{"id":130,"date":"2019-02-13T22:35:06","date_gmt":"2019-02-13T22:35:06","guid":{"rendered":"http:\/\/news.nucleon.sh\/?p=130"},"modified":"2019-02-13T22:48:10","modified_gmt":"2019-02-13T22:48:10","slug":"us-world-wide-cyber-threat-assessment","status":"publish","type":"post","link":"https:\/\/news.nucleon.sh\/ko\/2019\/02\/13\/us-world-wide-cyber-threat-assessment\/","title":{"rendered":"US World Wide Cyber Threat Assessment"},"content":{"rendered":"\n<p class=\"wp-block-paragraph\">In this article we will cover the Cyber part of a yearly report released by the American government titled as WORLDWIDE THREAT ASSESSMENT of the US INTELLIGENCE COMMUNITY for 2019.<\/p>\n\n\n\n<figure class=\"wp-block-embed-soundcloud wp-block-embed is-type-rich is-provider-soundcloud wp-embed-aspect-4-3 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<a href=\"https:\/\/soundcloud.com\/user-705652236\/us-world-wide-threat-assessment\/s-3Uatp\" rel=\"nofollow\">https:\/\/soundcloud.com\/user-705652236\/us-world-wide-threat-assessment\/s-3Uatp<\/a>\n<\/div><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">This document contains 42 pages that performs assessments for threats collected by the various intelligence agencies, this report is publicly available , you can download it in the <a href=\"https:\/\/www.dni.gov\/files\/ODNI\/documents\/2019-ATA-SFR---SSCI.pdf\">link<\/a>.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">While the report covers several different aspects of threats to the USA there is a section giving details about the american view on the cyber world and the threats its posses.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">This is a official rare glimpse to the way people behind one of the strongest cyber countries thinks.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The reports starts with defining the threats<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">\u201cThe adversaries and strategic competitors will increasingly use cyber capabilities\u2014including cyber espionage, attack, and influence\u2014to seek political, economic, and military advantage over the United States and its allies and partners.\u201d <\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The report continues and states that At the &nbsp;present, China and Russia pose the greatest espionage and cyber attack threats, but it anticipates that all the adversaries and strategic competitors will increasingly build Similar capabilities.<br><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Same as last year report, the report states that as there are billions of connected devices to the internet , it predicts that the adversaries will almost certainly gain greater insight into and access to our protected information<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><\/p>\n\n\n\n<figure class=\"wp-block-image\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" width=\"660\" height=\"431\" data-attachment-id=\"138\" data-permalink=\"https:\/\/news.nucleon.sh\/ko\/42b6cac0-eaa3-43e8-8621-b23a8e44ab69\/\" data-orig-file=\"https:\/\/i0.wp.com\/news.nucleon.sh\/wp-content\/uploads\/2019\/02\/42b6cac0-eaa3-43e8-8621-b23a8e44ab69.png?fit=3906%2C2550&amp;ssl=1\" data-orig-size=\"3906,2550\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"42b6cac0-eaa3-43e8-8621-b23a8e44ab69\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/i0.wp.com\/news.nucleon.sh\/wp-content\/uploads\/2019\/02\/42b6cac0-eaa3-43e8-8621-b23a8e44ab69.png?fit=660%2C431&amp;ssl=1\" src=\"https:\/\/i0.wp.com\/news.nucleon.sh\/wp-content\/uploads\/2019\/02\/42b6cac0-eaa3-43e8-8621-b23a8e44ab69.png?resize=660%2C431&#038;ssl=1\" alt=\"\" class=\"wp-image-138\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">This are the countries the report is alerting about as the biggest threats to the USA:<br><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>China &#8211; China presents a persistent cyber espionage threat and a growing attack threat to the USA core military and critical infrastructure systems.<\/li><\/ul>\n\n\n\n<ul class=\"wp-block-list\"><li>Russia &#8211; Russia poses a cyber espionage, influence, and attack threat to the United States and its allies.  The report states that Russia has the ability to execute cyber attacks in the United States that generate localized, temporary disruptive effects on critical infrastructure\u2014such as disrupting an electrical distribution network for at least a few hours\u2014similar to those demonstrated in Ukraine in 2015 and 2016. Moscow is mapping USA critical infrastructure with the long-term goal of being able to cause substantial damage.<\/li><\/ul>\n\n\n\n<ul class=\"wp-block-list\"><li>Iran &#8211; Iran continues to present a cyber espionage and attack threat. <\/li><li>The report states that \u201cIran has been preparing for cyber attacks against the United States and its allies. It is capable of causing localized, temporary disruptive effects\u2014such as disrupting a large company\u2019s corporate networks for days to weeks\u2014similar to its data deletion attacks against dozens of Saudi governmental and private-sector networks in late 2016 and early 2017.<\/li><li><\/li><\/ul>\n\n\n\n<ul class=\"wp-block-list\"><li>North Korea &#8211; North Korea poses a significant cyber threat to financial institutions, remains a cyber espionage threat, and retains the ability to conduct disruptive cyber attacks. Pyongyang\u2019s cybercrime operations include attempts to steal more than $1.1 billion from financial institutions across the world.<\/li><\/ul>\n\n\n\n<ul class=\"wp-block-list\"><li> Unattributed Actors &#8211; Foreign cyber criminals will continue to conduct for-profit, cyber-enabled theft and extortion against US networks. The report anticipate that financially motivated cyber criminals very likely will expand their targets in the United States in the next few years. <\/li><li><\/li><\/ul>\n\n\n\n<figure class=\"wp-block-image\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" width=\"660\" height=\"854\" data-attachment-id=\"140\" data-permalink=\"https:\/\/news.nucleon.sh\/ko\/p1-1\/\" data-orig-file=\"https:\/\/i0.wp.com\/news.nucleon.sh\/wp-content\/uploads\/2019\/02\/p1-1.jpg?fit=1275%2C1650&amp;ssl=1\" data-orig-size=\"1275,1650\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"p1-1\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/i0.wp.com\/news.nucleon.sh\/wp-content\/uploads\/2019\/02\/p1-1.jpg?fit=660%2C854&amp;ssl=1\" src=\"https:\/\/i0.wp.com\/news.nucleon.sh\/wp-content\/uploads\/2019\/02\/p1-1.jpg?resize=660%2C854&#038;ssl=1\" alt=\"\" class=\"wp-image-140\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">This year report also contains an additional section related to cyber intelligence discussing ONLINE INFLUENCE The report continues and states that adversaries and strategic competitors probably already are looking to the 2020 US elections as an opportunity to advance their interests. More broadly, US adversaries and strategic competitors almost certainly will use online influence operations to try to weaken democratic institutions, undermine US alliances and partnerships, and shape policy outcomes in the United States and elsewhere. <\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The report itself going into more details in addition to other types of threats.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">This report covers only the way USA perceive the threats against it and doesn&#8217;t mean that it is accurate or true. <br><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In this article we will cover the Cyber part of a yearly report released by the American government titled as WORLDWIDE THREAT ASSESSMENT of the US INTELLIGENCE COMMUNITY for 2019.<\/p>\n","protected":false},"author":143072865,"featured_media":138,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","_crdt_document":"","advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2},"_wpas_customize_per_network":false,"jetpack_post_was_ever_published":false},"categories":[646263560],"tags":[1470,630657,476118,61188,15230,14066,6645,1142,10759,29525,58348,1004116,699],"class_list":["post-130","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybercure-ai","tag-china","tag-cyber-security","tag-dni","tag-hackers","tag-information-security","tag-intelligence","tag-iran","tag-podcast","tag-russia","tag-special","tag-threat","tag-threat-assessment","tag-usa","entry-image--landscape"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/news.nucleon.sh\/wp-content\/uploads\/2019\/02\/42b6cac0-eaa3-43e8-8621-b23a8e44ab69.png?fit=3906%2C2550&ssl=1","jetpack_likes_enabled":true,"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/paa2yX-26","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/news.nucleon.sh\/ko\/wp-json\/wp\/v2\/posts\/130","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/news.nucleon.sh\/ko\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/news.nucleon.sh\/ko\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/news.nucleon.sh\/ko\/wp-json\/wp\/v2\/users\/143072865"}],"replies":[{"embeddable":true,"href":"https:\/\/news.nucleon.sh\/ko\/wp-json\/wp\/v2\/comments?post=130"}],"version-history":[{"count":5,"href":"https:\/\/news.nucleon.sh\/ko\/wp-json\/wp\/v2\/posts\/130\/revisions"}],"predecessor-version":[{"id":141,"href":"https:\/\/news.nucleon.sh\/ko\/wp-json\/wp\/v2\/posts\/130\/revisions\/141"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/news.nucleon.sh\/ko\/wp-json\/wp\/v2\/media\/138"}],"wp:attachment":[{"href":"https:\/\/news.nucleon.sh\/ko\/wp-json\/wp\/v2\/media?parent=130"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/news.nucleon.sh\/ko\/wp-json\/wp\/v2\/categories?post=130"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/news.nucleon.sh\/ko\/wp-json\/wp\/v2\/tags?post=130"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}