The Big Three: N. Korea, ISIS and CyberWar

Director of National Intelligence James Clapper delivered his annual assessment of the top dangers facing the U.S to the Senate Armed Services Committee recently. 

Clapper said North Korea has expanded a uranium enrichment facility and restarted a plutonium reactor.

Clapper also said that Islamic militants will continue plotting against US interests overseas and homegrown attacks will pose the most significant threat from violent extremists to Americans at home.

"The perceived success of attacks by homegrown violent extremists in Europe and North America, such as those in Chattanooga and San Bernardino, might motivate others to replicate opportunistic attacks with little or no warning, diminishing our ability to detect terrorist operational planning and readiness," he said.

"ISIL involvement in homeland attack activity will probably continue to involve those who draw inspiration from the group's highly sophisticated media without direct guidance from ISIL leadership," he said using an acronym for the militant group.

Clapper also said Iran remains the top state sponsor of terrorism, al-Qaida-linked groups remain resilient and the US will continue to see cyber threats from China, Russia and North Korea.

Clapper also said, US information systems, controlled by the US government and American industry, are vulnerable to cyberattacks from Russia and China.

North Korea "probably remains capable and willing to launch disruptive or destructive cyberattacks to support its political objectives," he said.

Moscow "is assuming a more assertive cyber posture" that is based on its willingness to target critical infrastructure and carry out espionage operations even when those operations have been detected and under increased public scrutiny, Clapper said.

Russia's cyber operations are likely to target US interests in part to underpin its intelligence gathering to support Russia's moves in the Ukraine and Syrian crises, he said.

Clapper said China selectively uses cyberattacks against targets Beijing believes threaten Chinese domestic stability or regime legitimacy.

"We will monitor compliance with China's September 2015 commitment to refrain from conducting or knowingly supporting cyber-enabled theft of intellectual property with the intent of providing competitive advantage to companies or commercial sectors," he said.

Ein News: http://bit.ly/1VyNSRK

« The Sony Hackers Are Alive And Still Hacking
All The Gadgets Coming To Your Next Car »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Council on Foreign Relations (CFR)

Council on Foreign Relations (CFR)

CFR is dedicated to better understanding the world and the foreign policy choices facing the USA and other countries. Cyber security is covered within the CFR topic areas.

Infiltrate

Infiltrate

INFILTRATE is a deep technical conference that focuses entirely on offensive security issues.

8MAN

8MAN

8MAN is a leading Access Rights Management (ARM) solution in Microsoft and virtual server environments.

Caretower

Caretower

Caretower is one of Europe’s leading value added managed service provider in cyber security.

Metrarc

Metrarc

Metrarc has developed a ground-breaking technology called ICMetrics™ for deriving secure encryption keys from the properties of digital systems without the need to store any of the encryption keys.

Exponential-e

Exponential-e

Exponential-e provide Cloud and Unified Communications services and world-class Managed IT Services including Cybersecurity.

Cybersecure Policy Exchange (CPX)

Cybersecure Policy Exchange (CPX)

Cybersecure Policy Exchange is a new initiative dedicated to advancing effective and innovative public policy in cybersecurity and digital privacy.

Evina

Evina

Evina offers the most advanced cybersecurity and fraud protection for mobile payment.

BlueHalo

BlueHalo

BlueHalo is purpose-built to provide industry capabilities in the domains of Space Superiority and Directed Energy, Missile Defense and C4ISR, and Cyber and Intelligence.

Park Place Technologies

Park Place Technologies

Park Place Technologies' mission is to drive uptime, performance and value for critical IT infrastructure.

Brightsolid

Brightsolid

Brightsolid are experts in Hybrid Cloud. We design, build and manage secure, scalable cloud environments that meet customers’ business ambitions.

Innov8tif

Innov8tif

Innov8tif is an AI company specialised in providing ID assurance solutions — helping digital businesses to prevent frauds by verifying and authenticating customers identity.

Frontier Technology Inc. (FTI)

Frontier Technology Inc. (FTI)

Frontier Technology Inc provides the technology and deep data expertise to drive the best defense and intelligence solutions.

IT Voice

IT Voice

IT Voice specializes in Managed IT and VoIP solutions. Our focus is simplifying the technology so our customers can stay focused on what they do best.

Cynch Security

Cynch Security

Cynch Security are passionate about building a world where every business is resilient to cybersecurity risks, no matter what their size.

Strobes Security

Strobes Security

Strobes is among the world’s first cybersecurity platforms specifically designed for end-to-end continuous threat exposure management.