The Big Three: N. Korea, ISIS and CyberWar

Director of National Intelligence James Clapper delivered his annual assessment of the top dangers facing the U.S to the Senate Armed Services Committee recently. 

Clapper said North Korea has expanded a uranium enrichment facility and restarted a plutonium reactor.

Clapper also said that Islamic militants will continue plotting against US interests overseas and homegrown attacks will pose the most significant threat from violent extremists to Americans at home.

"The perceived success of attacks by homegrown violent extremists in Europe and North America, such as those in Chattanooga and San Bernardino, might motivate others to replicate opportunistic attacks with little or no warning, diminishing our ability to detect terrorist operational planning and readiness," he said.

"ISIL involvement in homeland attack activity will probably continue to involve those who draw inspiration from the group's highly sophisticated media without direct guidance from ISIL leadership," he said using an acronym for the militant group.

Clapper also said Iran remains the top state sponsor of terrorism, al-Qaida-linked groups remain resilient and the US will continue to see cyber threats from China, Russia and North Korea.

Clapper also said, US information systems, controlled by the US government and American industry, are vulnerable to cyberattacks from Russia and China.

North Korea "probably remains capable and willing to launch disruptive or destructive cyberattacks to support its political objectives," he said.

Moscow "is assuming a more assertive cyber posture" that is based on its willingness to target critical infrastructure and carry out espionage operations even when those operations have been detected and under increased public scrutiny, Clapper said.

Russia's cyber operations are likely to target US interests in part to underpin its intelligence gathering to support Russia's moves in the Ukraine and Syrian crises, he said.

Clapper said China selectively uses cyberattacks against targets Beijing believes threaten Chinese domestic stability or regime legitimacy.

"We will monitor compliance with China's September 2015 commitment to refrain from conducting or knowingly supporting cyber-enabled theft of intellectual property with the intent of providing competitive advantage to companies or commercial sectors," he said.

Ein News: http://bit.ly/1VyNSRK

« The Sony Hackers Are Alive And Still Hacking
All The Gadgets Coming To Your Next Car »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CERT.br

CERT.br

The Brazilian national Computer Emergency Response Team

GovCERT.CZ

GovCERT.CZ

GovCERT.CZ is the Government Computer Emergency Response Team of the Czech Republic.

Cybernetica

Cybernetica

Cybernetica is an ICT company with activities in e-government, marine comms, data analysis and research in information security technologies.

Robert Half Technology

Robert Half Technology

Robert Half Technology offers a full spectrum of technology staffing solutions to meet contract and full-time IT recruitment needs.

Cyber 2.0

Cyber 2.0

Cyber 2.0 is the only system in the world that blocks all forms of cyber attack within the organization, including new and unfamiliar attack methods.

Slovenian Digital Coalition

Slovenian Digital Coalition

Slovenian Digital Coalition is a coalition working in the field of smart cities, e-commerce, e-skills, e-inclusion, cyber security, internet and other areas related to developing the digital society.

Charterhouse Müller UK

Charterhouse Müller UK

Charterhouse Müller UK are a leading service provider for end of life IT services including data erasure and secure IT asset disposal.

Cowbell Cyber

Cowbell Cyber

Cowbell Cyber™ offers continuous risk assessment, comprehensive cyber liability coverage, and continuous underwriting through an AI-powered platform.

Brimondo

Brimondo

At Brimondo we help you to maximize and protect your brand value by being a proactive and strategic partner within brand protection with experts within intellectual property and digital assets.

Zilla Security

Zilla Security

Zilla combines identity governance with cloud security to deliver comprehensive access visibility, reviews, lifecycle management, and policy-based security remediation.

Globesecure Technologies

Globesecure Technologies

Globesecure Technologies is a networks and cyber security company. We are here to resolve business security challenges and secure the digital transformation journey of our clients.

AI or Not

AI or Not

AI or Not - Leverage AI to combat misinformation and elevate the landscape of compliance solutions.

Dedagroup (Deda)

Dedagroup (Deda)

Dedagroup provide application solutions and IT services to bring innovation at the core of business processes.

IT.ie

IT.ie

IT.ie are a comprehensive provider of Managed IT Services, Cloud Solutions, Cyber Security, and proactive IT support services.

Argantic

Argantic

Argantic aims to help organisations thrive and reach their full potential in a modern cloud-centric era.

SignPath

SignPath

SignPath provides leading-edge software and SaaS services that ensure code integrity from development to distribution.