

“All three have additionally contributed to the increase in numbers of illegal migrants moving towards Europe and the Balkans, destabilizing the European Union,” Hojs told reporters.

The Slovenian minister said the current situation was similar to the 2015 influx of refugees and migrants from the Middle East and North Africa, when the EU admitted over one million people across its borders.

This time the situation is different, Hojs said, warning that “there is no more ‘refugees welcome.’”

“I believe that external borders must be secured, even with fences if necessary,” Hojs said, saying that he supported a plan for Brussels to finance the building of fences to reinforce the bloc’s borders.

He said it was important to strengthen cooperation and partnership across the EU in order to better manage migration and maintain security.

Thousands of migrants have been trying to cross the Belarus-Poland border in an attempt to reach the EU. They have been stranded at barbed-wire fencing with Polish border guards repelling their attempts to cross. Warsaw has accused Belarus of orchestrating the crisis to destabilize the EU and “weaponize” migration in an effort to have sanctions lifted.

A spokesperson for Belarusian leader Alexander Lukashenko claimed on Thursday that Germany agreed to open a humanitarian corridor for 2,000 refugees on the border.

If you like this story, share it with a friend!

find more fun & mates at SoShow now !

A Roadmap for AI in the Intelligence Community

(Editor’s Note: This article was first published by our friends at Just Security and is the fourth in a series that is diving into the foundational barriers to the broad integration of AI in the IC – culture, budget, acquisition, risk, and oversight.  This article considers a new IC approach to risk management.)

OPINION — I have written previously that the Intelligence Community (IC) must rapidly advance its artificial intelligence (AI) capabilities to keep pace with our nation’s adversaries and continue to provide policymakers with accurate, timely, and exquisite insights. The good news is that there is strong bipartisan support for doing so. The not-so-good news is that the IC is not well-postured to move quickly and take the risks required to continue to outpace China and other strategic competitors over the next decade.

In addition to the practical budget and acquisition hurdles facing the IC, there is a strong cultural resistance to taking risks when not absolutely necessary. This is understandable given the life-and-death nature of intelligence work and the U.S. government’s imperative to wisely execute national security funds and activities. However, some risks related to innovative and cutting-edge technologies like AI are in fact necessary, and the risk of inaction – the costs of not pursuing AI capabilities – is greater than the risk of action.

The Need for a Risk Framework

For each incredible new invention, there are hundreds of brilliant ideas that have failed. To entrepreneurs and innovators, “failure” is not a bad word. Rather, failed ideas are often critical steps in the learning process that ultimately lead to a successful product; without those prior failed attempts, that final product might never be created. As former President of India A.P.J. Abdul Kalam once said, “FAIL” should really stand for “First Attempt In Learning.”

The U.S. government, however, is not Silicon Valley; it does not consider failure a useful part of any process, especially when it comes to national security activities and taxpayer dollars. Indeed, no one in the U.S. government wants to incur additional costs or delay or lose taxpayer dollars. But there is rarely a distinction made within the government between big failures, which may have a lasting, devastating, and even life-threatening impact, and small failures, which may be mere stumbling blocks with acceptable levels of impact that result in helpful course corrections.


The Cipher Brief hosts private briefings with the world’s most experienced national and global security experts.  Become a member today.


As a subcommittee report of the House Permanent Select Committee on Intelligence (HPSCI) notes “[p]rogram failures are often met with harsh penalties and very public rebukes from Congress which often fails to appreciate that not all failures are the same. Especially with cutting-edge research in technologies … early failures are a near certainty …. In fact, failing fast and adapting quickly is a critical part of innovation.” There is a vital difference between an innovative project that fails and a failure to innovate. The former teaches us something we did not know before, while the latter is a national security risk.

Faced with congressional hearings, inspector general reports, performance evaluation downgrades, negative reputational effects, and even personal liability, IC officers are understandably risk-averse and prefer not to introduce any new risk. That is, of course, neither realistic nor the standard the IC meets today. The IC is constantly managing a multitude of operational risks – that its officers, sources, or methods will be exposed, that it will miss (or misinterpret) indications of an attack, or that it will otherwise fail to produce the intelligence policymakers need at the right time and place. Yet in the face of such serious risks, the IC proactively and aggressively pursues its mission. It recognizes that it must find effective ways to understand, mitigate, and make decisions around risk, and therefore it takes action to make sure potential ramifications are clear, appropriate, and accepted before any failure occurs. In short, the IC has long known that its operations cannot be paralyzed by a zero-risk tolerance that is neither desirable nor attainable. This recognition must also be applied to the ways in which the IC acquires, develops, and uses new technology.

This is particularly important in the context of AI. While AI has made amazing progress in recent years, the underlying technology, the algorithms and their application, are still evolving and the resulting capabilities, by design, will continue to learn and adapt. AI holds enormous promise to transform a variety of IC missions and tasks, but how and when these changes may occur is difficult to forecast and AI’s constant innovation will introduce uncertainty and mistakes. There will be unexpected breakthroughs, as well as failures in areas that initially seemed promising.

The IC must rethink its willingness to take risks in a field where change and failure is embraced as part of the key to future success. The IC must experiment and iterate its progress over time and shift from a culture that punishes even reasonable risk to one that embraces, mitigates, and owns it. This can only be done with a systematic, repeatable, and consistent approach to making risk-conscious decisions.

Today there is no cross-IC mechanism for thinking about risk, let alone for taking it. When considering new activities or approaches, each IC element manages risk through its own lens and mechanisms, if at all. Several individual IC elements have created internal risk assessment frameworks to help officers understand the risks of both action and inaction, and to navigate the decisions they are empowered to make depending upon the circumstances. These frameworks increase confidence that if an activity goes wrong, supervisors all the way up the chain will provide backing as long as the risk was reasonable, well-considered and understood, and the right leaders approved it. And while risk assessments are often not precise instruments of measurement – they reflect the quality of the data, the varied expertise of those conducting the assessments, and the subjective interpretation of the results – regularized and systematic risk assessments are nevertheless a key part of effective risk management and facilitate decision-making at all levels.


Go beyond the headlines with expert perspectives on today’s news with The Cipher Brief’s Daily Open-Source Podcast.  Listen here or wherever you listen to podcasts.


Creating these individual frameworks is commendable and leading-edge for government agencies, but more must be done holistically across the IC. Irregular and inconsistent risk assessments among IC elements will not provide the comfort and certainty needed to drive an IC-wide cultural shift to taking risk. At the same time, the unique nature of the IC, comprised of 18 different elements, each with similar and overlapping, but not identical, missions, roles, authorities, threats and vulnerabilities, does not lend itself to a one-size-fits-all approach.

For this reason, the IC needs a flexible but common strategic framework for considering risk that can apply across the community, with each element having the ability to tailor that framework to its own mission space. Such an approach is not unlike how the community is managed in many areas today – with overarching IC-wide policy that is locally interpreted and implemented to fit the specific needs of each IC element. When it comes to risk, creating an umbrella IC-wide framework will significantly improve the workforce’s ability to understand acceptable risks and tradeoffs, produce comprehensible and comparable risk determinations across the IC, and provide policymakers the ability to anticipate and mitigate failure and unintended escalation.

Critical Elements of a Risk Framework

A common IC AI risk framework should inform and help prioritize decisions from acquisition or development, to deployment, to performance in a consistent way across the IC. To start, the IC should create common AI risk management principles, like its existing principles of transparency and AI ethics, that include clear and consistent definitions, thresholds, and standards. These principles should drive a repeatable risk assessment process that each IC element can tailor to its individual needs, and should promote policy, governance, and technological approaches that are aligned to risk management.

The successful implementation of this risk framework requires a multi-disciplinary approach involving leaders from across the organization, experts from all relevant functional areas, and managers who can ensure vigilance in implementation. A whole-of-activity methodology that includes technologists, collectors, analysts, innovators, security officers, acquisition officers, lawyers and more, is critical to ensuring a full 360-degree understanding of the opportunities, issues, risks, and potential consequences associated with a particular action, and to enabling the best-informed decision.

Given the many players involved, each IC element must strengthen internal processes to manage the potential disconnects that can lead to unintended risks and to create a culture that instills in every officer a responsibility to proactively consider risk at each stage of the activity. Internal governance should include an interdisciplinary Risk Management Council (RMC) made up of senior leaders from across the organization. The RMC should establish clear and consistent thresholds for when a risk assessment is required, recommended, or not needed given that resource constraints likely will not allow all of the broad and diverse AI activities within organizations to be assessed. These thresholds should be consistent with the IC risk management principles so that as IC elements work together on projects across the community, officers have similar understandings and expectations.

The risk framework itself should provide a common taxonomy and process to:

  • Understand and identify potential failures, including the source, timeline, and range of effects.
  • Analyze failures and risks by identifying internal vulnerabilities or predisposing conditions that could increase the likelihood of adverse impact.
  • Evaluate the likelihood of failure, taking into consideration risks and vulnerabilities.
  • Assess the severity of the potential impact, to include potential harm to organizational operations, assets, individuals, other organizations, or the nation.
  • Consider whether the ultimate risk may be sufficiently mitigated or whether it should be transferred, avoided, or accepted.

AI-related risks may include, among other things, technology failure, biased data, adversarial attacks, supply chain compromises, human error, cost overruns, legal compliance challenges, or oversight issues.

An initial risk level is determined by considering the likelihood of a failure against the severity of the potential impact. For example, is there is a low, moderate, or high likelihood of supply chain compromise? Would such a compromise affect only one discrete system or are there system-wide implications? These calculations will result in an initial risk level. Then potential mitigation measures, such as additional policies, training, or security measures, are applied to lower the initial risk level to an adjusted risk level. For example, physically or logically segmenting an organization’s systems so that a compromise only touches one system would significantly decrease the risk level associated with that particular technology. The higher the likelihood of supply chain compromise, the lower the severity of its impact must be to offset the risk, and vice versa. Organizations should apply the Swiss Cheese Model of more than one preventative or mitigative action for a more effective layered defense. Organizations then must consider the adjusted risk level in relation to their tolerance for risk; how much risk (and potential consequence) is acceptable in pursuit of value? This requires defining the IC’s risk tolerance levels, within which IC elements may again define their own levels based upon their unique missions.

Understanding and considering the risk of action is an important step forward for the IC, but it is not the last step. Sometimes overlooked in risk assessment practices is the consideration of the risk of inaction. To fully evaluate potential options, decision-makers must consider whether the overall risk of doing something is outweighed by the risks of not doing it. If the IC does not pursue particular AI capabilities, what is the opportunity cost of that inaction? Any final determination about whether to take action must consider whether declining to act would cause greater risk of significant harm. While the answer will not always be yes, in the case of AI and emerging technology, it is a very realistic possibility.

And, finally, a risk framework only works if people know about it. Broad communication – about the existence of the framework, how to apply it, and expectations for doing so – is vital. We cannot hold people accountable for appropriately managing risk if we do not clearly and consistently communicate and help people use the structure and mechanisms for doing so.

Buy-in To Enhance Confidence

An IC-wide AI risk framework will help IC officers understand risks and determine when and how to take advantage of innovative emerging technologies like AI, increasing comfort with uncertainty and risk-taking in the pursuit of new capabilities. Such a risk framework will have even greater impact if it is accepted – explicitly or implicitly – by the IC’s congressional overseers. The final article in this series will delve more deeply into needed changes to further improve the crucial relationship between the IC and its congressional overseers. It will also provide a link to a full report that provides more detail on each aspect of the series, including a draft IC AI Risk Framework.

Although Congress is not formally bound by such a framework, given the significant accountability measures that often flow from these overseers, a meeting of the minds between the IC and its congressional overseers is critical. Indeed, these overseers should have awareness of and an informal ability to provide feedback into the framework as it is being developed. This level of transparency and partnership would lead to at least two important benefits: first, increased confidence in the framework by all; and second, better insight into IC decision-making for IC overseers.

Ultimately, such a mutual understanding would encourage exactly what the IC needs to truly take advantage of next-generation technology like AI: a culture of experimentation, innovation, and creativity that sees reasonable risk and failure as necessary steps to game-changing outcomes.

Read also AI and the IC: The Tangled Web of Budget and Acquisition

Read also Artificial Intelligence in the IC: Culture is Critical

Read also AI and the IC: The Challenges Ahead

Read more expert-driven national security insights, perspective and analysis in The Cipher Brief

The post A Roadmap for AI in the IC appeared first on The Cipher Brief.

find more fun & mates at SoShow now !