‘Tyrannical IT’ Is A Critical Threat

"There's just no question that with generative AI you can be far more sophisticated in your production of misinformation and disinformation,” US Director of National Intelligence Avril Haines has warned.

Haines emphasised the national security challenges posed by China, Russia, Iran, and North Korea, as well as transnational issues, such as cyber hacking, climate change, terrorism, and emerging technologies.

Recently, a Russian cyber crime group FIN7 has been observed exploiting a Veeam Backup & Replication vulnerability patched in March 2023.

As authoritarian countries increasingly rely on digital tools to suppress dissent inside and outside their borders, the US and its democratic partners need to work together to counter the spread of repressive technologies across the globe, the nation’s top intelligence official said during the Carnegie Endowment for International Peace event on Monday 24th April.

Haines said that rising digital authoritarianism poses “a critical threat to our national security,” citing, in particular, the repressive models implemented by the Russian, Chinese, and Iranian governments as efforts that undermine democratic values within their countries and beyond.

These methods, which include the use of invasive surveillance tools, spyware, Internet shutdowns, online censorship and the spread of mis- and disinformation, have a broader impact.

Haines also said the intelligence community assesses “that foreign governments are increasingly using digital information and communication technologies to monitor and suppress political debate domestically, as well as in their expat and diaspora communities abroad.” She noted that this also includes the exportation of spyware and surveillance technologies to other countries where democracy is backsliding, which could further erode democratic norms and values on the global stage. 

“And as these technologies, capabilities, policies and mechanisms are exported and implemented in various countries or territories, they make it that much harder to bolster democratic governance and easier for authoritarians to prevail... Moreover, the use of these technologies and methods to monitor and limit dissent are on a trajectory to become even more pervasive, targeted and complex in the next few years, further constraining freedoms globally.”  she added.

Emerging technologies, such as generative artificial intelligence, could also be deployed by authoritarian nations to further suppress dissent and unwanted narratives, with Haines saying that they “will only increase the sophistication that such regimes can use to deploy such tools, making them that much more difficult to counter.”

Haines said that the growing use of these tools adds to “the contest over information,” which she called “perhaps one of the most challenging aspects of the problem” when it comes to digital repression... Today, we assess that foreign governments are increasingly using digital information and communication technologies to monitor and suppress political debate domestically, as well as in their expat and diaspora communities abroad,” she said.

Whether it’s internet shutdowns in Iran to silence the voices of protestors; the use of surveillance technologies in China to control the population; or censorship laws in Russia to suppress government criticism, these approaches pose a challenge to U.S. interests and values around the world.

Haines noted that, for the first time, the intelligence community’s annual threat assessment, which was publicly released in February, included an entire section on the digital trends of authoritarianism.

That report warned that “foreign states’ malicious use of digital information and communication technologies will become more pervasive, automated, targeted and complex during the next few years, further threatening to distort publicly available information and probably will outpace efforts to protect digital freedoms.”

Haines said that the rise of digital authoritarianism, including its dependence on emerging technologies and surveillance tools to control information and quell internal dissent, should spur the US and other democratic nations to develop “normative frameworks”. This can “preserve, to the greatest extent, the promise of such technologies to support freer flows of information, more timely and cheaper communication, as well as smart technologies, prove the delivery of services, and even protect the environment and promote our health, while nevertheless guarding against their use for digital repression,” she said.

Haines said this also includes highlighting efforts in democratic nations to move away from the use of technologies that could be used to surveil citizens, such as President Biden’s March 27th executive order restricting the US  government’s use of commercial spyware “that poses risks to national security.”

“The multifaceted challenge of adversaries suppressing information environments cannot be solved by government alone,” and said it was critical for non-government organisations and other pro-democracy voices to also push back on the spread of digital authoritarianism... Digital repression and foreign maligning influence are whole-of-society challenges, and we can no longer operate on parallel, but distinct tracks,” she added.

US DNI:      US DNI:   C-Span:     Defense One;    NextGov:    NextGov:     Defense Scoop:    Security Week:     

You Might Also Read: 

Russia's Disinformation Campaign Targets Ukraine's Supporters:

____________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Iranian Hackers Targeted Israel
Google Bans Thousands Of Malicious Developers »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Tiro Security

Tiro Security

Tiro Security is a boutique company specializing in information security and IT audit recruitment and solutions.

eco

eco

eco, with more than 950 member organizations, is the largest Internet industry association in Europe.

Blockchain Slovakia

Blockchain Slovakia

Blockchain Slovakia is a non-profit organization that brings together researchers, developers, entrepreneurs, regulators, investors and the public to support blockchain technology in Slovakia.

Cylus

Cylus

Cylus, a global leader in rail cybersecurity, helps rail and metro companies avoid safety incidents and service disruptions caused by cyber-attacks.

GMV

GMV

GMV is a technological business group offering solutions, services and products in diverse sectors including Intelligent Transportation Systems, Cybersecurity, Telecoms and IT.

Institute of Informatics and Telematics (IIT)

Institute of Informatics and Telematics (IIT)

IIT carries out activities of research, assessment, technology transfer and training in the field of Information and Communication Technologies and of Computational Sciences.

IP Twins

IP Twins

IP Twins offer a wide range of services related to domain names and online brand protection.

VLATACOM Institute

VLATACOM Institute

Vlatacom Institute is privately owned accredited research and development institute, system integrator and turn-key solution provider. Areas of expertise include encryption and authentication.

Extreme Engineering Solutions (X-ES)

Extreme Engineering Solutions (X-ES)

Extreme Engineering Solutions is a leader in the design, manufacture, testing, and support of hardware and software solutions for the embedded computing market.

nsKnox

nsKnox

nsKnox is a fintech-security company, enabling corporations and banks to prevent fraud and ensure compliance in B2B Payments.

North East Business Resilience Centre (NEBRC)

North East Business Resilience Centre (NEBRC)

The North East Business Resilience Centre is a non-profit organisation here to support businesses in the North East of England in protecting themselves from cyber crimes and fraud.

Axians

Axians

Axians supports its customers in their digital transformation journey. We offer ICT solutions and services in areas including Enterprise Networks and Cybersecurity.

Security Compliance Associates (SCA)

Security Compliance Associates (SCA)

The sole focus of SCA is safeguarding critical information and complying with information security regulations.

Intracis

Intracis

Intracis is a 'Made in India' cyber incident management solution aimed at ‘Making Security Simple’ by simplifying cyber incident management for CERTS and CSIRTS.

Grypho5

Grypho5

Grypho5 offers managed packages to protect where threat actors strike most. We defend your infrastructure dynamically, leaving you to focus on other priorities.

SafeAeon

SafeAeon

SafeAeon is a leading Cybersecurity-as-a-Service provider, offering 24x7 premium Managed Security Services with AI-powered and Human-driven 24x7 SOC.