Examining the Need for a Cyber Intelligence Discipline

Ashley Tanner


Cyber has been dubbed the great equalizer, giving a wide range of individuals and groups the forum necessary to target, infiltrate and steal data, and threaten national security from anywhere in the world with widely available tools.  The U.S. intelligence community (IC) has been working to address this reality for years, creating cyber commands and hiring and training skilled professionals, but so far a key component is missing.  An established Cyber Intelligence discipline (CYBINT) would allow the IC to better target cyber-intelligence collection, analysis and dissemination in a manner that addresses the inherent challenges with the domain.  This paper seeks to examine why CYBINT is necessary by framing it within the larger issues of who uses cyber tools, the multi-faceted nature of their use and threat, and the threat they pose to U.S. interests.  The paper closes with a short examination of the value added of CYBINT to the IC.


Cyber Intelligence; Intelligence Disciplines

Full Text:



Brenner, Joel. America the Vulnerable: Inside the New Threat Matrix of Digital Espionage, Crime, and Warfare. New York City, NY: The Penguin Press, 2011.

Carr, Jeffrey. Inside Cyber Warfare. Sebastopol, CA: O’Reilly Media Inc, 2012.

“Cyber Intelligence… setting the landscape for an emerging discipline.” Intelligence and National Security Alliance. Created September 2011. http://www.oss- institute.org/storage/documents/Resources/studies/insa_cyber_intelligence_2011.pdf.

Directorate of Intelligence. “Intelligence Collection Disciplines.” Federal Bureau of Investigation. Accessed July 29, 2013. http://www.fbi.gov/about-us/intelligence/disciplines.

Greenberg, Andy. “What Stuxnet’s Exposure As An American Cyber Weapon Means For Cyberwarfare.” Forbes. Created June 1, 2012. http://www.forbes.com/sites/andygreenberg/2012/06/01/what-stuxnets-exposure-as-an- american-weapon-means-for-cyberwar/.

Krebs, Brian. “Taking on the Russian Business Network.” The Washington Post Security Fix. Created October 13, 2007. http://voices.washingtonpost.com/securityfix/2007/10/taking_on_the_russian_business.ht ml.

Nakashima, Ellen. “Cyber-intruder sparks massive federal response – and debate over dealing with threats.” Washington Post. Created December 8, 2011. http://www.washingtonpost.com/national/national-security/cyber-intruder-sparks- response-debate/2011/12/06/gIQAxLuFgO_story.html.

Nieva, Richard. “Big Banks Stage Mega-Cyberattack Drill.” CNN Money. Created July 18, 2013. http://money.cnn.com/2013/07/18/technology/security/bank- cyberattack/index.html.

Rid, Thomas. “Cyber-Sabotage is Easy.” Foreign Policy. Created July 23, 2013. http://www.foreignpolicy.com/articles/2013/07/23/cyber_sabotage_is_easy_i_know_i_di d_it?page=0,1.

The Interagency OPSEC Support. “Operations Security Intelligence Threat Handbook.” FAS. Updated May 1996. http://www.fas.org/irp/nsa/ioss/threat96/part02.htm.

“World Telecommunications/ICT Indicators database 2013.” UN International Telecommunications Union. Released June 17, 2013. http://www.itu.int/en/ITUD/Statistics/Pages/stat/default.aspx.


  • There are currently no refbacks.