The Air Force Handbook by Progressive Management

The Air Force Handbook by Progressive Management

Author:Progressive Management
Language: eng
Format: epub
Tags: airplane, air force, nuclear weapon, missile, bomber, fighter, military aviation, usaf, satellite, warplane
Publisher: Progressive Management


Statement for the Record

Senate Select Committee on Intelligence

James R. Clapper

Director of National Intelligence * January 29, 2014

STATEMENT FOR THE RECORD

US INTELLIGENCE COMMUNITY WORLDWIDE THREAT ASSESSMENT

January 29, 2014

* * * * * * * * * * * *

INTRODUCTION

Chairman Feinstein, Vice Chairman Chambliss, Members of the Committee, thank you for the invitation to offer the United States Intelligence Community's 2014 assessment of threats to US national security. My statement reflects the collective insights of the Intelligence Community's extraordinary men and women, whom I am privileged and honored to lead. We in the Intelligence Community are committed every day to provide the nuanced, multidisciplinary intelligence that policymakers, warfighters, and domestic law enforcement personnel need to protect American lives and America's interests anywhere in the world.

Information available as of January 15, 2014 was used in the preparation of this assessment.

* * * * * * * * * * * *

GLOBAL THREATS

Cyber

Counterintelligence Terrorism

Weapons of Mass Destruction and Proliferation Counterspace

Transnational Organized Crime

Economic Trends

Natural Resources Food Water Energy

Extreme Weather Events The Arctic

Health Risks

Mass Atrocities

REGIONAL THREATS

Middle East and North Africa

Arab Spring

Egypt

Syria

Iran

Iraq

Yemen

Lebanon

Libya

Tunisia

South Asia

Afghanistan

Pakistan

India

Sub-Saharan Africa

The Sahel

Somalia

East Africa

Sudan and South Sudan

Nigeria

Central African Republic

Democratic Republic of the Congo

Lord's Resistance Army

East Asia

China

North Korea

Russia and Eurasia Russia

The Caucasus and Central Asia

Ukraine, Moldova, and Belarus

Latin America and the Caribbean

Haiti

Central America

Europe

Key Partnerships

Turkey

The Western Balkans

* * * * * * * * * * * *

GLOBAL THREATS CYBER

Critical Trends Converging

Several critical governmental, commercial, and societal changes are converging that will threaten a safe and secure online environment. In the past several years, many aspects of life have migrated to the Internet and digital networks. These include essential government functions, industry and commerce, health care, social communication, and personal information. The foreign threats discussed below pose growing risks to these functions as the public continues to increase its use of and trust in digital infrastructures and technologies.

Russia and China continue to hold views substantially divergent from the United States on the meaning and intent of international cyber security. These divergences center mostly on the nature of state sovereignty in the global information environment states' rights to control the dissemination of content online, which have long forestalled major agreements. Despite these challenges, the United Nations Group of Governmental Experts concluded in a June 2013 report that international law and the UN Charter apply to cyberspace. This conclusion represents a substantive step forward in developing a legal framework and norms for cyber security.

Threat Environment

We assess that computer network exploitation and disruption activities such as denial-of-service attacks will continue. Further, we assess that the likelihood of a destructive attack that deletes information or renders systems inoperable will increase as malware and attack tradecraft proliferate. Many instances of major cyberattacks manifested themselves at home and abroad in 2013 as illustrated by the following examples.

In March 2013, South Korea suffered a sizeable cyberattack against its commercial and media networks, damaging tens of thousands of computer workstations. The attack also disrupted online banking and automated teller machine services- Although likely unrelated to the 2012 network attack against Saudi Aramco, these attacks illustrate an alarming trend in mass data-deletion and system-damaging attacks.



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.