From Fierce Government:
By David Perera | Comment | Forward | Twitter | Facebook | LinkedIn |
In unclassified testimony Jan. 31, top U.S. intelligence official James Clapper revealed little new but sounded alarm bells against an increasingly aggressive Iran and the cyber-intelligence capabilities of China and Russia. "Iran's intelligence operations against the United States, including cyber capabilities, have dramatically increased in recent years in depth and complexity," said Clapper in his prepared testimony before the Senate Select Committee on Intelligence. Clapper has served as director of national intelligence since August 2010. Foreign intelligence services have perpetuated network operations that have gone undetected, Clapper also said, adding that the focus of network penetrations has broadened to include harder-to-reach classified networks. Russia and China have gained a global reputation over the past decade for directly, or indirectly through in-country proxy hackers, conducting cyber espionage on a massive scale. "Russia and China are aggressive and successful purveyors of economic espionage against the United States," Clapper said. Chinese officials in particular have denied their government is involved in state-sponsored hacking and have also accused the United States of perpetuating it against them. That last claim is contested by cyber expert James Andrew Lewis in a recent report from the Brussels-based think tank the Security & Defence Agenda. "Our laws don't allow us to favor one company over another," he said, making a state-sponsored campaign of intellectual property theft unlikely. "Secondly, until recently they didn't have much in the way of technology we would want to steal," he added. During his testimony, Clapper also sounded a warning about the insider threat, stating that "trusted insiders using their access for malicious intent represent one of today's primary threats to U.S. classified networks." Among the greatest of challenges facing the intelligence community in regard to cyber threats in the next two years are providing timely and actionable warnings that include attribution information and vulnerabilities associated with the information technology supply chain used within U.S. networks, Clapper added. Related Articles:Intel chief looks to metadata, identity management to prevent WikiLeaks redux White House global supply chain strategy contains plans Congress authorizes offensive cyberspace military operations Conference committee approves anti-IT counterfeiting provision in defense authorization bill |
No comments:
Post a Comment