Intelligence community assesses cyber threat

This year’s annual threat assessment from the Director of National Intelligence (DNI) found that malicious cyber activity grew more sophisticated, targeted and serious during the past year and that trend is expected to continue during the next year. The assessment also said the intelligence community expects disruptive cyber activities to be part of future political or military conflicts.

The unclassified findings of the assessment were presented by DNI Dennis Blair before the Senate Select Intelligence Committee Feb. 12. Blair’s predecessor, Mike McConnell, presented cited a similar trend regarding cyber threats in the 2008 annual report.

The release of this year’s assessment came days after the Obama administration said it will conduct a full-scale review of the government’s cybersecurity efforts. That review will include a look at the multiyear, multibillion-dollar Comprehensive National Cybersecurity Initiative (CNCI) that started in January 2008.

The report said threats to the information networks of the United States come from nation-states, criminals and terrorist groups have expressed a desire to use cyber means to target the United States.

“Each of these actors has different levels of skill and different intentions; therefore, we must develop flexible capabilities to counter each,” the report said. “We must take proactive measures to detect and prevent intrusions from whatever source, as they happen, and before they can do significant damage.”

The report also said that, although work remained, there is “an unprecedented unity of effort across a broad coalition of government agencies, members of Congress, and leaders of industry,” but that the CNCI must remain a long-term national priority.

Blair also testified that it was important to include cyber defense from the “very first building block” of a new smart grid electrical system. Blair also said that he feels terrorist groups are most focused on using other methods of attack.

Blair also said cyber is not the area where he thinks terrorists have the greatest skills for the greatest destruction.

“I think that they have other terrible things that they can do to us that they are working on harder, they're better able to do and they seem to be more motivated to do – so it’s possible, but I don’t think the combination of terror and cyber is the nexus that we are most worried about.”  

About the Author

Ben Bain is a reporter for Federal Computer Week.

The Fed 100

Read the profiles of all this year's winners.

Featured

  • Then-presidential candidate Donald Trump at a 2016 campaign event. Image: Shutterstock

    'Buy American' order puts procurement in the spotlight

    Some IT contractors are worried that the "buy American" executive order from President Trump could squeeze key innovators out of the market.

  • OMB chief Mick Mulvaney, shown here in as a member of Congress in 2013. (Photo credit Gage Skidmore/Flickr)

    White House taps old policies for new government makeover

    New guidance from OMB advises agencies to use shared services, GWACs and federal schedules for acquisition, and to leverage IT wherever possible in restructuring plans.

  • Shutterstock image (by Everett Historical): aerial of the Pentagon.

    What DOD's next CIO will have to deal with

    It could be months before the Defense Department has a new CIO, and he or she will face a host of organizational and operational challenges from Day One

  • USAF Gen. John Hyten

    General: Cyber Command needs new platform before NSA split

    U.S. Cyber Command should be elevated to a full combatant command as soon as possible, the head of Strategic Command told Congress, but it cannot be separated from the NSA until it has its own cyber platform.

  • Image from Shutterstock.

    DLA goes virtual

    The Defense Logistics Agency is in the midst of an ambitious campaign to eliminate its IT infrastructure and transition to using exclusively shared, hosted and virtual services.

  • Fed 100 logo

    The 2017 Federal 100

    The women and men who make up this year's Fed 100 are proof positive of what one person can make possibile in federal IT. Read on to learn more about each and every winner's accomplishments.

Reader comments

Thu, Feb 4, 2010 JD CA

Step 1: Get DCS and SCADA systems OFF the Internet! So what if it costs a little more or inconveniences "Bubba" who has to jump in a utility truck and drive to the pipe valve to open/close it.... vice putting a motor with an IP address on the valve and exposing its control to anyone savvy enough to discover it... while sipping Stoli in his dacha half-way around the world.

Wed, Feb 18, 2009

Why would hackers waste time on ATC or power? They seem to be getting the upper hand in controlling the Internet, and they already own finance.

How much of the current economic crisis is rooted in fraud? What is the real difference between encoding fake Visa gift cards with mag stripe data stolen from Heartland, and running a Ponzi scheme using money stolen from investors? Ethically those are pretty much the same, seems to me.

Sat, Feb 14, 2009 Anthony S. Policastro http://www.smashwords.com/books/view/625

I have always thought that one day hackers would be bold enough, confident enough and powerful enough to take control of one of our country’s major infrastructures such as air control, electricity or the Internet. The fact that the Director of National Intelligence (DNI) found that malicious cyber activity grew more sophisticated and targeted just confirms my belief that one day hackers or an organized group of them will hack into the major infrastructure systems of our society and cause a major catastrophe. In fact, I've written a book about such a scenario where hackers take over the cell phone network and the power grid and hold the US hostage. Dark End of the Spectrum available at http://www.smashwords.com/books/view/625 is based on actual events and years of research into the hacker culture.

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group