March 13, 2015 By Shane Schick 2 min read

The ongoing digitalization of surveillance processes, coupled with increased cybersecurity threats, has led the CIA to launch a digital directorate focused on improved monitoring and protecting electronic information.

In a letter that was made publicly available on the CIA’s website, CIA Director John Brennan said the Directorate of Digital Innovation would span activities such as listening in on social media channels, cyber espionage and more traditional security functions such as protecting email servers.

Experts told SC Magazine that while the CIA obviously needs to keep pace with modern forms of communication, the digital directorate could raise more questions about other public sector organizations such as the National Security Agency (NSA), which has been criticized for spying on citizens. As its reorganization takes shape, the CIA may need to explain which types of checks and balances will be put in place to prevent overreaches.

On the other hand, the Washington Post said the digital directorate will create better cohesion throughout the CIA, particularly branches that have focused on potential cyberattacks from foreign entities and those that provide various forms of data analysis. The overhaul will also provide a means of training and developing talent to help CIA agents avoid being tracked by their digital activities.

This is only the latest move by a U.S. government organization to take steps toward better IT security. Just last month, the White House announced a broad cybersecurity strategy as part of President Barack Obama’s State of the Union address, which looked at measures by which private businesses could better share information about data breaches and cyberattacks. With that backdrop, it’s unsurprising that the CIA is also placing greater emphasis on studying the way information is digitally collected and stored.

In a story from Reuters, former CIA officials said too much of the expertise on digital subjects has been siloed across the agency, which reportedly hasn’t pursued a reorganization of this magnitude in more than 20 years. Given external threats such as ISIS and internal threats such as Edward Snowden — who was a contractor for the CIA and NSA — the digital directorate feels nearly inevitable.

More from

Making smart cybersecurity spending decisions in 2025

4 min read - December is a month of numbers, from holiday countdowns to RSVPs for parties. But for business leaders, the most important numbers this month are the budget numbers for 2025. With cybersecurity a top focus for many businesses in 2025, it is likely to be a top-line item on many budgets heading into the New Year.Gartner expects that cybersecurity spending is expected to increase 15% in 2025, from $183.9 billion to $212 billion. Security services lead the way for the segment…

Security roundup: Top AI stories in 2024

3 min read - 2024 has been a banner year for artificial intelligence (AI). As enterprises ramp up adoption, however, malicious actors have been exploring new ways to compromise systems with intelligent attacks.With the AI landscape rapidly evolving, it's worth looking back before moving forward. Here are our top five AI security stories for 2024.Can you hear me now? Hackers hijack audio with AIAttackers can fake entire conversations using large language models (LLMs), voice cloning and speech-to-text software. This method is relatively easy to…

Another category? Why we need ITDR

5 min read - Technologists are understandably suffering from category fatigue. This fatigue can be more pronounced within security than in any other sub-sector of IT. Do the use cases and risks of today warrant identity threat detection and response (ITDR)? To address this question, we work backwards from the vulnerabilities, threats, misconfigurations and attacks that IDTR specializes in providing visibility into. As identity threat detection and response (ITDR) technology evolves, one of the most common queries we get is: “Why do we need…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today