Newsweek, June 21, 2018–For five years, James B. Shaffer had been a young analyst at the CIA’s Office of Intelligence and Research.
He had been assigned to develop the agency’s new computer network technology, and was in charge of the agency-wide efforts to monitor, detect, and counter foreign threats.
By mid-2018, Shaffer was leading an analysis team that was preparing to launch an operation to seize control of the country’s nuclear weapons facilities.
That mission had never been attempted.
Now Shaffer and his team were planning a daring attack on the facility and the American people, using their newly acquired cyber tools to take over America’s nuclear facilities and control of its nuclear forces.
The mission was so controversial, that within days of its launch, the president of the United States, Donald J. Trump, and the secretary of defense, James Mattis, had publicly expressed their skepticism that the operation would succeed.
But Shaffer, who had been trained in the Army Intelligence Corps, had already been in the CIA for four years.
His experience in the intelligence community had prepared him for this mission.
After the election, Shackleff and his colleagues at the Office of Science and Technology Policy, or the Office for Science and Engineering Assessment, were tasked with assessing the nation’s cyber capabilities and making recommendations on how to improve them.
The two-year, $50 million project was the brainchild of Shaffer’s colleague, David M. Ollman, the former chief of staff to the secretary and a top-ranking officer at the NSA.
The team had been looking for ways to strengthen the nation, and to provide the U.S. with a competitive advantage in cyberspace, Ollmans team argued.
They were looking for solutions to problems that plagued the intelligence agency in the 1990s, when the agency was mired in scandal.
The cyber challenge was so daunting that the agency had never faced a cyber threat to its computers, Ollimans team believed.
The intelligence community was struggling to understand and respond to the threat, Ollomans team reasoned.
The problem with cyber attacks was that they were invisible to the average person, and that most people couldn’t figure out how to respond to them.
To solve this problem, Oellmans team wanted to build a cyber-based threat assessment tool that would allow them to understand how cyber attacks might affect the U,S., and the world.
To accomplish this, OLLmans team developed the “CrowdStrike” project.
CrowdStrike was an open source tool developed by Ollishams team that they used to assess how hackers could gain access to sensitive information.
The project was a joint effort between the NSA, the CIA, and a group of academic and industry experts.
A computer scientist who worked for CrowdStrike told Newsweek that the project was aimed at addressing two of the main challenges facing the intelligence agencies: the ability of hackers to compromise the networks of foreign intelligence targets, and their ability to obtain data from computers connected to these targets.
The ability of a hacker to access a target’s computer system is critical to gaining control of a target, and also to stealing data.
Crowdstrike’s tool could assess the threat posed by hackers to target a foreign intelligence target’s networks, and it could provide intelligence analysts with a comprehensive understanding of how hackers were attempting to gain access.
The CrowdStrike project was also used to analyze the impact of a number of cyberattacks on the intelligence systems of foreign governments, which were not yet considered cyber threats.
These attacks had occurred on a number, and some were particularly damaging to the intelligence and military communities.
In fact, a cyberattack that affected only one government would not necessarily represent a cyber attack that would impact other government networks.
The fact that the United Kingdom, the Netherlands, and Israel were not among the five countries affected by the attack made CrowdStrike’s analysis of these attacks difficult.
To be clear, CrowdStrike and other cyber analysts could assess a foreign government’s network if they had access to its network and its data, and they could also conduct analysis of the systems of other foreign governments if they used its data or its systems.
The United Kingdom was the first country to be targeted, in June 2018.
But this was only the beginning of the story.
The next five years of the Obama administration were going to be a time of uncertainty for the U to take its place as the world’s leader in cyber security.
The Trump administration was eager to get started.
In early January, Trump signed an executive order directing the CIA to build “cyberwarfare” capabilities to counter cyber attacks by foreign governments.
The order included several proposals to increase cyber-operations and other capabilities at the Agency.
For instance, the order proposed a $200 million budget for cyber-security research.
The budget was a $400 million increase over previous years, and included $150 million for new cyber-threat detection and prevention.
Trump also signed an order