US Intelligence Chief Warns Of ‘ever more diverse’ Threats

Russia’s efforts to expand its influence and China’s modernising military are among the “ever more diverse” threats facing the US, according to a major intelligence report released Tuesday 22nd January. The US National Intelligence Strategy report, issued every four years, also singles out such potential threats as North Korea’s pursuit of nuclear weapons, the growing Cyber Capabilities of US adversaries and global political instability.

The report, which sets out the priorities for the various agencies that make up the US intelligence community, notes that the United States "faces an increasingly complex and uncertain world in which threats are becoming ever more diverse and interconnected."

Director of National Intelligence Dan Coats (pictured) said in a letter accompanying the report that the US agencies must adapt to respond to what he calls a "turbulent and complex" environment.

"We face significant changes in the domestic and global environment," Coats said. "We must be ready to meet the 21st century challenges and to recognise emerging threats and opportunities."

He said the intelligence community must improve cooperation among member agencies and foster more innovation. He also said agencies must do more to increase transparency to raise public trust in their work. The report does not rank the threats, but the first section is devoted to the threat posed by “traditional adversaries” seeking to take advantage of the weakening of the post-World War II international order and increasingly isolationist tendencies in the West. 

“Russian efforts to increase its influence and authority are likely to continue and may conflict with US goals and priorities in multiple regions,” it says.

Coats also addressed his staff at the strategy's rollout, pledging that the intelligence community would not be dissuaded from "seeking the truth, and when we find the truth, speaking the truth." Coats said the 17-agency intelligence community plans to operate with greater transparency to earn and uphold the trust of policy makers and the American people.

Senior Intelligence officials at the strategy's unveiling did not address statements from President Donald Trump dismissing intelligence findings. Trump has expressed disregard for key intelligence findings regarding Russian influence in the 2016 election and Saudi Arabia's role in the killing of writer Jamal Khashoggi.

Speaking broadly, one senior director of national intelligence official said the push for greater transparency is part of an effort to restore trust with the American people following Edward Snowden's 2013 leak of classified US material about America's surveillance programs. 

Senior intelligence officials briefed journalists at the strategy's unveiling on condition they not be cited by name.
The 2019 National Intelligence Strategy report also discusses China’s modernisation of its military and pursuit of “predominance” in the Pacific region.

The strategy notes that both China and Russia continue to pursue anti-satellite weapons to weaken the US military and security. It also says the threat from hacking is growing as more adversaries acquire the technology to interfere with US computer systems.

Military Times

You Might Also Read: 

Darktrace Describe The Alarming Future AI Attack Scenario:

« Denmark's Maritime Cybersecurity Plan Highlights Financial Threats
Cyber Criminals Are Aiming At Business »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

PrivateCore

PrivateCore

We protect data-in-use from hackers trying to steal data such as encryption keys, certificates, intellectual property.

Cyber Seguridad (Cyberseg)

Cyber Seguridad (Cyberseg)

Cyberseg provides specialized Cybersecurity services, including managed services (SOC / CERTs) and solutions for the protection of critical infrastructures.

Araxxe

Araxxe

Araxxe delivers Revenue Assurance, End-to-End Billing Verification and Interconnect Fraud Detection solutions to communication companies worldwide.

CYQUEO

CYQUEO

CYQUEO is your professional partner and system integrator. We secure your organization against advanced cyber threats.

Tech-Recycle

Tech-Recycle

Tech-Recycle was formed to help companies and individuals securely, ethically and easily recycle their IT and office equipment. We destroy all data passed to us safely and securely.

New Enterprise Associates (NEA)

New Enterprise Associates (NEA)

As one of the world’s largest and most active venture capital firms, NEA has developed deep domain expertise and insight into our industries of focus - technology and healthcare.

Elron Ventures

Elron Ventures

Elron partner with early stage ventures to build companies that transform lives and industries. Our main areas of focus are enterprise software, cybersecurity, and healthcare.

Corsha

Corsha

Corsha is on a mission to simplify API security and allow enterprises to embrace modernization, complex deployments, and hybrid environments with confidence.

CyberSheath Services International

CyberSheath Services International

CyberSheath integrates your compliance and threat mitigation efforts and eliminates redundant security practices that don’t improve and in fact might probably weaken your security posture.

Phakamo Tech

Phakamo Tech

Phakamo Tech offers a full set of governance, risk, compliance, cybersecurity and Microsoft Cloud services that include consulting, planning, implementation and cyber incident response.

NASK SA

NASK SA

NASK SA is an integrator of telecommunications services. We provide advanced ICT security services, collocation and hosting, data centre services, and build corporate networks.

Eunetic

Eunetic

Eunetic IT security solutions - we secure your websites, emails, domains and data.

Deutsche Gesellschaft für Cybersicherheit (DGC)

Deutsche Gesellschaft für Cybersicherheit (DGC)

As a leading provider of cyber security, DGC supports companies in taking advantage of the opportunities offered by the digital transformation – and in minimizing the associated risks.

Laneden

Laneden

Laneden specialise in helping organisations identify security concerns and quantify the risks you may have across your assets, using Penetration Testing, Threat Simulation and Compliance Testing.

GreenPages Technology Solutions

GreenPages Technology Solutions

GreenPages provide expert strategic guidance and proven cloud-era solutions for our clients. Every day we help organizations leverage the cloud securely with less risk and cost.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.