‘Tyrannical IT’ Is A Critical Threat

"There's just no question that with generative AI you can be far more sophisticated in your production of misinformation and disinformation,” US Director of National Intelligence Avril Haines has warned.

Haines emphasised the national security challenges posed by China, Russia, Iran, and North Korea, as well as transnational issues, such as cyber hacking, climate change, terrorism, and emerging technologies.

Recently, a Russian cyber crime group FIN7 has been observed exploiting a Veeam Backup & Replication vulnerability patched in March 2023.

As authoritarian countries increasingly rely on digital tools to suppress dissent inside and outside their borders, the US and its democratic partners need to work together to counter the spread of repressive technologies across the globe, the nation’s top intelligence official said during the Carnegie Endowment for International Peace event on Monday 24th April.

Haines said that rising digital authoritarianism poses “a critical threat to our national security,” citing, in particular, the repressive models implemented by the Russian, Chinese, and Iranian governments as efforts that undermine democratic values within their countries and beyond.

These methods, which include the use of invasive surveillance tools, spyware, Internet shutdowns, online censorship and the spread of mis- and disinformation, have a broader impact.

Haines also said the intelligence community assesses “that foreign governments are increasingly using digital information and communication technologies to monitor and suppress political debate domestically, as well as in their expat and diaspora communities abroad.” She noted that this also includes the exportation of spyware and surveillance technologies to other countries where democracy is backsliding, which could further erode democratic norms and values on the global stage. 

“And as these technologies, capabilities, policies and mechanisms are exported and implemented in various countries or territories, they make it that much harder to bolster democratic governance and easier for authoritarians to prevail... Moreover, the use of these technologies and methods to monitor and limit dissent are on a trajectory to become even more pervasive, targeted and complex in the next few years, further constraining freedoms globally.”  she added.

Emerging technologies, such as generative artificial intelligence, could also be deployed by authoritarian nations to further suppress dissent and unwanted narratives, with Haines saying that they “will only increase the sophistication that such regimes can use to deploy such tools, making them that much more difficult to counter.”

Haines said that the growing use of these tools adds to “the contest over information,” which she called “perhaps one of the most challenging aspects of the problem” when it comes to digital repression... Today, we assess that foreign governments are increasingly using digital information and communication technologies to monitor and suppress political debate domestically, as well as in their expat and diaspora communities abroad,” she said.

Whether it’s internet shutdowns in Iran to silence the voices of protestors; the use of surveillance technologies in China to control the population; or censorship laws in Russia to suppress government criticism, these approaches pose a challenge to U.S. interests and values around the world.

Haines noted that, for the first time, the intelligence community’s annual threat assessment, which was publicly released in February, included an entire section on the digital trends of authoritarianism.

That report warned that “foreign states’ malicious use of digital information and communication technologies will become more pervasive, automated, targeted and complex during the next few years, further threatening to distort publicly available information and probably will outpace efforts to protect digital freedoms.”

Haines said that the rise of digital authoritarianism, including its dependence on emerging technologies and surveillance tools to control information and quell internal dissent, should spur the US and other democratic nations to develop “normative frameworks”. This can “preserve, to the greatest extent, the promise of such technologies to support freer flows of information, more timely and cheaper communication, as well as smart technologies, prove the delivery of services, and even protect the environment and promote our health, while nevertheless guarding against their use for digital repression,” she said.

Haines said this also includes highlighting efforts in democratic nations to move away from the use of technologies that could be used to surveil citizens, such as President Biden’s March 27th executive order restricting the US  government’s use of commercial spyware “that poses risks to national security.”

“The multifaceted challenge of adversaries suppressing information environments cannot be solved by government alone,” and said it was critical for non-government organisations and other pro-democracy voices to also push back on the spread of digital authoritarianism... Digital repression and foreign maligning influence are whole-of-society challenges, and we can no longer operate on parallel, but distinct tracks,” she added.

US DNI:      US DNI:   C-Span:     Defense One;    NextGov:    NextGov:     Defense Scoop:    Security Week:     

You Might Also Read: 

Russia's Disinformation Campaign Targets Ukraine's Supporters:

____________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Iranian Hackers Targeted Israel
Google Bans Thousands Of Malicious Developers »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Trend Micro

Trend Micro

Trend Micro is a leader in hybrid cloud, endpoint, and network security solutions.

Zymr

Zymr

Zymr specialize in cloud computing solutions including Cloud Security, Cloud Mobility, Cloud Apps, Cloud Infrastructure and Cloud Orchestration.

BPC Banking Technologies

BPC Banking Technologies

BPC’s advanced fraud prevention solution helps card issuers and acquirers combat the growing threat by monitoring 100% of transactions, online, in real-time across all channels.

Cog Systems

Cog Systems

Cog Systems offer an embedded solution built on modularity, proactive security, trustworthiness, and adaptability to enable highly secure connected devices.

ADL Process

ADL Process

ADL Process offer secure data destruction, certified product destruction and responsible electronics recycling services to businesses and institutions.

IntaPeople

IntaPeople

IntaPeople are IT and engineering recruitment specialists. We have specialist teams for job sectors including Cybersecurity, IT infrastructure and DevOps.

Brighterion

Brighterion

Brighterion solutions stop payment and acquirer fraud, reduce credit risk and delinquency, fight financial crime, prevent healthcare fraud, waste and abuse, and more.

Semmle

Semmle

Semmle's code analysis platform helps teams find zero-days and automate variant analysis. Secure your code with continuous security analysis and automated code review.

Amnesty Tech

Amnesty Tech

Amnesty Tech's Security Lab leads technical investigations into cyber-attacks against civil society and provides critical support when individuals face such attacks.

BDO Global

BDO Global

BDO is an international network of public accounting, tax and advisory firms which perform professional services under the name of BDO.

Defentry

Defentry

Defentry have created an Ecosystem that lets our users easily monitor, train and resolve their digital security issues.

Mage Data

Mage Data

Mage (formerly Mentis Software) is a leading solutions provider for data security and data privacy software for global enterprises.

Astrix Security

Astrix Security

Astrix enables security teams to instantly see through the fog of connects and detect redundant, misconfigured and malicious third-party exposure to their critical systems.

ClearShark

ClearShark

Since 2001, ClearShark has been a go-to adviser in the U.S. Public Sector for creating customized and integrated solutions for the most secure of networks.

Readynez

Readynez

Readynez is the digital skills concierge service that helps you ensure your workforce has the tech skills and resources needed to stay ahead of the digital curve.

Spirit Technology Solutions

Spirit Technology Solutions

Spirit Technology Solutions is a modern workplace services provider committed to delivering solutions that embody our core principles of security, sustainability, and scalability.

Nothreat

Nothreat

Nothreat has revolutionized how businesses like yours protect themselves from damaging cyber attacks. Our tech learns and adapts in real time, protecting clients from even zero-day attacks.