Annual Threat Assessment
Excerpts form:
Annual Threat Assessment of the
Intelligence Community
for the Senate Select Committee on Intelligence
12 February 2009
The primary near-term security concern of the United States is the global economic crisis
and its geopolitical implications. The crisis has been ongoing for over a year, and economists are
divided over whether and when we could hit bottom. Some even fear that the recession could
further deepen and reach the level of the Great Depression. Of course, all of us recall the
dramatic political consequences wrought by the economic turmoil of the 1920s and 1930s in
Europe, the instability, and high levels of violent extremism. Though we do not know its
eventual scale, it already looms as the most serious global economic and financial crisis in
decades.
Time is probably our greatest threat. The longer it takes for the recovery to begin, the
greater the likelihood of serious damage to US strategic interests. Roughly a quarter of the
countries in the world have already experienced low-level instability such as government
changes because of the current slowdown. Europe and the former Soviet Union have
experienced the bulk of the anti-state demonstrations. Although two-thirds of countries in the
world have sufficient financial or other means to limit the impact for the moment, much of Latin
America, former Soviet Union states and sub-Saharan Africa lack sufficient cash reserves, access
to international aid or credit, or other coping mechanism. Statistical modeling shows that
economic crises increase the risk of regime-threatening instability if they persist over a one to
two year period. Besides increased economic nationalism, the most likely political fallout for US
interests will involve allies and friends not being able to fully meet their defense and
humanitarian obligations. Potential refugee flows from the Caribbean could also impact
Homeland security.
The dramatic decline in oil prices—more than a two-thirds decline from the July peak of
$147 per barrel—is partially a result of the market betting on a deep and perhaps protracted
global recession. A serious supply crunch is possible down the road if sustained low prices lead
to major cuts or delays in investment by national and international oil companies, especially high
cost unconventional oil sources like oil sands. Nevertheless, lower prices benefit consumers, and
declining revenues may put the squeeze on the adventurism of producers like Iran and
Venezuela.
The crisis presents many challenges for the United States. It started in the United States,
quickly spread to other industrial economies and then, more recently, to emerging markets. The
widely held perception that excesses in US financial markets and inadequate regulation were
responsible has increased criticism about free market policies, which may make it difficult to
achieve long-time US objectives, such as the opening of national capital markets and increasing
domestic demand in Asia. It already has increased questioning of US stewardship of the global
economy and the international financial structure.
I next want to focus on extremist groups that use terrorism. The groups with the greatest
capability to threaten are extremist Muslim groups. In 2008 terrorists did not achieve their goal
of conducting another major attack in the US Homeland. We have seen notable progress in
Muslim opinion turning against terrorist groups like al-Qa’ida. Over the last year and a half, al-
Qa’ida has faced significant public criticism from prominent religious leaders and fellow
extremists primarily regarding the use of brutal and indiscriminate tactics—particularly those
employed by al Qa’ida in Iraq (AQI) and al-Qa’ida in the Lands of Islamic Maghreb (AQIM)—
that have resulted in the deaths of Muslim civilians. Given the increased pressure posed by these
criticisms, al-Qa’ida leaders increasingly have highlighted enduring support for the Taliban and
the fight in Afghanistan and Pakistan and in other regions where they portray the West being at
war with Islam and al-Qa’ida as the vanguard of the global terrorist movement. A broad array of
Muslim countries is nevertheless having success in stemming the rise of extremism and
attractiveness of terrorist groups. No major country is at immediate risk of collapse at the hands
of extremist, terrorist groups, although a number—such as Pakistan and Afghanistan—have to
work hard to repulse a still serious threat. In the next section I will discuss at length the
challenges facing us in Pakistan and Afghanistan where militant have gained some traction
despite the successes against al-Qa’ida.
Because of the pressure we and our allies have put on al-Qa’ida’s core leadership in
Pakistan and the continued decline of al-Qa’ida’s most prominent regional affiliate in Iraq, al-
Qa’ida today is less capable and effective than it was a year ago.
In Pakistan’s Federally Administered Tribal Areas (FATA), al-Qa’ida lost significant
parts of its command structure since 2008 in a succession of blows as damaging to the group as
any since the fall of the Taliban in late 2001. Key leaders killed over the past year include
Khalid Habib, al-Qa’ida’s military chief and the fourth man in its chain of command; Abu Layth
al-Libi, who directed cross-border attacks against our forces in Afghanistan and was a rising star
in the organization; Abu Khabab al-Masri, the group’s leading expert on explosives and chemical
attacks and a driving force behind its terrorist plotting against the US Homeland and Europe; and
Usama al-Kini who was involved in the bombings of our Embassies in East Africa in 1998 and
later became the chief planner of al-Qa’ida’s terrorist attacks in Pakistan.
• The loss of these and many other leaders in quick succession has made it more difficult for
al-Qa’ida to identify replacements, and in some cases the group has had to promote more
junior figures considerably less skilled and respected than the individuals they are replacing.
Sustained pressure against al-Qa’ida in the FATA has the potential to further degrade its
organizational cohesion and diminish the threat it poses. If forced to vacate the FATA and locate
elsewhere, the group would be vulnerable to US or host-country security crackdowns as well as
local resistance, and probably would be forced to adopt an even more dispersed, clandestine
structure, making training and operational coordination more difficult. Without access to its
FATA safehaven, al-Qa’ida also undoubtedly would have greater difficulty supporting the
Taliban insurgency in Afghanistan. It is conceivable al-Qa’ida could relocate elsewhere in South
Asia, the Gulf, or parts of Africa where it could exploit a weak central government and close
proximity to established recruitment, fundraising, and facilitation networks, but we judge none of these locations would be as conducive to their operational needs as their location in the FATA.
The social, political, and economic integration of Western Europe’s 15 to 20 million
Muslims is progressing slowly, creating opportunities for extremist propagandists and recruiters.
The highly diverse Muslim population in Europe already faces much higher poverty and
unemployment rates than the general population, and the current economic crisis almost certainly
will disproportionately affect the region’s Muslims. Numerous worldwide and European Islamic
groups are actively encouraging Muslims in Europe to reject assimilation and support militant
versions of Islam. Successful social integration would give most ordinary Muslims a stronger
political and economic stake in their countries of residence, even though better educational and
economic opportunities do not preclude radicalization among a minority. Visible progress
toward an Arab-Israeli settlement, along with stability in Iraq and Afghanistan, would help
undercut radicals’ appeal to Muslim foreign policy grievances.
We judge any homegrown extremists in the United States do not yet rise to the numerical
level or exhibit the operational tempo or proficiency we have seen in Western Europe. A range
of factors inside the United States may contribute to a lower incidence of homegrown cells
developing. Nevertheless, we remain concerned about the potential for homegrown extremists
inspired by al-Qa’ida’s militant ideology to plan attacks inside the United States, Europe, and
elsewhere without operational direction from the group itself. In this regard, over the next year
we will remain focused on identifying any ties between US-based individuals and extremist
networks overseas. Though difficult to measure, the spread of radical Salafi Internet sites that
provide religious justification for attacks; aggressive and violent anti-Western rhetoric; and signs
that self-generating cells in the US identify with Bin Ladin’s violent objectives all point to the
likelihood that a small but violent number of cells may develop here.
Iran’s longstanding foreign policy goals are to preserve the Islamic regime, safeguard
Iran’s sovereignty, defend its nuclear ambitions, and expand its influence in the region and the
Islamic world. Iranian leaders perceive that regional developments—including the removal of
Saddam and the Taliban, challenges facing the Untied States in Iraq and Afghanistan, the
increased influence of HAMAS and Hizballah, and, until recently, higher oil revenues—have
given Tehran more opportunities and freedom to pursue its objective of becoming a regional
power. This perception has produced a more assertive Iranian foreign policy in which Tehran
has focused on expanding ties in Iraq, Afghanistan, and the Levant to better influence and exploit regional political, economic, and security developments. Iran’s pursuit of nuclear weapon
capability is another element in its more assertive foreign policy—an aspect that I will discuss
later. In Tehran, Iran’s conservative faction continues to dominate the government. Supreme
Leader Khamenei has consolidated political power in his office, but his reliance on hardline
conservative elements—the IRGC, war veterans turned politicians such as President Mahmud
Ahmadi-Nejad, and selected clerics—to bolster his authority has upset the earlier factional
balance in Iranian politics.
Although the regime still comprises many competing factions, only those that support the
concept of a powerful Supreme Leader and advocate revolutionary values now have a
significant voice in decisionmaking.
President Ahmadi-Nejad faces less than certain prospects for reelection in June because
his management of the economy and aggressive foreign policy rhetoric have become sources of
significant domestic criticism and political friction. Ahmadi-Nejad’s economic policies have
reduced unemployment marginally, but have fueled significant inflation, providing his critics
ample ammunition to question his competence. The sharp fall in global oil prices will add to
Iran’s economic problems, but Tehran has a substantial cushion of foreign reserves to support
social and other spending priorities. Less energy revenues may also help to dampen its foreign
policy adventurism.
Militarily, Iran continues to strengthen the three pillars of its strategic deterrence:
surface-to-surface missiles, long-range rockets and aircraft for retaliation; naval forces to disrupt
maritime traffic through key waterways; and unconventional forces and surrogates to conduct
worldwide lethal operations. Although many of their statements are exaggerations, Iranian
officials throughout the past year have repeatedly claimed both greater ballistic missile
capabilities that could threaten US and allied interests and the ability to close the Strait of
Hormuz using unconventional small boat operations, anti-ship cruise missiles, and other naval
systems. Some officials, such as Islamic Revolutionary Guard Corps Commander Major General
Mohammad Ali Jafari-Najafabadi, have hinted that Iran would have a hand in attacks on
“America’s interests even in far away places,” suggesting Iran has contingency plans for
unconventional warfare and terrorism against the United States and its allies.
Iran’s goals in Iraq include preventing the emergence of a threat from Iraqi territory,
either from the government of Iraq itself, or from the United States. To achieve this, Iran
probably seeks a government in Baghdad in which Tehran’s Shia allies hold the majority of
political, economic, and security power. Iran also has sought to make the United States suffer
political, economic, and human costs in order to limit US engagement in the region and to ensure
that Washington does not maintain a permanent military presence in Iraq or use its military to
pressure or attack Iran.
Iranian efforts to secure influence in Iraq encompass a wide range of activities, including
using propaganda, providing humanitarian assistance, building commercial and economic
ties, and supporting Shia elements fighting the Coalition. Iran has provided a variety of Shia
militants with lethal support including weapons, funding, training, logistical and operational
support, and intelligence training.
• We judge Iran will continue to calibrate its lethal aid to Iraqi Shia militants based on the
threat it perceives from US forces in Iraq, the state of US-Iran relations, Tehran’s fear of a
Ba’thist resurgence, Tehran’s desire to help defend Iraqi Shia against sectarian violence, and
to maintain the ability to play a spoiler role in Iraq if Iran perceives the government of Iraq
has become a strategic threat.
• Despite Tehran’s efforts, we judge Iraqi nationalism and the growing capabilities of the Iraqi
government will limit Iranian influence in Iraq. Baghdad, for example, signed the US-Iraq
security agreement despite Iranian opposition.
In Afghanistan, Iran has focused on promoting a friendly central government in Kabul
and limiting Western power and influence. Iran’s policy in Afghanistan follows multiple tracks,
including providing political and economic support to the Karzai government and developing
relationships with actors across the political spectrum.
• Iran has opposed Afghan reconciliation talks with the Taliban as risking an increase in the
group’s influence and legitimacy.
• We judge Iran distrusts the Taliban and opposes its return to power but uses the provision of
lethal aid as a way to pressure Western forces, gather intelligence, and build ties that could
protect Iran’s interests if the Taliban regains control of the country.
In the Levant, Tehran is focused on building influence in Lebanon and expanding the
capability of key allies. Tehran continues to support groups such as Hizballah, HAMAS, and
Palestine Islamic Jihad (PIJ), which it views as integral to its efforts to challenge Israeli and
Western influence in the Middle East.
• Hizballah is the largest recipient of Iranian financial aid, training, and weaponry, and Iran’s
senior leadership has cited Hizballah as a model for other militant groups. We assess Tehran
has continued to provide Hizballah with significant amounts of funding, training, and
weapons since the 2006 conflict with Israel, increasing the group’s capabilities to pressure
other Lebanese factions and to threaten Israel.
• Iran’s provision of training, weapons, and money to HAMAS since the 2006 Palestinian
elections has bolstered the group’s ability to strike Israel and oppose the Palestinian
Authority.
Iranian Nuclear and Missile Programs. The Iranian regime continues to flout UN
Security Council restrictions on its nuclear programs. There is a real risk that its nuclear
program will prompt other countries in the Middle East region to pursue nuclear options
conducive to the development of nuclear weapons, and the advent of additional nuclear weapons
programs might lead countries in other regions to reassess their nuclear options.
I want to be very clear in characterizing the Iranian nuclear program. First, there are
three key parts to an effective nuclear weapons capability:
(1) Production of fissile material,
(2) Effective means for weapon delivery, and
(3) Design, weaponization, and testing of the warhead itself.
We assessed in our 2007 NIE on this subject that Iran’s nuclear weapon design and
weaponization work was halted in fall 2003, along with its covert uranium conversion and
enrichment-related activities. Declared uranium enrichment efforts were suspended in 2003 but
resumed in January 2006 and will enable Iran to produce weapons-usable fissile material if it
chooses to do so. Development of medium-range ballistic missiles, inherently capable of
delivering nuclear weapons, has continued unabated.
We assess Iranian military entities were working under government direction to develop
nuclear weapons until fall 2003. Iranian entities are continuing to develop a range of technical
capabilities that could be applied to producing nuclear weapons, if a decision were made to do
so.
• Iran continues its efforts to develop uranium enrichment technology, which can be used both
to produce low-enriched uranium for power reactor fuel and to produce highly enriched
uranium for nuclear weapons.
• As noted, Iran continues to deploy and improve ballistic missiles inherently capable of
delivering nuclear weapons.
• We assess Iran since fall 2003 has conducted research and development projects with
commercial and conventional military applications, some of which would be of limited use
for nuclear weapons.
We judge in fall 2003 Tehran halted its nuclear weapons design and weaponization
activities and that the halt lasted at least several years. We assess Tehran had not restarted these
activities as of at least mid-2007. Although we do not know whether Iran currently intends to
develop nuclear weapons, we assess Tehran at a minimum is keeping open the option to develop
them.
We judge the halt was directed primarily in response to increasing international scrutiny
and pressure resulting from exposure of Iran’s previously undeclared nuclear work. This
indicates Iran may be more susceptible to influence on the issue than we had judged in the 2005
National Intelligence Estimate.
We do not have sufficient intelligence reporting to judge confidently whether Tehran is
willing to maintain indefinitely the halt of its previously enumerated nuclear weapons-related
activities while it weighs its options, or whether it will or already has set specific deadlines or
criteria that will prompt it to restart those activities. We assess Iran has the scientific, technical,
and industrial capacity eventually to produce nuclear weapons. In our judgment, only an Iranian
political decision to abandon a nuclear weapons objective would plausibly keep Iran from
eventually producing nuclear weapons—and such a decision is inherently reversible. I reiterate
that two activities of the three relevant to a nuclear weapons capability continue: development of
uranium enrichment technology that will enable production of fissile material, if Iran chooses to
do so, and development of nuclear-capable ballistic missile systems.
We assess convincing the Iranian leadership to forgo the eventual development of nuclear
weapons will be difficult given the linkage many within the leadership see between nuclear
weapons and Iran’s key national security and foreign policy objectives, and given Iran’s
considerable effort from at least the late 1980s to 2003 to develop such weapons. Our analysis
suggests that some combination of threats of intensified international scrutiny and pressures,
along with opportunities for Iran to achieve its security and goals might—if perceived by Iran’s
leaders as credible—prompt Tehran to extend the halt to the above nuclear weapons-related
activities. It is difficult to specify what such a combination might be.
We continue to assess Iran does not currently have a nuclear weapon. We continue to
assess Iran probably has imported at least some weapons-usable fissile material but still judge it
has not obtained enough for a nuclear weapon. We cannot rule out that Iran has acquired from
abroad or will acquire in the future a nuclear weapon or enough fissile material for a weapon.
Barring such acquisitions, if Iran wants to have nuclear weapons it would need to produce
sufficient amounts of fissile material indigenously. We judge it has not yet done so.
Iran made significant progress in 2007 and 2008 installing and operating centrifuges at its
main centrifuge enrichment plant, Natanz. We judge Iran probably would be technically capable
of producing enough highly enriched uranium (HEU) for a weapon sometime during the 2010-
2015 time frame. INR judges Iran is unlikely to achieve this capability before 2013 because of
foreseeable technical and programmatic problems.
Iranian Missile Threat. Beyond its WMD potential, Iranian conventional military power
threatens Persian Gulf states and challenges US interests. Iran is enhancing its ability to project
its military power, primarily with ballistic missiles and naval power, with the goal of dominating
the Gulf region and deterring potential adversaries. It seeks a capacity to disrupt the operations
and reinforcement of US forces based in the region, potentially intimidating regional allies into
withholding support for US policy, and raising the political, financial, and human costs to the
United States and our allies of our presence.
• Iran’s growing inventory of ballistic missiles—it already has the largest inventory in the
Middle East—and its acquisition of anti-ship cruise missiles provide capabilities to enhance
its power projection. Tehran views its conventionally armed missiles as an integral part of its
strategy to deter and if necessary retaliate against forces in the region, including US forces.
Its ballistic missiles are inherently capable of delivering WMD and if so armed would fit into
this same strategy.
The Terrorist CBRN Threat. Over the coming years, we will continue to face a
substantial threat, including in the US Homeland, from terrorists attempting to acquire
biological, chemical, and possibly nuclear weapons and use them to conduct large-scale attacks.
Conventional weapons and explosives will continue to be the most often used instruments of
destruction in terrorist attacks; however, terrorists who are determined to develop CBRN
capabilities will have increasing opportunities to do so, owing to the spread of relevant
technological knowledge and the ability to work with CBRN materials and designs in
safehavens.
• Most terrorist groups that have shown some interest, intent, or capability to conduct CBRN
attacks have pursued only limited, technically simple approaches that have not yet caused
large numbers of casualties.
In particular, we assess the terrorist use of biological agents represents a growing threat
as the barriers to obtaining many suitable starter cultures are eroding and open source technical
literature and basic laboratory equipment can facilitate production. Terrorist chemical attacks
also represent a substantial threat. Small-scale chemical attacks using industrial toxins have been the most frequent type of CBRN attack to date. The chlorine attacks in Iraq from October 2006 through the summer of 2007 highlighted terrorist interest in using commercial and easily
available toxic industrial chemicals as weapons.
Al-Qa’ida is the terrorist group that historically has sought the broadest range of CBRN
attack capabilities, and we assess that it would use any CBRN capability it acquires in an anti-US
attack, preferably against the Homeland. There also is a threat of biological or chemical attacks
in the US Homeland by lone individuals.
The Growing Cyber and Organized Crime Threat
Threats to the US Information Technology Infrastructure
The US information infrastructure, including telecommunications and computer networks
and systems, and the data that reside on them, is critical to virtually every aspect of modern life.
Threats to our information technology infrastructure are an important focus of the Intelligence
Community. As government, private sector, and personal activities continue to move to
networked operations, as our digital systems add ever more capabilities, as wireless systems
become even more ubiquitous, and as the design, manufacture, and service of information
technology have moved overseas, the threat will continue to grow.
This information and communications revolution also is enabling an unprecedented
ability to spread ideas and influence large numbers of people. Nation-states and non-state groups
are taking an increasing interest in the role of mass media in shaping international opinions.
Terrorists will continue to be motivated to conduct spectacular attacks in part by the desire to
achieve maximum media exposure for their cause. Increasing global connectivity is enabling
radical groups to recruit and train new members, proliferate extremist ideologies, manage their
finances, manipulate public opinion, and coordinate attacks. In the recent conflict in Gaza, for
example, the media played an important role for both sides in shaping public perceptions of the
conflict. We can expect future adversaries to similarly employ mass media in an attempt to
constrain US courses of actions in a future crisis or conflict.
Further, the growing connectivity between information systems, the Internet, and other
infrastructures creates opportunities for attackers to disrupt telecommunications, electrical
power, energy pipelines, refineries, financial networks, and other critical infrastructures. Over
the past several years we have seen cyber attacks against critical infrastructures abroad, and
many of our own infrastructures are as vulnerable as their foreign counterparts.
• A successful cyber attack against a major financial service provider could severely impact
the national economy, while cyber attacks against physical infrastructure computer systems
such as those that control power grids or oil refineries have the potential to disrupt services
for hours to weeks.
Network defense technologies are widely available to mitigate threats but have not been
uniformly adopted due to associated costs, perceived need, operational requirements, and
regulatory constraints. This slow rate of adoption has allowed cyber attackers to keep up with
many defensive advances. Meanwhile, advances in digital communications technology, such as
the growth in wireless connectivity and the acceleration of network convergence with a variety
data increasingly digitized and transmitted over the Internet, are creating new vulnerabilities in
our networks and new avenues for cyber attacks.
Malicious activity on the Internet also is rapidly increasing: spam—unsolicited email that
can contain malicious software—now accounts for 81 percent of all email according to Message
Labs (Symantec); the Georgia Tech Information Security Center projects a ten-fold increase in
malicious software targeting data in the coming year; and botnets—networks of hijacked
computers used to deliver spam or launch distributed denial of service attacks—are expected to
compose 15 percent of all online computers in 2009. Ferris Research estimates that the total cost
of spam and all of the types of fraud that take advantage of spam’s impact is $42 billion in the
United States and $140 billion worldwide in last year, while McAfee estimates that global
companies may have lost over $1 trillion worth of intellectual property to data theft in 2008.
State and Non-State Threats. A growing array of state and non-state adversaries are
increasingly targeting—for exploitation and potentially disruption or destruction—our
information infrastructure, including the Internet, telecommunications networks, computer
systems, and embedded processors and controllers in critical industries. Over the past year, cyber
exploitation activity has grown more sophisticated, more targeted, and more serious. The
Intelligence Community expects these trends to continue in the coming year.
We assess that a number of nations, including Russia and China, have the technical
capabilities to target and disrupt elements of the US information infrastructure and for
intelligence collection. Nation states and criminals target our government and private sector
information networks to gain competitive advantage in the commercial sector. Terrorist groups,
including al-Qa’ida, HAMAS, and Hizballah, have expressed the desire to use cyber means to
target the United States. Criminal elements continue to show growing sophistication in technical
capability and targeting and today operate a pervasive, mature on-line service economy in illicit
cyber capabilities and services available to anyone willing to pay. Each of these actors has
different levels of skill and different intentions; therefore, we must develop flexible capabilities
to counter each. We must take proactive measures to detect and prevent intrusions from
whatever source, as they happen, and before they can do significant damage.
We expect disruptive cyber activities to be the norm in future political or military
conflicts. The Distributed Denial of Service (DDoS) attacks and Web defacements that targeted
Georgia in 2008 and Estonia in 2007 disrupted government, media, and banking Web sites.
DDoS attacks and Web defacements targeted Georgian government Web sites, including that of
Georgian President Saakishvili, intermittently disrupting online access to the official Georgian
perspective of the conflict and some Georgian Government functions but did not affect military
action. Such attacks have been a common outlet for hackers during political disputes over the
past decade, including Israel’s military conflicts with Hizballah and HAMAS in 2006 and 2008,
the aftermath of the terrorist attacks in Mumbai last year, the publication of cartoons caricaturing
the Prophet Mohammed in 2005, and the Chinese downing of a US Navy aircraft in 2001.
The Comprehensive National Cybersecurity Initiative. In January 2008, the
Comprehensive National Cybersecurity Initiative (CNCI) was adopted as national policy as part
of National Security Presidential Directive 54/Homeland Security Presidential Directive 23
(NSPD-54/HSPD-23). With bipartisan support, Congress appropriated the vast majority of the
CNCI funding request in the Consolidated Security, Disaster Assistance, and Continuing
Appropriations Act of 2009.
The CNCI addresses current cybersecurity threats, anticipates future threats and
technologies, and develops a framework for creating in partnership with the private sector an
environment that no longer favors cyber intruders over defenders. The CNCI includes defensive,
offensive, education, research and development, and counterintelligence elements, while
remaining sensitive throughout to the requirements of protecting the privacy rights and civil
liberties of US citizens. The CNCI is now making considerable progress in building a better
understanding of the cyber threat, developing concrete solutions, and approving detailed courses
of action. The Adminstration is now reviewing CNCI, to ensure it is consistent with its own
cybersecurity policy.
To be sure, significant work remains in order to protect, defend, and respond to the cyber
threat in a manner that markedly improves our nation’s overall security. Yet there is reason to be
hopeful. We are witnessing an unprecedented unity of effort across a broad coalition of
government agencies, members of Congress, and leaders of industry. To succeed, however, the
CNCI must remain a long-term national priority. With sustained momentum and continued
national resolve we can and will build an enduring security framework capable of protecting our
vital national security, economic, and public health interests.
We cannot afford to discover successful cyber intrusions after-the-fact, accept disastrous
losses, and then seek merely to contain them. It requires a broad alliance of departments,
agencies, and industry leaders to focus on countering the threat, mitigating vulnerabilities, and
enhancing resiliency in order to preserve our national security, national economy, and public
welfare.
Growing Transnational Organized Crime Threat
Most organized criminal activities increasingly involve either networks of interconnected
criminal groups sharing expertise, skills, and resources in joint criminal ventures that transcend
national boundaries or powerful, well-organized crime groups seeking to legitimize their image
by investing in the global marketplace. Organized criminals and groups will increasingly pose a
threat to US national security interests by enhancing the capabilities of terrorists and hostile
governments.
Some organized crime networks, groups, and individuals also have invested in energy
and mineral markets in an effort to diversify and legitimize their business activities. Criminals’
coercive tactics, underhanded business practices, opaque motives, and self-serving loyalties can
undermine the normal workings and integrity of these global markets. The most powerful, highprofile
Eurasian criminal groups often form strategic alliances with senior political leaders and
business tycoons and can operate from a relative safehaven status with little to fear of
international arrest and prosecution. The leaders of many of these groups go to great lengths to
portray themselves as legitimate businessmen and use front companies that give them more
market access and leverage. They also employ some of the world’s best accountants, lawyers,
bankers, and lobbyists to deflect and frustrate the efforts of authorities.
The change in the structure and types of activities conducted by transnational criminal
groups is making it increasingly difficult to identify and attack them. In particular, the
increasing prevalence of loosely knit networks, the use of cyberspace and global financial
systems, and political corruption have made it easier for them to hide their involvement, to
thwart law enforcement efforts, and to create images of legitimacy.
The international security environment is complex. No dominant adversary faces the
United States that threatens our existence with military force, but the global financial crises has
exacerbated what was already a growing set of political and economic uncertainties. We are
nevertheless in a strong position to shape a world reflecting universal aspirations and values that
have motivated Americans since 1776: human rights; the rule of law; liberal market economics
and social justice. Whether we can succeed will depend on actions we take here at home—
restoring strong economic growth and maintaining our scientific and technological edge and
defending ourselves at reasonable cost in dollars without violating our civil liberties. It will also
depend on our actions abroad, not only in how we deal with regions, regimes and crises, but also
in developing new multilateral systems, formal or informal, for effective international
cooperation in trade and finance, in neutralizing extremist groups using terrorism, in controlling
the proliferation of WMD, developing codes of conduct for cyberspace and space, and in
mitigating and slowing global climate change.
Full report here:
Gerald
( sorry Google blog text formating scewing up in Google's chrome browser.)
.
Labels: Annual Threat Assessment
0 Comments:
Post a Comment
Subscribe to Post Comments [Atom]
<< Home