‘Tyrannical IT’ Is A Critical Threat

"There's just no question that with generative AI you can be far more sophisticated in your production of misinformation and disinformation,” US Director of National Intelligence Avril Haines has warned.

Haines emphasised the national security challenges posed by China, Russia, Iran, and North Korea, as well as transnational issues, such as cyber hacking, climate change, terrorism, and emerging technologies.

Recently, a Russian cyber crime group FIN7 has been observed exploiting a Veeam Backup & Replication vulnerability patched in March 2023.

As authoritarian countries increasingly rely on digital tools to suppress dissent inside and outside their borders, the US and its democratic partners need to work together to counter the spread of repressive technologies across the globe, the nation’s top intelligence official said during the Carnegie Endowment for International Peace event on Monday 24th April.

Haines said that rising digital authoritarianism poses “a critical threat to our national security,” citing, in particular, the repressive models implemented by the Russian, Chinese, and Iranian governments as efforts that undermine democratic values within their countries and beyond.

These methods, which include the use of invasive surveillance tools, spyware, Internet shutdowns, online censorship and the spread of mis- and disinformation, have a broader impact.

Haines also said the intelligence community assesses “that foreign governments are increasingly using digital information and communication technologies to monitor and suppress political debate domestically, as well as in their expat and diaspora communities abroad.” She noted that this also includes the exportation of spyware and surveillance technologies to other countries where democracy is backsliding, which could further erode democratic norms and values on the global stage. 

“And as these technologies, capabilities, policies and mechanisms are exported and implemented in various countries or territories, they make it that much harder to bolster democratic governance and easier for authoritarians to prevail... Moreover, the use of these technologies and methods to monitor and limit dissent are on a trajectory to become even more pervasive, targeted and complex in the next few years, further constraining freedoms globally.”  she added.

Emerging technologies, such as generative artificial intelligence, could also be deployed by authoritarian nations to further suppress dissent and unwanted narratives, with Haines saying that they “will only increase the sophistication that such regimes can use to deploy such tools, making them that much more difficult to counter.”

Haines said that the growing use of these tools adds to “the contest over information,” which she called “perhaps one of the most challenging aspects of the problem” when it comes to digital repression... Today, we assess that foreign governments are increasingly using digital information and communication technologies to monitor and suppress political debate domestically, as well as in their expat and diaspora communities abroad,” she said.

Whether it’s internet shutdowns in Iran to silence the voices of protestors; the use of surveillance technologies in China to control the population; or censorship laws in Russia to suppress government criticism, these approaches pose a challenge to U.S. interests and values around the world.

Haines noted that, for the first time, the intelligence community’s annual threat assessment, which was publicly released in February, included an entire section on the digital trends of authoritarianism.

That report warned that “foreign states’ malicious use of digital information and communication technologies will become more pervasive, automated, targeted and complex during the next few years, further threatening to distort publicly available information and probably will outpace efforts to protect digital freedoms.”

Haines said that the rise of digital authoritarianism, including its dependence on emerging technologies and surveillance tools to control information and quell internal dissent, should spur the US and other democratic nations to develop “normative frameworks”. This can “preserve, to the greatest extent, the promise of such technologies to support freer flows of information, more timely and cheaper communication, as well as smart technologies, prove the delivery of services, and even protect the environment and promote our health, while nevertheless guarding against their use for digital repression,” she said.

Haines said this also includes highlighting efforts in democratic nations to move away from the use of technologies that could be used to surveil citizens, such as President Biden’s March 27th executive order restricting the US  government’s use of commercial spyware “that poses risks to national security.”

“The multifaceted challenge of adversaries suppressing information environments cannot be solved by government alone,” and said it was critical for non-government organisations and other pro-democracy voices to also push back on the spread of digital authoritarianism... Digital repression and foreign maligning influence are whole-of-society challenges, and we can no longer operate on parallel, but distinct tracks,” she added.

US DNI:      US DNI:   C-Span:     Defense One;    NextGov:    NextGov:     Defense Scoop:    Security Week:     

You Might Also Read: 

Russia's Disinformation Campaign Targets Ukraine's Supporters:

____________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Iranian Hackers Targeted Israel
Google Bans Thousands Of Malicious Developers »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Ethio-CERT

Ethio-CERT

National Cyber Emergency Readiness and Response Team of Ethiopia.

Netskope

Netskope

The Netskope Security Cloud provides unrivaled visibility and real-time data and threat protection when accessing cloud services, websites, and private apps from anywhere, on any device.

vArmour

vArmour

vArmour is the industry’s first distributed security system that provides insight and control for multi-cloud environments.

Trustlook

Trustlook

Trustlook's SECUREai engine delivers the performance and scalability needed to provide total threat protection against malware and other forms of attack.

Automation & Cyber Solutions (ACS)

Automation & Cyber Solutions (ACS)

Automation & Cyber Solutions delivers a range of Industrial Automation and Cyber solutions & services to sectors including Oil & Gas, Chemicals & Petrochemicals, Power and others.

Independent Security Evaluators (ISE)

Independent Security Evaluators (ISE)

ISE is an independent security consulting firm headquartered in Baltimore, Maryland dedicated to securing high value assets for global enterprises and performing groundbreaking security research.

Securepoint

Securepoint

Securepoint is the market leader in the development of professional “Unified Threat Management” solutions in Germany.

Salviol Global Analytics

Salviol Global Analytics

Salviol Global Analytics is a leading provider of Fraud, Risk and Operational Performance Solutions to a number of vertical markets including Insurance, Banking, Utilities, Telco’s and Government.

Blackfoot Cybersecurity

Blackfoot Cybersecurity

At Blackfoot, we work in partnership with you to deliver on-demand cyber security expertise and assurance, keeping you one step ahead of threats & compliant with regulations.

Curtail

Curtail

Curtail keeps businesses running by using live traffic analysis to identify defects before software goes live, and detect and isolate security threats before they impact systems.

NOW Insurance

NOW Insurance

NOW Insurance provides small business owners and other professional classes with a seamless purchasing experience for general liability, professional liability, and cybersecurity insurance coverage.

Bytes Technology Group

Bytes Technology Group

Bytes is a leading provider of world-class IT solutions. Our growing portfolio of services includes cloud, security, licensing, SAM, storage, virtualisation and managed services.

Team Secure

Team Secure

Team Secure provide Enterprise-grade Cyber Security consultancy, managed security services and cyber security staffing services.

National Cybersecurity Agency (ACN) - Italy

National Cybersecurity Agency (ACN) - Italy

The ACN is the National Authority for Cybersecurity in Italy. the Agency promotes public-private initiatives to strengthen the national cybersecurity and resilience posture.

RSK Cyber Security

RSK Cyber Security

RSK Cyber Security are a leading cyber security services company that uses services, consulting, and product knowledge to lower security risk across the board.

SecurityBridge

SecurityBridge

SecurityBridge provide a cybersecurity connection between our customers’ IT departments, the forward-facing business services, and their SAP applications.