US Intelligence Chief Warns Of ‘ever more diverse’ Threats

Russia’s efforts to expand its influence and China’s modernising military are among the “ever more diverse” threats facing the US, according to a major intelligence report released Tuesday 22nd January. The US National Intelligence Strategy report, issued every four years, also singles out such potential threats as North Korea’s pursuit of nuclear weapons, the growing Cyber Capabilities of US adversaries and global political instability.

The report, which sets out the priorities for the various agencies that make up the US intelligence community, notes that the United States "faces an increasingly complex and uncertain world in which threats are becoming ever more diverse and interconnected."

Director of National Intelligence Dan Coats (pictured) said in a letter accompanying the report that the US agencies must adapt to respond to what he calls a "turbulent and complex" environment.

"We face significant changes in the domestic and global environment," Coats said. "We must be ready to meet the 21st century challenges and to recognise emerging threats and opportunities."

He said the intelligence community must improve cooperation among member agencies and foster more innovation. He also said agencies must do more to increase transparency to raise public trust in their work. The report does not rank the threats, but the first section is devoted to the threat posed by “traditional adversaries” seeking to take advantage of the weakening of the post-World War II international order and increasingly isolationist tendencies in the West. 

“Russian efforts to increase its influence and authority are likely to continue and may conflict with US goals and priorities in multiple regions,” it says.

Coats also addressed his staff at the strategy's rollout, pledging that the intelligence community would not be dissuaded from "seeking the truth, and when we find the truth, speaking the truth." Coats said the 17-agency intelligence community plans to operate with greater transparency to earn and uphold the trust of policy makers and the American people.

Senior Intelligence officials at the strategy's unveiling did not address statements from President Donald Trump dismissing intelligence findings. Trump has expressed disregard for key intelligence findings regarding Russian influence in the 2016 election and Saudi Arabia's role in the killing of writer Jamal Khashoggi.

Speaking broadly, one senior director of national intelligence official said the push for greater transparency is part of an effort to restore trust with the American people following Edward Snowden's 2013 leak of classified US material about America's surveillance programs. 

Senior intelligence officials briefed journalists at the strategy's unveiling on condition they not be cited by name.
The 2019 National Intelligence Strategy report also discusses China’s modernisation of its military and pursuit of “predominance” in the Pacific region.

The strategy notes that both China and Russia continue to pursue anti-satellite weapons to weaken the US military and security. It also says the threat from hacking is growing as more adversaries acquire the technology to interfere with US computer systems.

Military Times

You Might Also Read: 

Darktrace Describe The Alarming Future AI Attack Scenario:

« Denmark's Maritime Cybersecurity Plan Highlights Financial Threats
Cyber Criminals Are Aiming At Business »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Rambus Security Division

Rambus Security Division

Rambus Security Division solutions span areas including tamper resistance, content protection, network security, mobile payment, smart ticketing, and trusted provisioning services.

Visa

Visa

Visa is a global payments technology company that connects consumers, businesses and banks in more than 200 countries and territories worldwide.

Volexity

Volexity

Volexity is a leading provider of threat intelligence and incident suppression services and solutions.

Smarttech247

Smarttech247

Smarttech247 deliver a range of cyber security solutions, including cognitive security services using IBM Watson for Cybersecurity, SIEM, Compliance & Governance, and Penetration Testing.

Epati Information Technologies

Epati Information Technologies

ePati Information Technologies is a specialist in information technology and cyber security.

Rule4

Rule4

Rule4 is a global professional services firm that provides practical, real-world knowledge and solutions in areas including cybersecurity, AI, Machine Learning and industrial control systems.

GlobalPass

GlobalPass

Covering 200+ countries with 78 000 databases, GlobalPass provides sophisticated facial biometrics verification and deep screening, delivering peace of mind to every client.

Netacea

Netacea

Netacea provides a revolutionary bot management solution that protects websites, mobile apps and APIs from malicious attacks such as scraping, credential stuffing and account takeover.

Shearwater Group

Shearwater Group

Shearwater Group is an award-winning organisational resilience group that provides cyber security, advisory and managed security services to help secure businesses in a connected global economy.

Epiphany Systems

Epiphany Systems

Epiphany enhances your defensive security controls by providing you with an offensive perspective. We expose the most likely attack paths to your most critical IT assets and users.

Allentis

Allentis

Allentis provide adapted solutions to ensure the security and performance of your information system.

CloudScale365

CloudScale365

CloudScale365 offers state-of-the-art managed IT services and cloud, hosting, security, and business continuity solutions.

5S Technologies

5S Technologies

5S Technologies is a regional IT solutions and services provider based in Cary, NC and serving the Carolinas.

Alpha Echo

Alpha Echo

Specialising in security advice and enterprise-wide Cyberworthiness, Alpha Echo helps Australia deliver on cyber outcomes at a military grade level.

Post-Quantum Cryptography Alliance (PQCA)

Post-Quantum Cryptography Alliance (PQCA)

The alliance seeks to address cryptographic security challenges posed by quantum computing by producing high-assurance software implementations of standardized algorithms.

CarbonHelix

CarbonHelix

CarbonHelix provides cybersecurity services from US-based security operations centers that meet the highest compliance requirements.