Skip to main content

Currently Skimming:

6 Implications for U.S. Intelligence
Pages 101-104

The Chapter Skim interface presents what we've algorithmically identified as the most significant single chunk of text within every page in the chapter.
Select key terms on the right to highlight them within pages of the chapter.

From page 101...
... intelligence in protecting various intelligence activities and communications and also a challenge when it comes to collecting intelligence. Offense and defense, or decryption and encryption, are both absolute necessities for successful intelligence operations.
From page 102...
... national security … it is the multiplicity & interconnectedness of potential threats … that constitute our biggest challenge." Recognition of the variety of threats was a major factor in the creation and adoption of the National Intelligence Priorities Framework (NIPF) in 2003.The NIPF is driven by a prioritized list of issues, as determined by the members of the National Security Council.
From page 103...
... The second issue is the question of how these intelligence efforts regarding encryption across several agencies can be coordinated to ensure the sharing of information about the encryption issue, threats, developments, and opportunities. The third issue is that the various capabilities discussed in this study -- whether to create successful encryption or to defeat encryption -- require strong technical capabilities in terms of both technology and people.
From page 104...
... This report posits that while the availability of a large-scale quantum computer sufficient to attack current public-key encryption is uncertain in a 20-year time frame, other developments in the realms of scientific advances and the integration of encryption into systems are likely to alter the encryption challenges and opportunities facing the U.S. government.

This material may be derived from roughly machine-read images, and so is provided only to facilitate research.
More information on Chapter Skim is available.