Éditoriaux Défense Sécurité Terrorisme Zones de conflits Logistique Livres de référence Liens
Terre Air Mer Gendarmerie Renseignement Infoguerre Cyber Recherche

Remarks for CIA Director John O

Good Intelligence Is the Cornerstone of National Security Policy

Remarks for CIA Director John O. Brennan as Prepared for Delivery at the Center for Strategic & International Studies Global Security Forum 2015, Washington DC, November 16, 2015. Source : CIA.

Thank you very much, John, for those kind words and thank you for inviting me to speak this morning at CSIS’s Global Security Forum. I had the pleasure of speaking at CSIS when I was at the White House serving as Assistant to the President for Homeland Security and Counterterrorism, and it is a privilege to come back to share some thoughts with you on some of the major global challenges our country faces today.

I also want to express publicly my deep appreciation to John Hamre, who has led CSIS for nearly 16 years and who is certainly one of the leading lights in the field of national security. After a distinguished government career, John has continued to make important contributions to our national security, and I think I speak for all of us in thanking him for adding such wisdom and value to the public conversation on global issues. [Applaud]

In many respects, CSIS shares the mission of our Intelligence Community: to help policymakers identify, understand, and—hopefully—successfully address the myriad national security issues that our Nation faces in a dynamic and very dangerous world.

A very dangerous world, indeed.

My opening remarks this morning are different from those I reviewed and finalized in the early afternoon of last Friday. They are different because our sensibilities and our souls have been jarred once again by the horrific and wanton violence perpetrated upon the innocent in the streets, cafes, and concert halls of the beautiful city of Paris. Our hearts ache for the scores killed and injured in those savage attacks, and our thoughts and prayers are with them and their families. Likewise, our condolences and our prayers go out to those killed in the crash of the Russian airliner a little over two weeks ago in the Sinai, Egypt.

And while we await confirmation of culpability for these tragedies, they each bear the hallmarks of terrorism carried out by the so-called Islamic State of Iraq and the Levant, or ISIL, an organization of murderous sociopaths that carries out its criminal and morally depraved actions under bogus religious pretense. With its roots in al-Qa’ida in Iraq, and empowered by a large influx of foreign adherents, ISIL over the past several years has swallowed up large swaths of territory in Iraq and Syria, brutally killing thousands upon thousands of men, women, and children along the way. Not content to limiting its killing fields to Iraqi and Syrian lands and to setting up local franchises in other countries of the Middle East, South Asia, and Africa, ISIL has developed an external operations agenda that it is now implementing with lethal effect.

I am sure that we will talk more about ISIL in the question and answer session, but let me note that the grave threat posed by the phenomenon of ISIL makes it absolutely imperative that the international community urgently commit to achieving an even greater and unprecedented level of cooperation, collaboration, information sharing, and joint action—in intelligence, law enforcement, military, and diplomatic channels. The ISIL threat demands it.

At CIA, we work closely with foreign intelligence security services around the globe to advance our shared counterterrorism goals. Over the course of many years, we have forged broad and deep partnerships with our closest allies in Europe such as Great Britain, France, and many, many others. These strategic relationships have been instrumental in helping to knit together a transnational architecture that allows counterterrorism officials and experts to work closely together across sovereign borders to disrupt terrorist plans and activities. And while many terrorist operations have been thwarted as a result of strong transnational teamwork, tragically, not all terrorist plans are uncovered in time.

These strategic counterterrorism relationships need to stretch far beyond the traditional trans-Atlantic environment and alliances, which is why we are working closely with so many services in different parts of the world.

For instance, we are working very closely with our Egyptian partners, who are working tirelessly to prevent ISIL terrorists from launching attacks that are aimed at derailing Egypt’s political reform initiatives and economic development objectives. I reiterated our commitment to strengthening our counterterrorism partnership with Cairo in a call to my Egyptian counterpart this past weekend.

And while Washington and Moscow have significant policy differences on how best to bring the bloodshed in Syria to a close, I have had several conversations with one of my Russian counterparts over the past several weeks about ways to strengthen U.S.-Russian counterterrorism cooperation, specifically on the ISIL threat.

These relationships are an essential adjunct to diplomacy and military operations. By working with our foreign partners, we enhance global security by helping them tackle challenges that threaten us all. And we benefit from a wider net of collection and from the insights of local services, all of which enhance the intelligence we provide to policymakers.

The fact is, good intelligence—timely, accurate, and insightful—is the cornerstone of almost every aspect of national security policy today, from military action to diplomacy to international law enforcement.

With good intelligence, our policymakers can better understand the risks, challenges, and opportunities attendant to key national security issues, which is ever-more important given the unprecedentedly complex and overlapping array of major challenges to US and global security that we face today.

The impression one might get from the daily headlines is that the world has become more unstable. And indeed, the historical record supports that judgment.

In the past three years, there have been more outbreaks of instability than at any time since the collapse of the Soviet Union, matching the rate we saw during decolonization in the 1960s. This has not just been a period of protests and government change, but of violent insurgency and, in particular, of breakdowns in many states’ ability to govern.

Ongoing conflicts in Syria, Iraq, Ukraine, Yemen, Libya, and parts of Africa are clear examples. The human toll is reflected in the UN’s recent announcement that the number of refugees and internally displaced persons in the world is the highest it has been since World War II. And of course, all this localized strife gives rise to the persistent threat of international terrorism.

When CIA analysts look for deeper causes of this rising instability, they find nationalistic, sectarian, and technological factors that are eroding the structure of the international system. They also see socioeconomic trends, the impact of climate change, and other elements that are cause for concern. Let me touch upon a couple of them.

First, the ideas, institutions, and states that have undergirded the post-Cold War system are under significant stress. It is easy to think of this as a phenomenon confined to the developing world, and that is certainly where we see states that have actually failed, and borders that no longer carry any practical effect, such as the border between Syria and Iraq. But there is considerable stress on governments in even the world’s most stable regions.

In Europe, for instance, the migration crisis, sluggish economic growth, and a host of other factors have given rise to heightened nationalism, secession movements, and the increasing popularity of political parties on both the far-right and far-left. Even ideas that were the pillars of the Continent’s postwar prosperity—such as economic integration and democracy itself—are being questioned in some quarters.

Across the globe, in both authoritarian and democratic societies, governments are finding it increasingly difficult to meet the demands—realistic or not—of their skeptical and restive populaces. The so-called Arab Spring revolutions were not fought for democracy per se as much as they were fought for relief from regimes that had failed to meet basic standards of governance and civil society.

And as we have seen, when people become disillusioned with the powers that be, social media enable them to more quickly and easily form associations that defy the status quo. And in part, that is why the global landscape has been changing at a faster, more disruptive pace.

How nations respond to these challenges, adapt to them, and evolve will be one of the great plot lines of this century.

When I meet with my foreign counterparts—from both friendly and not-so-friendly governments—I sense a very real apprehension about instability and its various manifestations: terrorism, humanitarian crises, proliferation, and so on. Interestingly, I hear these concerns even from officials representing governments whose policies are quite arguably contributing to the problem.

In Europe, anxiety has risen in states along Russia’s periphery after Moscow demonstrated its willingness to use military and paramilitary forces in Ukraine. And in the South China Sea, tensions persist as China unilaterally pursues its territorial claims, including actions that rival claimants perceive as violating their sovereignty.

At the same time, the principle of democratic governance is under siege. For the ninth consecutive year, Freedom House in 2014 reported more declines than gains in the quality of democracy worldwide. Worsening ethno-sectarian and socioeconomic strains are eroding democracy, as is the rise of a more sophisticated form of authoritarianism that forgoes brute force and heavy-handed propaganda in favor of media manipulation, ubiquitous surveillance, criminalization of dissent, and controlled elections.

Second, the resumption of strong, sustained growth in the wake of the 2008 financial crash and Eurozone crisis has been elusive for some of the world’s largest economies. Even China’s economy, with its seemingly endless potential for growth, is slowing.

In many developing societies, growing pessimism about the prospects for economic advancement is fueling instability. Regions with burgeoning youth populations, such as the Arab world, have been unable to achieve the growth needed to reduce high unemployment rates. Perceptions of growing inequality have resulted in more assertive street politics and populism. At the same time, slower growth has left these nations with fewer resources to devote to economic, humanitarian, and peacekeeping assistance to address these challenges.

Mankind’s relationship with the natural world is aggravating these problems and is a potential source of crisis itself. Last year was the warmest on record, and this year is on track to be even warmer.

Extreme weather, along with public policies affecting food and water supplies, can worsen or create humanitarian crises. Of most immediate concern, sharply reduced crop yields in multiple places simultaneously could trigger a shock in food prices with devastating effect, especially in already fragile regions such as Africa, the Middle East, and South Asia. Compromised access to food and water greatly increases the prospect for famine and deadly epidemics.

And finally, the rapid advance of information technology has given rise to an entirely new and wide-open domain for human interaction and progress: the cyber realm.

As an intelligence officer, much of my job involves dealing with the unintended consequences of the cyber revolution. For as much as it brings the world together, it also serves the purposes of those who wish us harm.

Of greatest concern, the cyber realm gives small groups and even individuals the potential to inflict damage on a scale previously restricted to nation-states. And while states are largely rational actors subject to deterrence, the same does not apply to terrorists and criminals.

Both government and private networks are under constant attack. The Department of Homeland Security reports that more than 640,000 cyber-related incidents affected federal agencies in fiscal year 2014. The massive and prolonged hacking of employee records held by the Office of Personnel Management underscores the intensity of assaults on government IT systems. And I am all too familiar with the ease with which miscreant hackers can use social engineering techniques to perpetrate criminal intrusions into personal email accounts and information technology and communication systems.

Unfortunately, there is every reason to expect cyber intrusions to increase in quantity, cunning, and impact. For one thing, the economics of cyber attacks are skewed to favor the attacker.

“Exploits,” or malicious software tools, are easily acquired. In fact, their prices are falling dramatically in some criminal markets, not because of declining demand but because of an increasingly competitive marketplace. These exploits can be reused on multiple targets, and the likelihood of detection and punishment remains low.

And while the vast majority of cyber attacks target money, proprietary information, and privacy itself, we need to realize that the range of potential targets is much greater. We simply cannot discount the very real possibility of attacks against vital infrastructure—utilities, transportation, and other essential underpinnings of modern civilization.

The world has changed dramatically since I first raised my hand and swore an oath of allegiance to the United States Government as a 24-year old newly minted CIA officer eager to make a difference in August of 1980. I remember vividly taking a seat at my first desk on the sixth floor of our Langley Headquarters, putting my fingers not on the keyboard of a computer but on the keys of an electric typewriter, which was quite high tech at the time.

Thirty-five years later, our lives as well as our fingers are inextricably linked to the cyber realm—the new digital frontier, where most human interactions, transactions, and communications take place. And while that digital environment holds tremendous potential and opportunity for the further advancement of humanity, our increasing dependence on it brings obvious risks and challenges.

To deal with those risks and challenges, reactive strategies are insufficient. There has to be systematic learning, informed by constant information sharing, so that one organization’s detection becomes another’s prevention.

In other words, countering cyber threats is very much a team effort. And a crucial point to bear in mind is that about 85 percent of the Worldwide Web’s critical infrastructure is held by the private sector. This is a privately owned and operated environment in which the rules remain uncertain at best.

A number of federal efforts in recent years have promoted the sharing of cyber threat information between the private sector and government. DHS and FBI, for example, have programs to share cyber threat information with a broad community of industry stakeholders.

We should be sharing a lot more information than we are as a nation, but programmatic, technical, and legal challenges—as well as concerns about privacy and the role of government—have hampered progress. Congress over the past few years has tried, so far without success, to pass laws addressing the need for comprehensive cyber policy, especially on information sharing.

The fact is, 20th century laws cannot effectively deal with 21st century threats.

Within the past few weeks, the Senate passed the Cybersecurity Information Sharing Act, or CISA, which is roughly similar to two bills passed in the House. We may see a conferenced bill by early next year, which would be an important step forward.

And as our country deals with this issue—and, specifically, the security and privacy concerns that revolve around information sharing—it is important to note that security and privacy are not mutually exclusive. The benefits of improved information sharing can be achieved in a manner that protects privacy and civil liberties.

My hope is that America—ideally, along with our allies—can eventually adopt a comprehensive legal and operational approach to this threat without being forced to by a catastrophic cyber attack, in the same way that 9/11 forced our country to integrate its national security assets in a more rational and effective way against terrorism.

Shortly after I returned to the Agency some two-and-a-half years ago, I started to consider what we could do to ensure that CIA is well-prepared for both the opportunities and challenges of the future. The digital world stood out as an area that required special attention.

When I asked a group of our senior officers last fall to ponder the Agency’s future and come back with a strategic plan, they agreed that we had to do a much better job of embracing and leveraging the digital revolution. Consequently, one of the pillars of the modernization program we launched last March was the addition of a fifth Directorate as part of the biggest change to CIA’s structure in five decades: the Directorate of Digital Innovation.

This new Directorate is at the center of the Agency’s effort to hasten the adoption of digital solutions into every aspect of our work. It is responsible for accelerating the integration of our digital and cyber capabilities across all our mission areas—espionage, all-source analysis, open source intelligence, and covert action.

Multiple elements of the Agency in the past have responded to the challenges of the digital era. But if we are to excel in the wired world, we must place our activities and operations in the digital domain at the very center of all our endeavors.

Our new digital directorate was launched last month, and we expect it to contribute enormously to every facet of our global mission. Alongside our partners across the Intelligence Community, we at CIA will be more capable and effective in safeguarding our country from the full range of threats we face beyond our borders.

Let me conclude by saying what I always say to each new class of Agency officers to whom I administer the oath of office every month in our Headquarters lobby. I have the absolutely best job in the world, because I work each day with some of the most dedicated, talented, courageous, and patriotic individuals this country has to offer. And, in light of the nature and scope of the national security challenges I just highlighted, the need for the contributions of these individuals has never been greater.

Thank you, and I’ll be happy to take your questions.

Related Topic :

"The Challenges of Ungoverned Spaces" by John O. Brennan (13-07-2016).
"The Overarching Challenge of Instability" by John O. Brennan (29-06-2016).
"ISIL IS a Formidable, Resilient, and Largely Cohesive Enemy" by John O. Brennan (16-06-2016).
"CIA : Between Transparency and Secrecy" " by David S. Cohen (21-04-2016).
"Instability Has Become a Hallmark of Our Time" by John O. Brennan (03-03-2016).
"Good Intelligence Is the Cornerstone of National Security Policy" by John O. Brennan (16-11-2015).
"CIA & The OSS Legacy" by John O. Brennan (07-11-2015).
"Addressing Challenging and Consequential Issues of Our Time" by John O. Brennan (05-11-2015).
"Intelligence : Between Policy Success and Intelligence Failure" by John O. Brennan (15-10-2015).
"The CIA of the Future" by David S. Cohen (15-09-2015).
"Democracy Does Not Keep Secrets Merely for Secrecy’s Sake" by John O. Brennan (15-09-2015).
"U.S Intelligence in a Transforming World" by John O. Brennan (13-03-2015).


Derniers articles

Verdun 2016 : La légende de la « tranchée des baïonnettes »
Eyes in the Dark: Navy Dive Helmet Display Emerges as Game-Changer
OIR Official: Captured Info Describes ISIL Operations in Manbij
Cyber, Space, Middle East Join Nuclear Triad Topics at Deterrence Meeting
Carter Opens Second DoD Innovation Hub in Boston
Triomphe de St-Cyr : le Vietnam sur les rangs
Dwight D. Eisenhower Conducts First OIR Missions from Arabian Gulf
L’amiral Prazuck prend la manœuvre de la Marine
Airmen Practice Rescuing Downed Pilots in Pacific Thunder 16-2
On ne lutte pas contre les moustiques avec une Kalachnikov...
Enemy Mine: Underwater Drones Hunt Buried Targets, Save Lives
Daesh Publications Are Translated Into Eleven Languages
Opération Chammal : 10 000 heures de vol en opération pour les Mirage 2000 basés en Jordanie
Le Drian : Daech : une réponse à plusieurs niveaux
Carter: Defense Ministers Agree on Next Steps in Counter-ISIL Fight
Carter Convenes Counter-ISIL Coalition Meeting at Andrews
Carter Welcomes France’s Increased Counter-ISIL Support
100-Plus Aircraft Fly in for Exercise Red Flag 16-3
Growlers Soar With B-1s Around Ellsworth AFB
A-10s Deploy to Slovakia for Cross-Border Training
We Don’t Fight Against Mosquitoes With a Kalashnikov
Bug-Hunting Computers to Compete in DARPA Cyber Grand Challenge
Chiefs of US and Chinese Navies Agree on Need for Cooperation
DoD Cyber Strategy Defines How Officials Discern Cyber Incidents from Armed Attacks
Vice Adm. Tighe Takes Charge of Information Warfare, Naval Intelligence
Truman Strike Group Completes Eight-Month Deployment
KC-46 Completes Milestone by Refueling Fighter Jet, Cargo Plane
Air Dominance and the Critical Role of Fifth Generation Fighters
Une nation est une âme
The Challenges of Ungoverned Spaces
Carter Salutes Iraqi Forces, Announces 560 U.S. Troops to Deploy to Iraq
Obama: U.S. Commitment to European Security is Unwavering in Pivotal Time for NATO
International Court to Decide Sovereignty Issue in South China Sea
La SPA 75 est centenaire !
U.S. to Deploy THAAD Missile Battery to South Korea
Maintien en condition des matériels : reprendre l’initiative
La veste « léopard », premier uniforme militaire de camouflage
Océan Indien 2016 : Opérations & Coopération
Truman Transits Strait of Gibraltar
Navy Unveils National Museum of the American Sailor
New Navy, Old Tar
Marcel Dassault parrain de la nouvelle promotion d’officiers de l’École de l’Air
RIMPAC 2016 : Ravitaillement à la mer pour le Prairial avant l’arrivée à Hawaii
Bataille de la Somme, l’oubliée
U.S., Iceland Sign Security Cooperation Agreement
Cléopatra : la frégate Jean Bart entre dans l’histoire du BPC Gamal Abdel Nasser
Surveiller l’espace maritime français aussi par satellite
America's Navy-Marine Corps Team Fuse for RIMPAC 2016
Stratégie France : Plaidoyer pour une véritable coopération franco-allemande
La lumière du Droit rayonne au bout du chemin





Directeur de la publication : Joël-François Dumont
Comité de rédaction : Jacques de Lestapis, Hugues Dumont, François de Vries (Bruxelles), Hans-Ulrich Helfer (Suisse), Michael Hellerforth (Allemagne).
Comité militaire : VAE Guy Labouérie (†), GAA François Mermet (2S), CF Patrice Théry (Asie).

Contact