Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more ➡
Download
Standard view
Full view
of .
Add note
Save to My Library
Sync to mobile
Look up keyword or section
Like this
15Activity
×
P. 1
DNI - Annual Threat Assessment 2010

DNI - Annual Threat Assessment 2010

Ratings: (0)|Views: 5,723|Likes:
Published by Silendo

More info:

Published by: Silendo on Feb 02, 2010
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See More
See less

08/12/2013

pdf

text

original

 
 
Annual Threat Assessment of theUS Intelligence Communityfor the Senate Select Committee on IntelligenceDennis C. BlairDirector of National Intelligence
February 2, 2010
 
 
ATA FEB 2010–IC STATEMENT FOR THE RECORD
Senate Select Committee on Intelligence
US INTELLIGENCE COMMUNITYANNUAL THREAT ASSESSMENT
STATEMENT FOR THE RECORD
Chairman Feinstein, Vice Chairman Bond, Members of the Committee, thank you for theinvitation to offer the Intelligence Community’s assessment of threats to US national security. Iam pleased to be accompanied today by the Directors of the Central Intelligence Agency,Defense Intelligence Agency, Federal Bureau of Investigation, and the Acting AssistantSecretary of State for Intelligence and Research.The strategic landscape has changed considerably for US interests over the past year. Wesee some improvements, but also several entrenched problems and slow progress in some areasfor the foreseeable future. Several large-scale threats to fundamental US interests will requireincreased attention, and it is on one of these threats that I will focus our initial discussion.
 
 
2
 
ATA FEB 2010–IC STATEMENT FOR THE RECORD
Far-Reaching Impact of the Cyber Threat
The national security of the United States, our economic prosperity, and the daily functioningof our government are dependent on a dynamic public and private information infrastructure,which includes telecommunications, computer networks and systems, and the informationresiding within. This critical infrastructure is severely threatened.This cyber domain is exponentially expanding our ability to create and share knowledge, butit is also enabling those who would steal, corrupt, harm or destroy the public and private assetsvital to our national interests. The recent intrusions reported by Google are a stark reminder of the importance of these cyber assets, and a wake-up call to those who have not taken this problem seriously. Companies who promptly report cyber intrusions to government authoritiesgreatly help us to understand and address the range of cyber threats that face us all.I am here today to stress that, acting independently, neither the US Government nor the private sector can fully control or protect the country’s information infrastructure. Yet, withincreased national attention and investment in cyber security initiatives, I am confident theUnited States can implement measures to mitigate this negative situation.
The Evolving Threat and Future Trends
The United States confronts a dangerous combination of known and unknown vulnerabilities,strong and rapidly expanding adversary capabilities, and a lack of comprehensive threatawareness. Malicious cyber activity is occurring on an unprecedented scale with extraordinarysophistication. While both the threats and technologies associated with cyberspace are dynamic,the existing balance in network technology favors malicious actors, and is likely to continue todo so for the foreseeable future. Sensitive information is stolen daily from both government and  private sector networks, undermining confidence in our information systems, and in the veryinformation these systems were intended to convey. We often find persistent, unauthorized, and at times, unattributable presences on exploited networks, the hallmark of an unknown adversaryintending to do far more than merely demonstrate skill or mock a vulnerability. We cannot becertain that our cyberspace infrastructure will remain available and reliable during a time of crisis. Within this dynamic environment, we are confronting threats that are both more targeted and more serious. New cyber security approaches must continually be developed, tested, and implemented to respond to new threat technologies and strategies.We face nation states, terrorist networks, organized criminal groups, individuals, and other cyber actors with varying combinations of access, technical sophistication and intent. Manyhave the capabilities to target elements of the US information infrastructure for intelligencecollection, intellectual property theft, or disruption. Terrorist groups and their sympathizers haveexpressed interest in using cyber means to target the United States and its citizens. Criminalelements continue to show growing sophistication in their technical capability and targeting.Today, cyber criminals operate a pervasive, mature on-line service economy in illicit cyber capabilities and services, which are available to anyone willing to pay. Globally, widespread cyber-facilitated bank and credit card fraud has serious implications for economic and financial

Activity (15)

You've already reviewed this. Edit your review.
1 hundred reads
1 thousand reads
razu1tyger liked this
Hussen Weli liked this
Hussen Weli liked this
Hussen Weli liked this
maheswarreddy liked this
brunnerr liked this
fatwa2 liked this
fatwa2 liked this

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->