Director of National Intelligence Daniel R. Coats presented the 2017 annual U.S. intelligence community worldwide threat assessment in Congressional testimony on May 11, 2017. In the published report, Coats provides a thorough review of the status of possible threats from a wide variety of nations and terror groups. In addition to the 2017 assessment, this compilation includes the 2016 assessment for comparison and historical reference, plus important additional material, including the Report of the Select Committee on Intelligence, United States Senate, Covering the Period January 6, 2015 to January 2, 2017.
Topics covered include:
GLOBAL THREATS - Cyber Threat * Emerging and Disruptive Technologies * Terrorism * Weapons of Mass Destruction and Proliferation * Space and Counterspace * Counterintelligence * Transnational Organized Crime * Economics and Natural Resources * Human Security
REGIONAL THREATS - East Asia * China * North Korea Southeast Asia * Russia and Eurasia * Russia * Ukraine, Moldova, and Belarus * The Caucasus and Central Asia * Europe * Key Partners * Turkey * Middle East and North Africa * Syria * Iraq * Iran * Yemen * South Asia * Afghanistan * Pakistan * India-Pakistan * Sub-Saharan Africa * South Sudan * Sudan * Nigeria * Sahel * Somalia * Ethiopia * Democratic Republic of the Congo * Western Hemisphere * Mexico * Central America * Colombia * Cuba * Venezuela
Coats reported: Our adversaries are becoming more adept at using cyberspace to threaten our interests and advance their own, and despite improving cyber defenses, nearly all information, communication networks, and systems will be at risk for years. Cyber threats are already challenging public trust and confidence in global institutions, governance, and norms, while imposing costs on the US and global economies. Cyber threats also pose an increasing risk to public health, safety, and prosperity as cyber technologies are integrated with critical infrastructure in key sectors. These threats are amplified by our ongoing delegation of decisionmaking, sensing, and authentication roles to potentially vulnerable automated systems. This delegation increases the likely physical, economic, and psychological consequences of cyber attack and exploitation events when they do occur. Many countries view cyber capabilities as a viable tool for projecting their influence and will continue developing cyber capabilities. Some adversaries also remain undeterred from conducting reconnaissance, espionage, influence, and even attacks in cyberspace.
|File size:||720 KB|
About the Author
Progressive Management: For over a quarter of a century, our news, educational, technical, scientific, and medical publications have made unique and valuable references accessible to all people. Our imprints include PM Medical Health News, Advanced Professional Education and News Service, Auto Racing Analysis, and World Spaceflight News. Many of our publications synthesize official information with original material. They are designed to provide a convenient user-friendly reference work to uniformly present authoritative knowledge that can be rapidly read, reviewed or searched. Vast archives of important data that might otherwise remain inaccessible are available for instant review no matter where you are. The e-book format makes a great reference work and educational tool. There is no other reference book that is as convenient, comprehensive, thoroughly researched, and portable - everything you need to know, from renowned experts you trust. Our e-books put knowledge at your fingertips, and an expert in your pocket!