Skip to main content

U.S. intelligence director says online threats growing as more nations dedicate resources to cyber warfare


Director of National Security James Clapper told a House panel Sept. 10 that cyber threats to U.S. military, civilian, corporate and financial infrastructure are growing exponentially, as well as becoming much more sophisticated.
In testimony[PDF] before the House Permanent Select Committee on Intelligence, Clapper said threats from cyberattacks and hacking to U.S. national and economic security “are increasing in frequency, scale, sophistication and severity of impact.”
“Overall, the unclassified information and communication technology (ICT) networks that support US Government, military, commercial, and social activities remain vulnerable to espionage and/or disruption,” Clapper said.
While the threat of “Cyber Armageddon” remains small at the present time, the DNI nevertheless said the intelligence community foresees “an ongoing series of low-to-moderate level cyber attacks from a variety of sources over time,” which he says will cost the U.S. in terms of “economic competitiveness and national security.”
Clapper further noted that several nations, including North Korea and Iran, have launched cyber offensives against private sector targets in support of their economic or foreign policy objectives, and at times to coincide with political crises at home.
And though network defenses are always improving, Clapper said “diverse possibilities” that can stem from “remote hacking intrusion, supply chain operations to insert compromised hardware or software, actions by malicious insiders, and mistakes by system users” mean nearly all networks will remain at risk of penetration for the foreseeable future.
“In short, the cyber threat cannot be eliminated; rather, cyber risk must be managed.” Clapper told the House panel. “Moreover, the risk calculus some private sector entities employ does not adequately account for foreign cyber threats or the systemic interdependencies between different critical infrastructure sectors.”
The director went on to list several recent high- and low-profile cyber attacks:
— Earlier this year, the Office of Personnel Management (OPM) found that a number of its systems were compromised. “These systems included those that contain information related to the background investigations of current, former, and prospective federal government employees, as well as other individuals for whom a federal background investigation was conducted. OPM announced the compromise resulted in 21.5 million personal records being stolen,” he said.
— JPMorgan Chase officials announced that they would be boosting spending on cybersecurity after a 2012–13 DDOS – distributed denial of service – attack on the U.S. financial sector, vowing to spend $250 million annually to improve defenses. “After the company suffered a hacking intrusion in 2014, JPMorgan’s CEO said he would probably double JPMorgan’s annual computer security budget within the next five years,” Clapper testified.
— A data breach occurred at Home Depot in 2014, in which 56 million credit/debit cards and 53 million customer emails were stolen. The home improvement company estimated that the hack cost around $62 million.
— U.S. firm Community Health Systems reported to the Securities and Exchange Commission in August 2014 that it believed hackers “originating from China” had stolen personally identifiable information on about 4.5 million people.
For more breaking news on America’s cybersecurity efforts, check out CyberWar.news, powered by FETCH.news.
Clapper also noted that advances in technology have made it more difficult for hackers to operate undetected and to shield their identities.
“Although cyber operators can infiltrate or disrupt targeted ICT networks, most can no longer assume that their activities will remain undetected indefinitely,” he testified. “Nor can they assume that if detected, they will be able to conceal their identities. Governmental and private sector security professionals have made significant advances in detecting and attributing cyber intrusions.”
The DNI added that politically motivated hacking appeared to be on the rise, with state-sponsored and non-state actors making increased attempts to access U.S. infrastructure, perhaps with a end goal of disrupting some services.
Also, he said cyber probing and attempts to hack U.S. government, military and private sector systems occur “on a daily basis.”
Often, he said, it was difficult to figure out whether the hack was coming from an individual or a state-sponsored actor.
“Distinguishing between state and non-state actors within the same country is often difficult—especially when those varied actors actively collaborate, tacitly cooperate, condone criminal activity that only harms foreign victims, or utilize similar cyber tools,” he said.
Concluding, Clapper noted that President Obama had directed him to establish a new cybersecurity center.
“Ensuring the integration of such activities in support of our policy makers and national security is a core mission for the Office of the Director of National Intelligence, and was one reason the President directed me to form a Cyber Threat Intelligence Integration Center (CTIIC),” he said. “I look forward to working with this Committee to enable the Intelligence Community in general and CTIIC in particular to support our nation in this vital area.”

Comments

Popular posts from this blog

Why States Still Use Barrel Bombs

Smoke ascends after a Syrian military helicopter allegedly dropped a barrel bomb over the city of Daraya on Jan. 31.(FADI DIRANI/AFP/Getty Images) Summary Barrel bombs are not especially effective weapons. They are often poorly constructed; they fail to detonate more often than other devices constructed for a similar purpose; and their lack of precision means they can have a disproportionate effect on civilian populations. However, combatants continue to use barrel bombs in conflicts, including in recent and ongoing conflicts in Africa and the Middle East, and they are ideally suited to the requirements of resource-poor states. Analysis Barrel bombs are improvised devices that contain explosive filling and shrapnel packed into a container, often in a cylindrical shape such as a barrel. The devices continue to be dropped on towns all over Syria . Indeed, there have been several documented cases of their use in Iraq over the past months, and residents of the city of Mosul, which was re

Russia Looks East for New Oil Markets

Click to Enlarge In the final years of the Soviet Union, Soviet leader Mikhail Gorbachev began orienting his foreign policy toward Asia in response to a rising Japan. Putin has also piloted a much-touted pivot to Asia, coinciding with renewed U.S. interest in the area. A good expression of intent was Russia's hosting of the Asia-Pacific Economic Cooperation summit in 2012 in Vladivostok, near Russia's borders with China and North Korea. Although its efforts in Asia have been limited by more direct interests in Russia's periphery and in Europe, Moscow recently has been able to look more to the east. Part of this renewed interest involves finding new export markets for Russian hydrocarbons. Russia's economy relies on energy exports, particularly crude oil and natural gas exported via pipeline to the West. However, Western Europe is diversifying its energy sources as new supplies come online out of a desire to reduce its dependence on Russian energy supplies . This has

LONDON POLICE INDIRECTLY ENCOURAGE CRIMINALS TO ATTACK RUSSIAN DIPLOMATIC PROPERTY

ILLUSTRATIVE IMAGE A few days ago an unknown perpetrator trespassed on the territory of the Russian Trade Delegation in London, causing damage to the property and the vehicles belonging to the trade delegation , Russian Foreign Ministry Spokeswoman Maria Zakharova said during the September 12 press briefing. The diplomat revealed the response by the London police was discouraging. Police told that the case does not have any prospects and is likely to be closed. This was made despite the fact that the British law enforcement was provided with video surveillance tapes and detailed information shedding light on the incident. By this byehavior, British law inforcements indirectly encourage criminals to continue attacks on Russian diplomatic property in the UK. Zakharova’s statement on “Trespassing on the Russian Trade Mission premises in London” ( source ): During our briefings, we have repeatedly discussed compliance with the Vienna Convention on Diplomatic Relations, specif