Councils

Join A Council!

Council service is open to INSA members in good standing. Simply complete this brief form & our membership team will contact you with next steps. 

Apply to Join! 

Where Expertise Meets Action.

INSA’s policy councils and subcommittees bring together professionals from government, industry, and academia to address the intelligence and national security community’s most pressing challenges. Councils do not just talk about issues; they help shape them.

As a member, councils offer:

  • Opportunities to shape policies that strengthen the IC's effectiveness and efficiency 
  • Thought leadership through white papers, op-eds, podcasts, and panel discussions
  • Collaboration with peers and government partners in trusted, solution-focused forums
  • Access to government and academic leaders who share challenges, priorities, and opportunities for collaboration

Get Involved!

Council service ensures that INSA members play an active part in advancing policy ideas and solutions that support the U.S. intelligence and national security mission.


Thought Leadership

White Papers & Op-Eds

Getting Ahead of Foreign Influence Operations

May 14, 2018, 00:00 by Christopher Nardozza

Russia’s extensive use of Facebook and Twitter to sow discord during the 2016 presidential campaign has made clear that both public and private sector cybersecurity programs are poorly equipped to identify foreign influence operations. Government agencies and corporations focus primarily on defending against cyber attacks that target their technical infrastructure, often at the expense of detecting cyber-based influence operations that seek to shape beliefs. By searching for malware that could damage their networks, they are missing malicious messages that damage our nation.

It is imperative that we differentiate between technical attacks targeting cyber infrastructure and influence operations using cyber infrastructure. The former penetrates networks to either steal information or produce malicious effects on a network. The latter employs cyber infrastructure to deliver political or sociological messages to produce a desired effect in the public discourse. By focusing on technical cyber attacks – which hold data at risk and undermine confidence in the ability to conduct business online – the U.S. government, the media, and the public typically miss signs of influence operations.

Influence operations obscure truths, exacerbate rifts in the public discourse, and undermine the ability of public officials to conduct diplomacy and craft policy. To defend against hostile messages as well as technical attacks, this paper will illustrate why both government agencies and private companies must:

  • Differentiate between cyber attacks and influence operations;
  • Encourage collaboration between information security officials who can see signs of an attack and foreign affairs experts who understand foreign adversaries’ intentions;
  • Promote engagement between government, industry, academia, and the media that enhances their collective ability to identify influence operations and to educate the public on their adverse impact; and
  • Make use of artificial intelligence and machine learning (AI/ML) to identify malicious messages contained in the bits and bytes that cross an organization’s cyber infrastructure.
[button text="Download This Paper (PDF)" url="https://www.insaonline.org/wp-content/uploads/2018/05/INSA-Position-Paper-Influence-Operations-May-2018.pdf" size="middle" type="default" text_color="#fff" mouseover_text_color="#000" bg_color="#14b3e4" bg_transparent="0" mouseover_bg_color="" mouseover_bg_transparent="1" border_color="" border_color_transparent="1" mouseover_border_color="#000" mouseover_border_color_transparent="0" sc_id="sc967866602614"]

Podcasts

Getting Ahead of Foreign Influence Operations

May 14, 2018, 00:00 by Christopher Nardozza

Russia’s extensive use of Facebook and Twitter to sow discord during the 2016 presidential campaign has made clear that both public and private sector cybersecurity programs are poorly equipped to identify foreign influence operations. Government agencies and corporations focus primarily on defending against cyber attacks that target their technical infrastructure, often at the expense of detecting cyber-based influence operations that seek to shape beliefs. By searching for malware that could damage their networks, they are missing malicious messages that damage our nation.

It is imperative that we differentiate between technical attacks targeting cyber infrastructure and influence operations using cyber infrastructure. The former penetrates networks to either steal information or produce malicious effects on a network. The latter employs cyber infrastructure to deliver political or sociological messages to produce a desired effect in the public discourse. By focusing on technical cyber attacks – which hold data at risk and undermine confidence in the ability to conduct business online – the U.S. government, the media, and the public typically miss signs of influence operations.

Influence operations obscure truths, exacerbate rifts in the public discourse, and undermine the ability of public officials to conduct diplomacy and craft policy. To defend against hostile messages as well as technical attacks, this paper will illustrate why both government agencies and private companies must:

  • Differentiate between cyber attacks and influence operations;
  • Encourage collaboration between information security officials who can see signs of an attack and foreign affairs experts who understand foreign adversaries’ intentions;
  • Promote engagement between government, industry, academia, and the media that enhances their collective ability to identify influence operations and to educate the public on their adverse impact; and
  • Make use of artificial intelligence and machine learning (AI/ML) to identify malicious messages contained in the bits and bytes that cross an organization’s cyber infrastructure.
[button text="Download This Paper (PDF)" url="https://www.insaonline.org/wp-content/uploads/2018/05/INSA-Position-Paper-Influence-Operations-May-2018.pdf" size="middle" type="default" text_color="#fff" mouseover_text_color="#000" bg_color="#14b3e4" bg_transparent="0" mouseover_bg_color="" mouseover_bg_transparent="1" border_color="" border_color_transparent="1" mouseover_border_color="#000" mouseover_border_color_transparent="0" sc_id="sc967866602614"]