What we find is, we go out and we buy commercial threat intel,” Lt. Gen. Stephen Fogarty, the head of Army Cyber Command, said Sept. 16 at an event hosted by the Association of the U.S. Army.
In addition, the recently retired head of Special Operations Command, Gen. Raymond “Tony” Thomas has described how intelligence will begin with open source and then officials will fill in the gaps with information from classified channels. The proliferation of technology and information sharing capability is “forcing us to reconsider the art and science of intelligence,” he said in August 2018.
The DoJ’s rejection of a last-ditch appeal by the legal team representing fired FBI Director Andrew McCabe and the recommendation by federal prosecutors that charges actually be filed against the documented liar, leaker, and co-conspirator in the attempted coup against duly elected President Donald Trump puts the deep state in a face-to-face confrontation with a potential legal Armageddon. An indictment will leave McCabe with no excuse for not carrying out his threat to bring them all down with him.
“In our defeat-ISIS activities, we’ve had a struggle and presently continue to struggle with the challenge of open source and publicly available information, and how we leverage that to make it truly useful for the warfighter,” Jospeh Votel, former head of both Special Operations Command and Central Command.
In the almost 12 hours of Democratic Party presidential primary debates on June 26-27 and July 30-31, the words “Pentagon budget” or “defense spending” were not uttered, except for a fleeting, unanswered comment from Senator Bernie Sanders. Nor did any of the cable news moderators ask a single question about the more than $1.25 trillion dollars spent in 2019 for national security.
The history of espionage is a lesson in paradox: the better your intelligence, the dumber your conduct; the more you know, the less you anticipate.
The universal law of unintended consequences rules with a special ferocity in espionage and covert action, because pervasive secrecy rules out the small, mid-course corrections that are possible in normal social pursuits.