AI and the Five Phases of the Threat Intelligence Lifecycle

Artificial intelligence (AI) and large language models (LLMs) can help threat intelligence teams to detect and understand novel threats at scale, reduce burnout-inducing toil, and grow their existing talent by democratizing access to subject matter expertise. However, broad access to Read More …

China used stolen data to expose CIA operatives in Africa and Europe

Around 2013, U.S. intelligence began noticing an alarming pattern: Undercover CIA personnel, flying into countries in Africa and Europe for sensitive work, were being rapidly and successfully identified by Chinese intelligence, according to three former U.S. officials. The surveillance by Read More …

UK: Police anti-terror IT system was ‘not fit for purpose’ – former officer

A key intelligence database used by police to investigate extremists was “not fit for purpose” when introduced in 2014, a former counter-terrorism officer has told the BBC. The officer, who retired in 2018, says the National Common Intelligence Application (NCIA) Read More …

23 IS conducts virtual PAI training

Reserve Citizen Airmen from the 23rd Intelligence Squadron organized and executed a first-ever, unit-wide Publicly Available Information (PAI) training session June 6, 2020. The goal of the training was to educate 23 IS Airmen with PAI best practices and highlight Read More …

Tools like Palantir illustrate how easily big data can be misused

Data privacy has become a topic of critical concern among tech and business leaders, following revelations that Cambridge Analytica harvested the data of some 87 million Facebook users to build targeted political content. However, Cambridge Analytica is only one of perhaps many Read More …