ODNI

DNI Haines Statement on President Biden's Nomination of Lt. Gen. Jeffrey Kruse to Lead the Defense Intelligence Agency

WASHINGTON, D.C. – Director of National Intelligence Avril D. Haines today issued the following statement:

 

"I am delighted to congratulate Lieutenant General Jeffrey Kruse, United States Air Force, on his nomination to serve as the 23rd Director of the Defense Intelligence Agency. President Biden nominated Jeff because of his sterling reputation and deep expertise as a proven leader across the Defense Intelligence enterprise.

 

FOR IMMEDIATE RELEASE

ODNI News Release No. 12-23

June 1, 2023

 

DNI Haines Statement on President Biden's Nomination of
Lt. Gen. Jeffrey Kruse to Lead the Defense Intelligence Agency

 

WASHINGTON, D.C. – Director of National Intelligence Avril D. Haines today issued the following statement:

 

"I am delighted to congratulate Lieutenant General Jeffrey Kruse, United States Air Force, on his nomination to serve as the 23rd Director of the Defense Intelligence Agency. President Biden nominated Jeff because of his sterling reputation and deep expertise as a proven leader across the Defense Intelligence enterprise.

 

"Jeff has served as my Advisor for Military Affairs at the Office of the Director of National Intelligence since August 2020, and in doing so, he has made us better. His deep experience across the Intelligence Community, his integrity, his kindness, his ability to listen, his deep commitment in doing right by the workforce, and his capacity to work with diverse perspectives to find solutions that are in the best interest of the country are all qualities that I've come to expect from Jeff, and each will be vital to his success as DIA's newest director, pending confirmation. I will miss him in his current role but very much look forward to working with him in his new role, should he be confirmed.

 

"I also wish to thank Lieutenant General Scott Berrier, United States Army, for his absolutely extraordinary leadership at DIA over the last several years. Scotty is a wonderful leader and a stellar human being, who I have had the great joy to learn from over the course of his tenure leading DIA through a particularly challenging period. I wish him well in the next phase of his life and know that his dedication to public service will mean that he won’t be a stranger to the IC.

 

“Once again, congratulations to Jeff on his nomination and to Scotty on his remarkable accomplishments at DIA. We look forward to a smooth leadership transition pending Jeff’s confirmation.”

 

###

 

DNI Haines Statement on President Biden's Nomination of Lt. Gen. Timothy D. Haugh to Lead the National Security Agency and U.S. Cyber Command

WASHINGTON, D.C. – Director of National Intelligence Avril D. Haines today issued the following statement:

 

“I am delighted to congratulate Lieutenant General Timothy D. Haugh on his nomination to serve as the Commander of U.S. Cyber Command, the Director of the National Security Agency, and the Chief of the Central Security Service. Tim is an exemplary leader, and his experience over the years as a career signals intelligence officer – who currently serves as the Deputy Commander of U.S. Cyber Command – makes him a natural choice to take command. If confirmed, I have no doubt that he will serve our country with great distinction in one of the most challenging leadership positions within the Intelligence Community.

 

FOR IMMEDIATE RELEASE

ODNI News Release No. 13-23

June 1, 2023

 

DNI Haines Statement on President Biden's Nomination of
Lt. Gen. Timothy D. Haugh to Lead the
National Security Agency and U.S. Cyber Command

 

WASHINGTON, D.C. – Director of National Intelligence Avril D. Haines today issued the following statement:

 

“I am delighted to congratulate Lieutenant General Timothy D. Haugh on his nomination to serve as the Commander of U.S. Cyber Command, the Director of the National Security Agency, and the Chief of the Central Security Service. Tim is an exemplary leader, and his experience over the years as a career signals intelligence officer – who currently serves as the Deputy Commander of U.S. Cyber Command – makes him a natural choice to take command. If confirmed, I have no doubt that he will serve our country with great distinction in one of the most challenging leadership positions within the Intelligence Community.

 

"In addition to congratulating Tim, I also wish to thank General Paul Nakasone for his absolutely extraordinary leadership of NSA and Cyber Command over the last many years. Paul's rare combination of mental acuity, integrity, devotion to service, commitment to his workforce, and kindness has been a great joy to watch and learn from over the time that I have had the great privilege to work with him. He will leave a lasting imprint that will continue to enrich the IC for many years to come.

 

"Once again, congratulations to Tim on his nomination and to Paul on his enduring accomplishments at NSA and Cyber Command. We look forward to a smooth leadership transition pending Tim's confirmation."

 

###

 

IARPA Kicks Off New Research Program to Detect Changes in Movement Patterns

WASHINGTON, D.C. – The Intelligence Advanced Research Projects Activity (IARPA) — the advanced research and development arm of the Office of the Director of National Intelligence — recently announced the launch of a research program to develop systems capable of modeling population movement patterns around the globe and providing alerts when concerning anomalies emerge.

 

FOR IMMEDIATE RELEASE

ODNI News Release No. 11-23

May 18, 2023

 

IARPA Kicks Off New Research Program to Detect Changes in Movement Patterns

 

WASHINGTON, D.C. – The Intelligence Advanced Research Projects Activity (IARPA) — the advanced research and development arm of the Office of the Director of National Intelligence — recently announced the launch of a research program to develop systems capable of modeling population movement patterns around the globe and providing alerts when concerning anomalies emerge.

 

The Hidden Activity Signal and Trajectory Anomaly Characterization (HAYSTAC) program aims to establish “normal” movement models across times, locations, and populations and determine what makes an activity atypical. Expansive data from the Internet of Things and Smart City infrastructures provides opportunities to build new models that understand human dynamics at unprecedented resolution and creates the responsibility to understand privacy expectations for those moving through this sensor-rich world.

 

“An ever-increasing amount of geospatial data is created every day,” said HAYSTAC Program Manager Dr. Jack Cooper. “With HAYSTAC, we have the opportunity to leverage machine learning and advances in artificial intelligence to understand mobility patterns with exceptional clarity. The more robustly we can model normal movements, the more sharply we can identify what is out of the ordinary and foresee a possible emergency.”

 

Through a competitive Broad Agency Announcement, IARPA awarded HAYSTAC research contracts to the following lead organizations, which together bring 27 additional academic institutions, non-profits, and businesses into the program:

 

  • Raytheon Technologies Research Center
  • L3Harris Technologies, Inc.
  • STR
  • Kitware, Inc.
  • Leidos, Inc.
  • Novateur Research Solutions
  • Deloitte Consulting LLP
  • Raytheon BBN

 

The HAYSTAC test and evaluation team consists of Johns Hopkins Applied Physics Laboratory, MITRE, and Oak Ridge National Laboratory.

 

IARPA invests in high-risk, high-payoff research programs to tackle some of the most difficult challenges of the agencies and disciplines in the Intelligence Community. Additional information on IARPA and its research may be found on www.iarpa.gov.

 

###

 

IARPA Pursuing Breakthrough Biointelligence and Biosecurity Innovations

WASHINGTON, D.C. – The Intelligence Advanced Research Projects Activity (IARPA) — the advanced research and development arm of the Office of the Director of National Intelligence — recently launched a program to develop new innovations for tackling threats and advances inherent within the rapidly changing biointelligence and biosecurity landscapes.

 

FOR IMMEDIATE RELEASE

ODNI News Release No. 10-23

May 17, 2023

 

IARPA Pursuing Breakthrough Biointelligence and Biosecurity Innovations

 

WASHINGTON, D.C. – The Intelligence Advanced Research Projects Activity (IARPA) — the advanced research and development arm of the Office of the Director of National Intelligence — recently launched a program to develop new innovations for tackling threats and advances inherent within the rapidly changing biointelligence and biosecurity landscapes.

 

The Biointelligence and Biosecurity for the Intelligence Community (B24IC) program represents the Intelligence Community’s (IC) latest investment in research that pushes the boundaries of our biointelligence and biosecurity understanding and technologies. The resulting innovations could have far-reaching impacts, with the potential to develop new ways to collect, detect, analyze, and prevent traditional biothreats, while addressing possibilities and dangers associated with biotechnology. To address these challenges, the IC seeks to advance research across multiple biology sub-disciplines.

 

The program aims to create technologies that:

 

  • Enable biological material attribution and/or origination and new sensing modalities for austere environments and living systems;
  • Facilitate methods for improving biosecurity through cellular memory;
  • Lead to new capabilities to effectively and securely transfer biological data;
  • Detect and/or characterize highly-sensitive biomolecules and biological targets of interest; and
  • Strengthen digital and physical security of infrastructure, instrumentation, databases, and data associated with synthetic biology, biological samples, and biotechnologies.

 

“The rapid proliferation of biotechnology stands to pose new national security risks that the IC will need to counter and mitigate,” said B24IC Program Manager Dr. Michael Patterson. “B24IC could boost our approach to biointelligence and biosecurity far beyond our current understanding and years or decades into the future.”

 

Through a competitive Broad Agency Announcement, IARPA awarded B24IC research contracts to the following lead organizations, which together bring a group of nine academic institutions, non-profits, and businesses into the program:

 

  • MRIGlobal
  • Exodigm Biosciences
  • Quantitative BioSciences, Inc.
  • The Charles Stark Draper Laboratory, Inc.
  • Raytheon BBN
  • Georgia Tech Research Institute
  • Massachusetts Institute of Technology
  • Ginkgo Bioworks
  • Battelle Memorial Institute

 

The B24IC test and evaluation team consists of Los Alamo National Laboratory, Sandia National Laboratory, and the Naval Information Warfare Center Pacific.

 

The program is anticipated to run in two phases for a total of 24 months. Phase A will last nine months, while Phase B will be a 15-month effort.

 

IARPA invests in high-risk, high-payoff research programs to tackle some of the most difficult challenges of the agencies and disciplines in the Intelligence Community. Additional information on IARPA and its research may be found on www.iarpa.gov.

 

###

 

Digital Repression Growing Globally, Threatening Freedoms

As part of our ongoing transparency efforts to enhance public understanding of the Intelligence Community’s (IC) work and to provide insights on national security issues, ODNI today is releasing this unclassified IC product dated October 2022.

 

Download the report.

 

As part of our ongoing transparency efforts to enhance public understanding of the Intelligence Community’s (IC) work and to provide insights on national security issues, ODNI today is releasing this unclassified IC product dated October 2022.

 

Download the report.

 

About the National Intelligence Council:

 

The National Intelligence Council (NIC) plays a central role in coordinating intelligence products and is responsible for leading analysis across the IC to inform immediate and long-term policy deliberations. National Intelligence Officers (NIOs) serve as the principal subject matter experts to the DNI and national security decision makers on all aspects of analysis related to their regional and functional roles.

DNI Haines Statement on the Passing of Former Director of DIA Lt. Gen. Vincent Stewart

WASHINGTON, D.C. – Director of National Intelligence Avril Haines issued the following statement on the passing of former Director of the Defense Intelligence Agency Lieutenant General Vincent Stewart:

 

FOR IMMEDIATE RELEASE

ODNI News Release No. 9-23

May 4, 2023

 

DNI Haines Statement on the Passing of Former Director of DIA Lt. Gen.
Vincent Stewart

 

WASHINGTON, D.C. – Director of National Intelligence Avril Haines issued the following statement on the passing of former Director of the Defense Intelligence Agency Lieutenant General Vincent Stewart:

 

“It’s with a heavy heart that I share the news that we have lost a legendary member of the Intelligence Community family in the sudden passing of Lieutenant General Vincent Stewart. Vince’s smile filled the room, and his energy lifted up the spirits of everyone who crossed his path. In addition to his service as Deputy Commander of U.S. Cyber Command, many IC officers knew Vince from his leadership of the Defense Intelligence Agency (DIA), where he was an outspoken — and fierce — champion of the workforce and of shaping a diverse cadre of officers for the future.

 

“Vince came to the United States at age 13 from his native Jamaica and joined the Marine Corps after graduating from Western Illinois University, where he was part of the Reserve Officer Training Corps. He pointed to his experience as a platoon commander when he was asked about his enormous success as an intelligence officer. At DIA, he said that when he needed a boost of energy, he would walk down to the cafeteria to talk to the workforce, which was a guaranteed way to instantly feel like he was ‘ready to take on the world.’

 

“Today the world is a safer, better place because of Vince, and his legacy lives on in the many intelligence officers he mentored and recruited. On behalf of the Intelligence Community, I send our deepest condolences to his family. Vince once said, ‘I can’t stop believing in the promise of America because if the dream is not possible here, it’s not possible anywhere.’ We thank Vince for his 38 years of distinguished service, and we will do our best to live up to the challenge he set for everyone to ‘take real, specific actions to uplift others.’”

 

 

###

 

ODNI Releases 10th Annual Intelligence Community Transparency Report

The Office of the Director of National Intelligence (ODNI) today released the Annual Statistical Transparency Report (ASTR) Regarding the Intelligence Community’s (IC) Use of National Security Surveillance Authorities for Calendar Year 2022. The ASTR provides the public both statistics and contextual information regarding the scope of the government’s use of Foreign Intelligence Surveillance Act (FISA) authorities, National Security Letters, and other national security authorities. The report also provides insights into the rigorous, multi-layered oversight framework that governs the IC, which is designed to protect the civil liberties and privacy of persons whose information is acquired pursuant to these national security authorities. The release of this report is consistent with the requirement in the Foreign Intelligence Surveillance Act of 1978, as amended (codified in 50 U.S.C. § 1873(b)), and the IC’s commitment to the Principles of Intelligence Transparency.

 

 

 

FOR IMMEDIATE RELEASE

ODNI News Release No. 8-23

April 28, 2023

 

ODNI Releases 10th Annual Intelligence Community
Transparency Report

WASHINGTON, D.C. – The Office of the Director of National Intelligence (ODNI) today released the Annual Statistical Transparency Report (ASTR) Regarding the Intelligence Community’s (IC) Use of National Security Surveillance Authorities for Calendar Year 2022. The ASTR provides the public both statistics and contextual information regarding the scope of the government’s use of Foreign Intelligence Surveillance Act (FISA) authorities, National Security Letters, and other national security authorities. The report also provides insights into the rigorous, multi-layered oversight framework that governs the IC, which is designed to protect the civil liberties and privacy of persons whose information is acquired pursuant to these national security authorities. The release of this report is consistent with the requirement in the Foreign Intelligence Surveillance Act of 1978, as amended (codified in 50 U.S.C. § 1873(b)), and the IC’s commitment to the Principles of Intelligence Transparency.

 

This 10th anniversary edition of the ASTR includes a redesigned Executive Summary to enhance readability and public understanding. For example, in response to feedback received on last year’s report, FBI’s Section 702 U.S. person query statistics are shown in this year’s ASTR using a new methodology that more closely aligns with how other agencies count such queries. FBI’s data is also presented in a side-by-side format, showing statistics calculated under both the prior and new methodologies to enable meaningful comparison across years. The report also includes additional explanation of how the IC safeguards U.S. and other person information.

 

This report, along with previous ASTRs and additional public information on national security authorities, is available on www.dni.gov, www.intel.gov, and IContheRecord.

 

###

Annual Statistical Transparency Report Regarding National Security Authorities Calendar Year 2022

Today, consistent with the Foreign Intelligence Surveillance Act of 1978 (FISA), as amended (codified in 50 U.S.C. § 1873(b)), and the Intelligence Community’s (IC) Principles of Intelligence Transparency, the Office of the Director of National Intelligence released the 10th Annual Statistical Transparency Report (ASTR) Regarding the Intelligence Community’s Use of National Security Surveillance Authorities.

 

Annual Statistical Transparency Report

Calendar Year 2022

 

April 2023

 

 

Today, consistent with the Foreign Intelligence Surveillance Act of 1978 (FISA), as amended (codified in 50 U.S.C. § 1873(b)), and the Intelligence Community’s (IC) Principles of Intelligence Transparency, the Office of the Director of National Intelligence released the 10th Annual Statistical Transparency Report (ASTR) Regarding the Intelligence Community’s Use of National Security Surveillance Authorities.

 

Published every year since 2014, the ASTR provides the public with statistics and contextual information regarding the scope of the government’s use of FISA authorities, National Security Letters, and other national security authorities. In conjunction with other publicly released material, this report adds insight into the rigorous and multi-layered oversight framework governing the IC that is designed to protect the privacy and civil liberties of persons whose information is acquired pursuant to these national security authorities.

 

Read the Statistical Transparency Report Regarding National Security Authorities Calendar Year 2022.

"Digital Authoritarianism: A Growing Threat” at the Carnegie Endowment for International Peace

On April 24, Director of National Intelligence Avril Haines delivered remarks at the Carnegie Endowment for International Peace on “Digital Authoritarianism: A Growing Threat.” Following the remarks, Carnegie Senior Vice President for Policy Research and Director of the Europe Program Dan Baer moderated a fireside chat with the DNI. The full event is available to view here, and the transcript is below.

 

Carnegie Endowment for International Peace Event

Director of National Intelligence Avril Haines

April 24, 2023

 

On April 24, Director of National Intelligence Avril Haines delivered remarks at the Carnegie Endowment for International Peace on “Digital Authoritarianism: A Growing Threat.” Following the remarks, Carnegie Senior Vice President for Policy Research and Director of the Europe Program Dan Baer moderated a fireside chat with the DNI. The full event is available to view here, and the transcript is below.

 

 

MR. BAER: Good afternoon everyone, and welcome to the Carnegie Endowment for National Peace. My name is Dan Baer, and I'm the Senior Vice President for Policy and Research here. It's a pleasure to have you all here. Today we welcome you to a particularly special event. The Director of National Intelligence is not one of the cabinet officials who most often speaks publicly, and so we're very excited to have Avril Haines with us today.

 

For those of you who have not met Avril before, she has had a distinguished career in the U.S. Government in several administrations. She served she joined President Biden's cabinet as the seventh confirmed Director of National Intelligence. She served as the Principal Deputy National Security Advisor for President Biden, as the Deputy Director of the CIA, as a lawyer in the State Department, and many other things in her career, including independent bookstore owner, and Senior Fellow at Applied Physics Lab.

 

So, she's had a storied career, and as somebody who got the pleasure of working with her, I can tell you that she is as kind as she is smart, as gracious as she is committed to principles, and it is a real joy to work with her. And Avril you have the stage.

 

 

DIRECTOR HAINES: Thank you so much, Dan, for that ridiculously kind introduction — it is such a joy to get to see you and to know that you are part of leading this wonderful institution.

 

I also want to thank President Tino Cuellar for inviting me to speak today and to extend my gratitude to the wonderful experts who reside at the Carnegie Endowment for International Peace and whose work has — for years — been enriching our analysis and thinking in the Intelligence Community on the many challenging issues that we face as a country.

 

Speaking as a civil servant in government who has had the chance to see first-hand how important the intellectual exchange is that occurs between government and entities like Carnegie Endowment, I cannot tell you how grateful I am for your work.

 

Many of you challenge our thinking and work to ensure that we are focused on what matters and not missing the broader strategic picture as we manage urgent crises. And many of you have been or will come through government, having had a chance to think things through from the outside, without the standard constraints to which we are subject, to make us better.

 

The Intelligence Community, in particular, benefits from such collaboration because we are trying to understand and reflect on the world around us and in doing so, we look to bring rigor, expertise, evidence to bear on our analysis, as all of you do. We recognize, however, that the classified nature and pressure of our work can make us susceptible to insular thinking and cognitive biases. And, as such, our interactions with those outside the community who can test our hypotheses and better inform our work are crucially important.

 

So this leads perfectly into our topic for today — digital repression — an issue for which it is critical to have a wide range of perspectives both in and out of government not only for purposes of understanding the landscape but also to address the problem.

 

And people like Dan and Steve, who literally wrote the book on digital repression, all of you and so many others at Carnegie and other organizations, such as Freedom House, and even in the private sector, have contributed to our thinking on these questions — each of you with different expertise, experiences, information, and perspectives that are fundamental to understanding the landscape.

 

And you all have helped us to focus in on an aspect of a problem that does not, at least in my view, get enough attention. Specifically, the degree to which new technologies, institutional, legal, and organizational approaches to digital repression being deployed by authoritarian governments and exported to other countries are advancing authoritarianism and undermining democratic governance globally.

 

And I realize that for some it may seem strange to have a leader in the Intelligence Community discuss this topic but I actually think it is crucial that we lend our voice, our analysis, and perspective to this issue — making clear the distinction between the work of an intelligence service in a democracy versus an authoritarian state.

 

And while intelligence services in authoritarian countries are often used as tools of the state to enhance digital repression under the direction of their rulers, in democracies they are subject to democratically passed laws, have internal and external safeguards in place, and ultimately are held accountable to oversight mechanisms that work to ensure we remain legal, ethical, and focused on providing the best intelligence to help decision-makers in our government make better national security and foreign policy decisions while being protective of people’s civil liberties and privacy.

 

And, in my view, the Intelligence Community is a critical ally in the fight against authoritarianism and should contribute to the promotion of norms that help to protect against the primary tools of digital authoritarianism, which are censorship, misinformation and disinformation, mass surveillance, and invasive spyware used to suppress public debate.

 

We have a unique perspective, as well as an understanding of state actors and even security services, that can enhance our capacity to reveal structural norms or approaches that might support the resilience of open information environments in democratic societies.

 

But let me back up, and explain why we are so focused on this issue, which I see as a critical threat to our national security. As the President often says, the struggle to bolster democratic governance at home and abroad is the defining challenge of our time, as it remains the best way to realize lasting peace, prosperity, and human dignity.

 

And the President, the Congress, democratic leaders around the world are pursuing efforts to strengthen democratic resilience through such means as funding to support the rule of law, human rights, good governance, civil society, pluralistic political parties, independent media and free and fair elections.

 

Such efforts are also — rightly in my view — beginning to include democratic assistance that promotes not only political freedoms but also efforts to counter the indignity of corruption, inequality, and a lack of economic opportunity, as Administrator Power and Secretary Yellin recently noted, are also fundamental to strengthening democracy.

 

Perhaps one of the most challenging aspects of the problem, however, is the contest over information, which is defined by the increasing use of digital technology to promote authoritarianism.

 

Today’s digital technologies have profoundly shaped access to information. Initially, such technologies were instrumental in facilitating civil society and freedom of the press in many places and yet, they sparked a backlash from authoritarian regimes, first to contain the risks posed by freer flows of information and to harness these same technologies in pursuit of broader objectives, including to stifle freedom of expression and to suppress political discourse.

 

And today, we assess that foreign governments are increasingly using digital information and communication technologies to monitor and suppress political debate domestically, as well as in their expat and diaspora communities abroad.

 

And as these technologies, capabilities, policies, and mechanisms are exported and implemented in various countries or territories, they make it that much harder to bolster democratic governance and easier for authoritarians to prevail.

 

Moreover, the use of these technologies and methods to monitor and limit dissent are on a trajectory to become even more pervasive, targeted, and complex in the next few years, further constraining freedoms globally. For example, generative Artificial Intelligence will only increase the sophistication that such regimes can use to deploy such tools, making them that much more difficult to counter.

 

So what I want to do is talk about the Chinese, Russian, and Iranian models, describe certain structural aspects of these models and methods that are being exported, and talk about how we might approach creating greater resilience in societies, so as to mitigate the impact of these models and methods with the ultimate objective of really promoting greater resilience in democratic governance.

 

And, to that end, it probably doesn’t come as a surprise to any of you that authoritarian regimes are the biggest drivers in advancing their control mechanisms. Authoritarian leaders often fear how open debate of political or social topics could jeopardize their hold on power.

 

These leaders’ worldviews are often clouded by paranoia and an overarching concern with regime preservation, internal control, and stability.

 

And the history of this trend dates to when some authoritarian regimes grew concerned about the implications of the internet early in its usage, and then the Arab Spring uprisings served as a turning point, when authoritarian governments came to recognize that their publics’ digital connectivity posed an existential threat to their grip on power.

 

Autocrats’ beliefs that Western governments, particularly the United States, have been using the Internet’s influence to undermine their regimes’ stability, alongside the increasing number of public protests around the world, have exacerbated these fears.

 

And the People’s Republic of China or “PRC” is the global leader in digital repression. In fact, for the 8th year in a row, Freedom House identified China as the country providing the least Internet freedom.

 

Compared to Russia, Beijing is better at censoring digital information and surveilling the population, in part because they prioritized digital controls before Moscow did.

 

And the PRC seeks to preempt challenges to its rule by demonstrating its responsiveness, eliminating dissent, and remolding society to achieve China’s “national rejuvenation.” In many ways, the PRC’s extraordinary use of digital repression tools are presented as features, rather than bugs.

 

Beijing uses digital repression techniques to control the flow of information, to downplay and disrupt its citizens’ access to information highlighting domestic shortcomings, and try and reinforce the PRC’s legitimacy as well as its all-encompassing reach. And China’s willingness to share its know-how and export its technology far beyond its borders is a key enabler of transnational repression, even as it makes it easier for other governments to engage in digital repression within their own borders.

 

Furthermore, China’s smart cities use surveillance technology to combine the provision of basic public goods, such as traffic safety, with the projection of authoritarian control.

 

The PRC is furthermore the world’s leading perpetrator of transnational repression, often through digital means.

 

News reports of Chinese transnational repression have become all too common, much of it under the auspices of the PRC’s Operation Fox Hunt — a purported Chinese global anti-corruption effort.

 

And in fact, last week, the US Justice Department charged PRC police officers, for wielding thousands of fake social media accounts to spread Chinese propaganda and harass dissidents living in the United States.

 

And next is Russia, which is also a leading perpetrator of digital repression but it takes a different approach than China, relying heavily on complex legal and institutional structures that promote its control over information and, as you undoubtedly have noticed, Russia is particularly active in spreading disinformation.

 

Notably, since the start of Putin’s unjust and illegal invasion of Ukraine, Moscow has employed a full spectrum of malign influence activities to defend its actions, seed doubt with respect to news about what is happening on the battlefield that undercuts Russia’s narrative, and amplify false, misleading, or unsubstantiated narratives to undercut Kyiv and the West.

 

The Russian people are subjected to the sixth least free Internet environment in the world, and Internet freedom reached an all-time low in Russia last year in conjunction with Russia’s invasion of Ukraine, as the Kremlin blocked social media sites and more than 5,000 websites in Russia and introduced a law prescribing up to 15 years in prison for anyone who spread “false information” about the conflict.

 

Moscow’s efforts to force foreign IT giants to abide by its content moderation requirements increased in 2022 as Google, Meta, other firms received fines worth hundreds of millions of dollars for not filtering “banned content.”

 

And this increased targeting of non-Russian platforms, has resulted in increased self-censorship, and in some cases, a full departure from the Russian media space.

 

Efforts to remove non-Russian media have been accompanied by the expansion of Kremlin-aligned media corporations, including the acquisition by social media giant VKontakte--which runs Russia’s most popular social network and is effectively state-controlled--of major Internet and technology firm Yandex, which is, among other things, a news aggregator, giving the Kremlin greater control over the content that Russian citizens encounter online.

 

And the Russian government paired this action with policies that pushed out independent media and social media platforms for fear of prosecution or employee safety concerns. In January 2022, Moscow began requiring foreign IT and media companies with more than 500,000 daily Russian users to maintain staff in local offices and expected the companies to restrict information that violated Russian laws.

 

The Russian government then encouraged Russian companies to create indigenous platforms to replace foreign social media companies allowing for increasing control over content.

 

Russia also undermined internet freedom in Ukraine; the Russian military in 2022 subjected Ukrainian cities and oblasts to 22 internet shutdowns through a combination of cyberattacks, targeted air strikes, and deliberate dismantling of telecommunications infrastructure.

 

Last September, public researchers discovered a Russia-based influence operation in Ukraine that managed more than 60 websites impersonating news organizations and had accounts on major U.S. social media platforms.

 

Finally, Iran for several years has been imposing increasingly sophisticated internet shutdowns to stop protests. This was particularly evident in the monthslong protests across the country following the death last September of 22-year-old Mahsa Amini in police custody, and brought Iran to an unprecedented 18 shutdowns in 2022.

 

And Tehran has also shown a willingness and capability to expend its repressive activity outside its borders, as evidence by the U.S. Department of Justice’s recent charges against Eastern European criminal organization members hired by the Iranian Government to surveil and murder a human rights activist who has criticized the country’s treatment of women.

 

And I’ve gone through briefly the approaches taken in these three countries to achieve digital repression both in and outside of their borders to give you a sense of the different models, but, as I noted at the outset, authoritarian regimes are not the only governments conducting digital repression — and this is particularly concerning, as it is the key battleground for the competition between democracies and authoritarians.

 

We are seeing more and more instances of other countries engaging in digital repression and their adoption of these approaches is in turn contributing to further democratic erosion.

 

For example, we see other countries increasingly using the tactic of internet shutdowns. In fact, last year, governments and other actors shut down the internet at least 187 times in 35 countries, which was a new record.

 

Shutdowns were imposed during protests, active conflicts, school exams, elections, periods of political instability or high-profile events, such as religious holidays or visits by government officials, with in many cases the goal of imposing and silencing voices.

 

We also saw a record number of governments block websites with nonviolent political, social, or religious content, undermining users’ rights to free expression and access to information.

 

And the use of commercial spyware is also on the rise, which in the past year journalists have estimated is a $12 billion dollar business.

 

While some states use such spyware tools and lawful intercept programs for legitimate purposes such as to target criminals or terrorists, governments are increasingly using spyware, along with legislative efforts that provide a basis for doing so, to target political opponents and critics.

 

And, furthermore, a growing number of internet users around the globe only have access to an online space that mirrors the views of their government and its interests — but this phenomenon is not restricted to China, Russia, and Iran. Authorities in 47 of the 70 countries covered by a recent research study limited users’ access to information sources located outside of their borders.

 

We also see, even where China is not intentionally exporting its approach for purposes of extending its digital repression efforts that they are making it easier for others to engage in such activity and ultimately may use their access to further their efforts at transnational repression.

 

For example, the Internet of Things is projected to reach 64 billion devices by 2025 and possibly trillions by 2040 — all potentially monitored by various governments. This growth is connected to smart city initiatives, which are using emerging technologies to improve the ability of city leaders to leverage public resources to boost the overall quality of life and while at the same time creating vast amounts of data.

 

China also has a comparative advantage in the global export of facial recognition AI. Autocracies and weak democracies are more likely to acquire this technology from China than from other countries, and they are more likely to import this technology from China when they are experiencing periods of political unrest.

 

In short, these technologies offer new possibilities for tracking and intimidating dissenters, monitoring political opponents, and preempting challenges to government power that are hard to resist without the legal, institutional, and cultural structures that we rely on in our own country to help us avoid such abuses.

 

Moreover, Chinese companies, which are subject to Chinese laws that provide the government with access to their information, are leading providers of technology in a number of countries where Freedom House has highlighted that democracy is backsliding.

 

And, often, such companies are able to offer lower cost solutions that these governments are ill equipped to regulate or operate. And access to the data that is being collected and will increasingly be collected, as these technologies continue to emerge and spread, will enable authoritarian leaders to more effectively monitor populations and potentially manipulate, control, and exploit information based on the insights gained from the data.

 

As I noted at the outset, the President, the Congress, and Democratic leaders around the world are together mounting an effort to promote democratic governance and counter the risks posed by the technologies I have discussed today but significant work remains and what is clear is that, to be successful, a whole of government effort that includes not just the traditional public and private sector actors, but also the Carnegies of the world, is really needed.

 

The tools will have to be varied, to address the range of structural issues I have outlined. This is where I think our partnership can be most useful.

 

President Biden, for example, recently signed an Executive Order prohibiting US government use of commercial spyware that poses risks to national security and has supported Secretary Raimondo’s efforts in this arena, as she has aggressively pursued the use of export controls to hold companies accountable that develop, traffic, or use technologies to conduct malicious activities that threaten the cybersecurity of members of civil society, dissidents, government officials, and organizations.

 

And together, we need to build on what has been done to improve the resilience of countries to resist digital repression in all its forms.

 

We, in the Intelligence Community, alongside the private sector and research institutions, can help to create greater awareness regarding the types of technologies, as well as the institutional, legal, and organizational approaches being used to engage in digital repression.

 

And in doing so, we hope to highlight areas where normative frameworks might be developed by experts and policymakers in and outside of government that preserve to the greatest extent the promise of such technologies to support freer flows of information, more timely and cheaper communication, as well as smart technologies that improve the delivery of services and even protect the environment or promote our health, while nevertheless guarding against their use for digital repression.

 

We hope to prompt thinking on technical standards and design approaches that promote not only cybersecurity and appropriate law enforcement and intelligence activities, but also democratic governance, freedom of expression and political discourse.

 

Even data management approaches that recognize the dangers associated with the extraordinary collection of information that happens on a daily basis in our world today. And model laws and organizational structures that make it harder to engage in digital repression.

 

And we need to move with urgency. During the coming years, we can expect that governments will grow more sophisticated in their use of existing repressive technologies and will learn quickly how to exploit new and more intrusive technologies, particularly automated surveillance and identity resolution techniques.

 

The multifaceted challenge of adversaries suppressing information environments cannot be solved by government alone. Digital repression and foreign malign influence are whole-of-society challenges, and we can no longer operate on parallel but distinct tracts. I think now is the time for partnership.

 

If you believe as I do that this is an urgent challenge, we must work together to protect the integrity of our own democracy, and democratic societies around the world.

 

Thank you for your time, I look forward to your questions and for the opportunity to talk to Dan.

 

 

MR. BAER: Thank you very much for those illuminating kick off remarks, and now you get the hard part. And for those of you who are in the room, or watching online, online you should be able to submit questions on your online platform, and if you're in the room there should be QR codes that were around the room that will allow you to submit questions, and then they will magically show up on my iPad, so when we get to that part, I'll be able to turn to them.

 

So, I wanted to start where you started, which is the unusual nature of the speech that you gave, because we're not actually used to having people from the Intel Community, or certainly not the leader of the Intel Community sounding the alarm in a way. And I guess I wonder why you're giving that speech, rather than say Secretary Blinken, or somebody who is more usually at the front of a public address about a foreign policy, or a security policy issue?

 

DIRECTOR HAINES: Yeah. Thank you so much. And look, it's great to actually be here with all of you. I will say I mean to be fair, Secretary Blinken does give those comments, you know, as does the President and everybody else. I think it's important for our voice to be heard on this too, to make it clear that it's not just the, you know, foreign secretary in a sense that cares about this issue, but it's also the security services that care about this issue.

 

And I do care deeply about this issue. I first of all, really believe it is a national security threat, and if you looked at our Annual Threat Assessment, we for the first time, have a whole section on digital trends of authoritarianism. So that is something that we're highlighting.

 

But it's also, it's a place where I think we uniquely can bring analysis, insight into essentially how it's happening and what the challenges are, so I believe that that's something we should be doing more generally.

 

But I also want to make clear that there’s a real distinction between intelligence services in a democratic society and one in authoritarian. And there are, you know, structures around that. And that doesn't mean that, in other words, we should be having the conversation where people have concerns that it is creeping into our own system.

 

And that's something that needs to be on the table as well at the same time that we're talking about how does this happen, and how can we all move forward in a way that's actually going to counter what we're seeing and that we have a concern with. If that makes sense, yeah.

 

MR. BAER: If you had to, I mean that makes sense for why you're speaking out. If you had to kind of analyze the timing of the warning, you described actually two kind of broad trends. One is about geopolitics, and the frame of democracy versus authoritarianism, but really really this is a challenge of rising authoritarian powers one could say, and the moment that we're living in. That's one trend.

 

The other is the progress of technology, and the evolution of kind of the next wave of digital technology, the kind of post internet, or building on the internet set of technologies, whether those are AI, or smart cities, internet of things.

 

The timing of your kind of alarm cry, is that driven more by geopolitics, or more by as somebody sitting over the intel community seeing around corners and saying gosh, there's something that's about to hit us like a wave, and we need to we're not there yet, we need to be ready for this, or be more thoughtful about how we're encountering it.

 

DIRECTOR HAINES: Yeah. So, I'd say it's a combination, not surprisingly. But here's what I think is really intensifying in this moment that makes it so critical. If you look at a combination of the pandemic, right, which basically both put an emphasis on tracking data of individuals who had contact with, et cetera, like all of us engaging more through digital means, right? It sort of pushed society into that space where there was increasing amounts of data that was available publicly about all of us in many respects, with the extraordinary trend of digital technologies, of emerging technologies, right?

 

Where, you know, we talk about the trajectory for the internet of things, which is obviously, you know, enormous as I've indicated in my remarks. But that combined with a whole series of other types of technologies like spyware and so on that are becoming commercially available, that are cheap, that are easy to get, so that you can really engage in digital authoritarianism at scale, right?

 

And then you look at how it's not just being engaged in its scale by sort of the classic authoritarian countries that you're used to looking at it, but what you're recognizing is that there's a kind of an export of these structures. And really, you know, from my perspective in addition to obviously them wanting to sound the alarm, put forward what the threat is, and to try to analyze it, I think part of what I'm hoping to do is to set up for a better conversation about how we can create greater resilience for it.

 

Because I think part of the challenge is that you sort of say okay, well you know, there may be some places where a China or Russia is looking to export this technology, so that they can engage in transnational repression, or so that they can help a leader that they want to have, you know, remain in power, to sort of control their own information environment.

 

And that is certainly, you know, one way in which it might occur. But it's also the case that you now, as a leader in a country, can basically purchase a lot of these tools, can see the model that's being used in, you know in a China or a Russia. Decide how it is that you want to apply it in different spaces.

 

And, I think unless we start to understand the structural changes that are happening here, and how that scaling works, and how it actually can be so pernicious, then we're not going to be able to create the norms and the frameworks, the technology standards, the export controls, all these tools can be brought to bear to actually help us to promote greater resilience in our societies.

 

MR. BAER: You mentioned that President Biden recently signed an executive order barring the use of spyware. Is that putting is that trying to hold back the tide in some way? I mean is the value of something like that more symbolic in that it does signal the need for kind of a normative development, instead of kind of institutional approaches to this, than it is on its face for the specific bar?

 

And then also, a second part of that question, is also that action won a lot of praise from the human rights community, from the civil liberties communities, but it did it have blow back from partners who make that kind of technology, or who want to use that technology maybe for legitimate purposes?

 

DIRECTOR HAINES: So, just to answer the last question first. Like I've had no counterpart, for example, say to me, you know, this is a problem, or this is an issue. You know, the EO, or to disagree with it in any way. And I think it is more than symbolic I would say, but I do think that part of what it does is, as you say, set the standard.

 

And you know, if you think of, if we think that norms is a, you know, a space that we want to move into in this area right, that we want to create some norms that give us kind of a framework through which to look at what's acceptable, and what's not. In a way the predicate is agreeing on what the norm should be, right?

 

Like on what is the space that is acceptable to occupy for legitimate purposes, and what isn't acceptable? And part of what the President is doing in a scenario like that is actually sort of kind of mapping out that space, right? Instead of saying here is something that is unacceptable, and we want others to join us, and in the context of the democracy summit others joined.

 

And you know, and I think it's starting to promote that more generally, then creates a standard that we say okay, we'll that's not okay, and then there is a kind of a, you know, all of the things that can happen afterwards through policy means to begin to backstop that in a way, and make it more challenging for folks to engage in it.

 

MR. BAER: As you think about, I mean that's one specific set of technologies.

 

DIRECTOR HAINES: Yeah.

 

MR. BAER: You mentioned, I'd be remiss given the moment that we're living through, if I didn't talk about AI, and you mentioned generative AI in your remarks. You know, given the breathlessness of the commentary that any of us have read in the last few months about how AI is going to change everything everywhere all at once, how do you, sitting on top of the Intel Community, choose what to focus on? And have you identified anything that you think is, or any set of things, bullet points, that you think are the real risks that are emergent from AI, or is it too soon to tell?

 

DIRECTOR HAINES: Yeah. I mean, you know, the first thing is you're right. Like there's no way I can sit here and say I understand all of the implications of generative AI for the Community, let alone the world. What I do think is true is that with generative AI and the other emerging technologies that we're seeing, it is making it easier to be surprised by significant developments.

 

And in a way, that's a big part of our work, is indications and warning, right? And we're sort of trying to make sure that we can provide policy makers with some sense of what's likely to happen that is meaningful and important for them to be focused on in order to address major national security and foreign policy issues.

 

And this makes it more challenging. The one thing I can say in this space is it is going to make it easier, right, for basically authoritarian governments, others who want to engage in digital repression, to do the job. And I'll give you just one example. I list in my remarks a whole series of different tools that are part of digital repression that we identify, right.

 

And misinformation and disinformation is obviously one of them. And there's just no question that with generative AI you can be far more sophisticated in your production of misinformation and disinformation. That's already obvious, right? That is going to make it harder to counter.

 

And it's critical, obviously, for us to be able to do that as effectively and on a timely basis. Well maybe, generative AI will also give us some tools to counter it. But I think it is, you know, just increasingly complex an environment for us to keep on managing the degree to which things are developing, and we're trying to counter them.

 

And so, having kind of broader frameworks that we're able to stick this into, and you know, is sort of a consensus on what is acceptable and what's not, will be increasingly important, I think.

 

MR. BAER: Are you worried about, I mean most of your remarks were kind of global in nature and looking at things that are happening around the world, but obviously we know that Russia, in particular, and China have both engaged in what we would what we used to call information ops in the United States.

 

And are you worried that the United States, especially we're going to have an election next year, in the run up to those elections, are we prepared enough for the new capacities that are provided by AI for misinformation, disinformation?

 

DIRECTOR HAINES: Yeah. I mean this is an area, obviously, we spend an enormous amount of time on is trying to protect from election influence and interference. And I do think that it's going to be possible, obviously, for foreign actors to engage in more sophisticated kind of misinformation and disinformation campaigns.

 

But we are working very hard to continue to try to be on the edge of it, so that we're able to warn the American public as appropriate, and we do this through really the law enforcement leg, FBI, and then also through DHS, Department of Homeland Security, that's really on the front lines of this.

 

MR. BAER: Russia and China and Iran figured in your remarks, but out of the examples you gave with respect to Iran, we're more focused on Iran's use of digital repression domestically. Russia and China both have more obvious examples of where they've used it beyond their borders.

 

And I was struck by the distinction, what I heard of the distinction, maybe you'll correct me, that it seems like while both use both types of digital repression, that Russia is much more focused on disinformation, misinformation, control of information, whereas the Chinese model is much more built into technology and surveillance. And how do those two kind of different strategies change the way that we have to think about how to respond?

 

DIRECTOR HAINES: Yeah. So, it is true that we see that China is more sophisticated from a technology perspective and censoring and so on. And as I mentioned, partially because they just started earlier. They prioritized it at an earlier point.

 

Russia, even culturally, it tends to be quite legalistic in their addressing issues. And they've created this incredible organizational structure, their digital ministry, they have, you know, you have to basically get a license, and put forward bandwidth requirements, and all sorts of things that give them the capacity to manage what's happening.

 

And you know, and they've put a series of laws. This isn't to say that China doesn't have laws on these issues that are also intended to facilitate the work that they do. They do. And also, as you point out, Russia has technology as well, and is deploying it to effect.

 

They do tend to engage more in the disinformation space than China, but that doesn't mean again that there isn't overlap and works. What I would say is useful about thinking about this in different ways is as follows. Like each of them have a slightly different model for how it is they approach it. Even technically, they have slightly different models. And I think part of what I'm hoping is useful is that as we try to lift this up, so that people understand what the model is, then frankly, you know, folks at places like the Carnegie Endowment, and you know, and research institutions in our policy community and so on, can begin to think through how do we counter that particular model.

 

How do we deal with this particular type of issue, and how can we create norms, for example, that make it harder for other societies to essentially adapt it wholesale, right? And in part, it could be a technical issue, right? It could be that you're developing a standard for how, you know, and I mentioned data management, right?

 

Like how do you store data? And what are the restrictions around data? And what are the sort of technical ways in which you might do it, you know, homomorphic encryption, or other types of things that might help to protect the privacy of data and make it harder to bring things together in a way that would allow you to use tools that could engage in repression.

 

But part of it can also be, you know, in ways that we have privacy and civil liberties officers in each of our services, right, that we have, you know, a variety of institutional structures that help to promote certain aspects of our systems that we think are important, or values or principles. Those are also things that matter.

 

And I've seen over the years, I think you know, I sort of feel like I went into law thinking this is many, many years ago, obviously, decades, but in any event, believing that law was the way to change society. That you know, I sort of watched the civil rights movement and other things, and saw how critical it was to society, and to our capacity to change.

 

And I feel as if the older I've gotten the more I recognize the cultural in soft law, and institutional issues are actually absolutely critical, if not more important at times, to actually producing change. And I think those are important too, and it's the structure that's being used to engage in digital repression, not just the digital technologies that are important to this picture.

 

MR. BAER: One of the I wonder whether you've gotten any pushback. You've mentioned several times the export of these technologies, and I would say those technologies, these specific technologies aren't the only technologies that are being exported, and obviously the export of technology is essential to economic development in key parts of the world.

 

We had a conversation in line with the spring meetings of the IMF and World Bank here about digital public infrastructure, and the way that digital public infrastructure has expanded banking to many millions, hundreds of millions of people in India, and has the promise to do so elsewhere in the world.

 

I wonder whether you've run into this challenge of how you get the benefits of the export of technology, while also being mindful of the risks of, you know, large scale consumption of Chinese technology that may have back doors, or that kind of thing? DIRECTOR HAINES: Yeah.

 

MR. BAER: How are those conversations with partners who are I guess in good faith, trying to square the circle, and both harvest the benefits of technology for the population, and also be mindful of the risks?

 

DIRECTOR HAINES: Yeah. Absolutely. Because I do think this is one of the challenges. You know, as I look to the next ten years, it strikes me that, you know, we are going to have smart cities, right? We are going to be collecting more data.

 

It's going to be easier to access it in many respects, right, and the question is how do you manage it in a way that provides you with some sense of security or capacity to, you know, not see it manipulated for elicit and unacceptable purposes. And so, you know, thinking through how do you design export control regimes, or other forms of tools that allow you to manage this in a way that give us the benefit, but without, you know, some of the harms is obviously the 64-million-dollar question.

 

And I am happy to say that in the Intelligence Community, we are not responsible for solving that one. But I will say, I mean it is, you both have licensing regimes, right, that say we are fine with you getting this type of technologies, so long as you comply with the following requirements, right?

 

And you just have to report on a regular basis that you're doing so, or you know, we have a monitoring capacity, or we have ways to sort of check on issues. So that is sort of one form of addressing that kind of an issue, right? The other is to say that you have to build interior design, right?

 

We have a lot of building into our design for cybersecurity that we're trying to promote. We should also be doing it for democratic resilience in a sense, right? There's ways to do this to try to promote whatever the principle is in the sense that you're looking for. It's not to say that it isn't complicated or there isn't transaction costs as a consequence, all those things, but that has to be factored in.

 

MR. BAER: I'm going to ask a couple more questions, and then turn to audience questions, so if you have a question please feel free to submit it now. I would be remiss if I didn't give you some harder questions before letting you go. But one of them is about TikTok, because that's another issue that is often in the news these days.

 

And I have read the polling data that suggests that banning TikTok is hugely popular actually, with American voters. I suspect, that has more to do with parents being concerned that their kid's brains are being turned to mush, than it does with national security concerns.

 

But I wonder if from a national security lens, whether the Intel Community has made any recommendations, either to the oversight committees in Congress, or to the White House about whether or not some sort of ban, and I understand there are Constitutional questions, but some sort of ban on TikTok makes sense from a national security standpoint? And there are specific national security concerns with it?

 

DIRECTOR HAINES: So, we do threat assessments, which obviously we provide to the Congress, and to the Executive Branch on these kinds of issues. And typically, when we're looking at platforms like TikTok, or other things, what we're trying to look at it is basically their capacity to collect data, and then who has access to that data.

 

And what might that data be misused for essentially in the context of any particular, you know, scenario, national security or otherwise. And that is certainly something on which we've done, and of course, you know, the President has directed a ban workspaces for the U.S. Government with respect to TikTok, which we're implementing, and that is yeah, pretty much.

 

MR. BAER: Where you are?

 

DIRECTOR HAINES: Yeah.

 

MR. BAER: Okay. Last question, which is a two parter, which is first of all did you think before giving this speech today, or before deciding to publicly weigh in, that there might be some downside risks to the U.S. Director of National Intelligence getting up on a stage and talking about how the world should be concerned about digital tools, and how they might be used?

 

Is there a risk that that gets thrown back at you, or at the U.S. Government? And the second piece of that, is the second piece of kind of self reflection is obviously, the Biden administration got a lot of well-deserved praise in the run up to the Ukraine War, about the way that it systematically declassified intelligence, and shared it with partners and allies, and indeed with the general public in order to make people aware of what was about to happen.

 

More recently we've seen news about unauthorized release of classified intelligence, and I wonder how that has spurred reflection on your part, and your colleague's part about the balances between classification, compartmentalization, and making sure that people have the tools that they need to do their work.

 

DIRECTOR HAINES: Boy that's a lot in two questions. Okay. I'll deal with the last one first, and then the first one. So, it's very challenging to talk about the unauthorized disclosure because there's an ongoing criminal process right now, legal proceeding.

 

But what I can say is I think it is first of all just deeply depressing whenever one of these things occur for the folks in the Intelligence Community. I mean many of us work our butts off so to speak. You know, just trying to protect our information in an appropriate way. And so, seeing this stuff, you know, which may or may not be right there, in any form or any suggestion of this kind of a leak is just very frustrating.

 

So I just tell you that, yeah, how challenging it is for many of us in dealing with this. I think we will always in any scenario, in any incident that occurs, learn lessons once we understand what happened, and ensure that we try to do a better job protecting our information moving forward.

 

It is also the case that in these scenarios what I think we all try to do is learn the right lessons, and then not over torque as a consequence of, you know, an incident. And what I mean by that is to try to promote better practices, while at the same time not undermining our capacity to do appropriate sharing, and you know, and engage in our mission.

 

And I think, you know, during the course of the Ukraine conflict, as you know, we went through a very careful process for ourselves to try to ensure that we could disclose as much information as we thought we could while still preserving essentially our sources and methods.

 

And I think that was an appropriate thing to do. There is always risks that comes with that, but I think there's also the benefit it can have for national security and foreign policy, and that's, of course, what our ultimate mission is. So, in trying to work this through, I think we'll just try to continue to approach it in a measured way.

 

It sort of comes back to the first question that you asked though. I mean I think, you know, I obviously believe in the works that we do. I think an Intelligence Community is incredibly important to the security of the country, and to ultimately countering authoritarian aggression as we saw on the Russia invasion of Ukraine, right?

 

And of course, an Intelligence Community engages in, you know, spying right? But we have to do it in a way that is consistent with a very robust legal framework, and we have to be accountable to that, and we have to be in my view, as transparent as possible when we make mistakes, and ultimately be held accountable for those mistakes, so that we can continue to work in a way that promotes national security, but at the same time, promotes the other equally important values that we hold as a country in our work.

 

So it is, you know, I think there's always a risk of embarrassment when you go out in public, and I am particular am crappy at it honestly, but you know, I think it's an important place for our voice to be heard, because I think it's part of trying to again draw the distinction between when you do this the right way, versus when you do this the wrong way. And I want us to be helping to lead the charge in a sense, encountering this.

 

MR. BAER: My colleagues should know that my screen is blank right now, so if it needs to be fixed, please fix it. In the meanwhile, I'm going to continue to ask questions that I have for you. I wanted to walk about the democracy versus authoritarianism frame, which is one that Joe Biden led with at the beginning of the administration.

 

There's been some conversation I would say, in the last year. I have detected more conversations suggesting that the frame is not useful, or that there's too much of the world for whom it doesn't resonate. And that actually find that a way of U.S. demanding that people choose sides.

 

And I wonder whether you think the frame holds up. Obviously, you used it today, and you can use it one can use it as an analytic frame without using it as a kind of public diplomacy frame. And I wonder whether you think whether you would continue to recommend it as a public frame, or whether it's really only an analytic frame from the utility standpoint?

 

DIRECTOR HAINES: I mean it's more of a policy question, so in some ways it's hard for me to answer. But what I would say is that I do think that we've seen the narrative, for example, from China shift a bit in the context of even in the last few years where a few years ago it was more of we're presenting another system that is more effective in contrast to your system in a way.

 

In other words, our system is functional. Our system delivers results. Yours is a bit of a mess, and kind of that being the sort of intellectual narrative in a way that was being presented, and a bit of that has shifted towards we have an alternative path. Still with some of the same features, in other words we can deliver, but not framing it as authoritarian versus democracy.

 

And to your point, and perhaps that is because they see that as being, you know more compelling, and yet at the same time when you look at their, you know, sort of best friends, BFF, document with Russia, it's remarkable how much democracy and sort of, you know, their promotion of an international system that sounds very much like what we're promoting, but isn't, you know, is sort of part of the structure that they're pushing forward.

 

So I don't pretend to know what's the right answer from a policy perspective, but I think these are questions analytically that are important for us to understand, yeah.

 

MR. BAER: Great. We now actually have audience questions. The first one I am going to pass along is how concerned are you about the U.S. private sector, particularly the tech sector, that they may not be fully cognizant of some of the risks that their own tools could be manipulated, or misused to nefarious ends?

 

And do you have worries that they aren't aware of the trends that you are identifying?

 

DIRECTOR HAINES: So, we have been trying in our sort of normal way to engage with the private sector to better understand what they're seeing, and honestly in many scenarios they see things before we do because they have the first sort of basis of information, you know.

 

And so, I am I guess the answer is in part they sometimes see things before we do, and we need to learn from them. But in part, I think it is true that they don't necessarily put it into the broader context, which is something we can do, and help them to actually discern from the information what's happening in certain spaces that may be useful.

 

And I think again, you know, as I tried to outline in the remarks, I really think this is an area where you actually need so many different parts of society to engage together in order to put the whole picture together, so that you can actually understand what's happening.

 

And I think that's, you know, an important conversation for us to continue to be having, basically.

 

MR. BAER: There's a question here about the challenges that face democracies with respect to kind of the broad set of issues that you've identified, and that we've seen an increasing trend, one would say, in countries that we've referred to as democracies, taking steps that would chill free speech, that would enhance surveillance without sufficient safeguards.

 

There was obviously at the Summit for Democracy, a declaration on the future of the internet, which was kind of a step towards identifying a normative framework. But how concerned are you about kind of backsliding in democratic partners with respect to these techniques in particular?

 

DIRECTOR HAINES: I am. I mean, you know, as I focused in I think one of the key pieces of the puzzle that doesn't get as much attention is this space, right? In other words, there's a fair amount of attention on what China and Russia are doing in their countries to manage information, right?

 

And it's useful to unpack the model, but part of what I'm really trying to help people focus in on is how that model can be used in various forms, or in various variations, essentially in other spaces. And what I think is sort of a so I am worried about it, and I think part of what we should be doing is thinking about how do we actually make it harder for a society to begin to go down that road? Are there ways in which we can make the structure a little bit more resilient, and sort of automatically highlight when it's happening in ways that allow us to then focus a light on it, and take action as a consequence?

 

MR. BAER: You mentioned the kind of the wakeup call in a way that the Arab Spring was for some authoritarian regimes about the power of the connection that people have through the internet. And since then, and even before then we saw this kind of cat and mouse game between repressing regimes, and creative, innovative citizens, who are figuring out ways to kind of hack through the restrictions.

 

If you had to make an assessment, who do you think is winning right now in the cat and mouse game around the world? And also, are there any recent examples of citizens figuring out how to get around some of these restrictions that inspire you?

 

DIRECTOR HAINES: Yea. So I definitely would not tell you the latter.

 

MR. BAER: I have to ask.

 

DIRECTOR HAINES: So if we can but I mean I do think, you know, I'll just speak the obvious really for all of you who are so sophisticated in these issues. But it is absolutely true that what we saw, I think initially, in terms of the promise of these technologies was kind of turned around by authoritarian governments in order to focus in on, you know, suppressing political dissent.

 

And as a general matter I mean I think yeah, the pendulum has swung more towards the authoritarian space. But I think we're hopefully making some movements to actually bring it back again, so we'll see how that proceeds.

 

MR. BAER: We've talked a lot about the kind of the need for normative innovation, and you know, putting your kind of three or four jobs ago hat back on, and like looking at the possibilities for institutions and frameworks that could be the basis for a kind of international set of standards or agreements around these kinds of tools.

 

Do you see an opportunity? I understand this is not your you're not making policy currently, but with your old hat on, do you see an opportunity for some particular fora, or do you see a model for the kind of regulation, or standard setting that you think is needed in this space that maybe applied to some other space?

 

DIRECTOR HAINES: It seems like a terrible idea for me to try to put on my prior hat. I will just say I mean I think there are a lot of different fora. And you know, it can go from, you know, some of the more obvious U.N. related fora and associated, but to things like the International Telecommunications Union, or other fora in the world.

 

But it is always a kind of a case-by-case analysis frankly and the folks who are in it are the ones who are going to be best positioned to know whether or not it's the right place to do that kind of work.

 

MR. BAER: Another question here from the audience about the particular challenge of close strategic partners of the United States, like Turkey or India, where there may be growing concerns about the use of digital coercion, or the capacity to use digital coercion, and how the United States can think about the trade offs in those relationships, and whether there is actually an opportunity for us to push our concerns about the long term implications of digital repression?

 

DIRECTOR HAINES: Yeah. These are all great questions, but they're all policy questions, you know. So for, I mean for us, what we try to do is just lift up in the Intelligence Community what we're seeing, and then help the policy makers try to figure out how it is that they can address these issues.

 

And you know, as you know, this is an issue that our policy makers care a lot about, and so I think you know, in trying to manage this they're going to want to take up these questions with countries that are across the spectrum, essentially, between authoritarian and democracies.

 

MR. BAER: Do you see value in exchange programs as a way of helping people in different countries understand the nature of these threats?

 

DIRECTOR HAINES: Oh, that's really interesting. I mean I'm a huge fan of exchange programs, generally, so I would absolutely see value in that. But it's I don't know. I mean I suppose on technologies perhaps organizationally, so that they can see how it is that different entities work in ways that allow for, yeah, the kind of cultural and legal norms that we have. I suppose that's possible, yeah.

 

MR. BAER: So, as a closing question I'm going to do another two parter. The first part is what would you most like the American public to understand about the Intelligence Community that you think is least well understood today? And the second is about more appropriately, about think tanks, which is you know, one of the things that is you look around Washington, D.C.

 

There's a ton of think tanks writing about foreign policy and security policy. And there's very little policy work that is done on the IC. And there's some obvious reasons for this given obviously much of the work of the IC is not knowable or known by the general public.

 

But there are parts of the IC's work that are knowable or known, and certainly principles, et cetera. And I wonder if there's an area of, I understand you're not a policy maker, but you do work for an organization around which policy can be made, and I wonder if there's any area of policy with respect to the IC per se that you think is right for policy research.

 

DIRECTOR HAINES: Yeah. Okay. So on that last one, one of the things that I try to do is once every month bring in folks from different NGOs, or think tanks, et cetera, on a particular issue. And ask them, you know, what are the things that they're concerned about that the Intelligence Community might get into, or what are the kind of critiques that they have of the Intelligence Community in these different spaces.

 

And, you know, it has ranged from emerging technologies to human rights issues, to you know, just a whole series of different things. And it's fascinating because I think it's first of all an opportunity for us to hear directly from them, and we bring in our whole senior leadership team to do these things.

 

But it reveals, from my perspective, two things. One is there are lots of places where folks have identified umm I'll give you an emerging technology example. Like where, you know, emerging technology somebody said look, one of the things we're really worried about is that in this area people will very much, as you were describing, concerns about technology more generally in the context of digital repression.

 

People will be so worried about the national security uses and misuses of this technology, and we will not have the opportunity to gain the advantages of the technology. And they sort of gave specific examples of what they were concerned about, right? MR. BAER: Vaccines even.

 

DIRECTOR HAINES: Perfect. Right. There's lots of places where this is an issue, right? And I think, you know, where there is that kind of concern working with the Intelligence Community to help us understand what we can do to try to avoid that, or to try to, you know, develop structures and things like that that help can be useful.

 

It's not saying that it's a perfect, you know, bullet, or that there will be an easy answer to this, but I think it is at the very least useful to be informed, and to try to think it through in a way that's productive from the very initial outset, and the advantage of having academia and research institutions, or NGOs, or others talk to us early is that they often see these things before government does.

 

And so, they kind of have an opportunity to bring these issues up in a way that's helpful. But the flip side of it I think is that we also get from institutions, experts, who are at Carnegie and other places, who talk to us about policy work that they're engaged in. And even though we're not engaged in policy work, one of the things that we can do is if a policymaker is interested in an issue, for example, human trafficking, or something, you know, some particular issue.

 

And you, as an expert, are considering different drivers of human trafficking, or you're looking at different implications, and costs of human trafficking, or other things like that. If you're able to work with us to explain what those drivers are, what the issues are that you're trying to basically create metrics around, we can create methodologies that allow us to actually track it.

 

And that is something that tends to be useful for policymakers who are then trying to promote an argument for, you know, here are the things that you should be looking for. This is what indicators you should be concerned about, right? If we're able to track those indicators people can act on it, right? Similarly, here's the cost of whatever it is that you are concerned about if we're able to do that then we can push back against that.

 

So, that's I think there's a lot of space for this, and it's part of why I think this question about whether or not the structure and scaling essentially of digital repression, if we're able to lift that up effectively with frankly the brains that exist, you know, in different parts of you know, the sort of intellectual ecosystem that Carnegie and others exist in, they can help us to think about how it is that we can monitor and track this, in ways that are going to be more useful to policymakers to actually enact tools to create that kind of greater resilience.

 

You had a second question in there, and I sort of lost it.

 

MR. BAER: Which is what you would want the people in the general public to know about the IC?

 

DIRECTOR HAINES: Yeah. Okay. So here is the thing I think about. You know, in many respects when I talk to folks in recruiting, or in talking about, you know, the Intelligence Community, and they're kind of caricatures of the Intelligence Community and so on. So, it is often, especially with very young people I find like through a lens, like a dark lens.

 

Like we're sort of almost like you're in the conflict, and intelligence is there, and the sorts of visions that they have of what the Intelligence Community does often, and I think from Hollywood and other things, right, is you know, somehow to do with killing people or hurting things, or you know, just that kind of thing.

 

It is also the case, and I hope that the Ukraine conflict demonstrated this in many respects. Our mission is one to actually promote peace. That is in fact what we are basically designed to do, it's to try and provide indications and warnings so that the United States doesn't have to go to war, so that we're able to use other tools to manage crises, so that we're able to exist in a more effective and prosperous and peaceful way.

 

And again, hopefully consistent with our values, and promoting those values, and I think that's the thing that I would hopefully leave people with about the Intelligence Community.

 

MR. BAER: Thank you. I guess I'm going to take a moment to answer my own question in a different way, as a way of saying goodbye to everyone, which is that one of the things that I've always respected about you when you were leading Deputy's Committee Meetings, and that I think is generally true about people working at senior levels of the U.S. Government in my experience is the discipline that people have that attaches to their roles.

 

When we're in a national -- Deputy's Committee Meeting, the lawyers don't try generally speaking, are pretty good about making sure that they're not trying to make policy, that they're being lawyers. The intel people will often say this is just the intel. I can't give you a policy recommendation.

 

And I think most people not only in the United States, but also around the world would be surprised to see how formal those divisions and roles are, even behind closed doors.

 

And how much people respect that institutional kind of set of roles as a way of making sure that are decisions are not that our intelligence is not instrumentalized as to serve a policy agenda, or that the law is not instrumentalized as to serve a policy agenda, but rather that policy makers are forced to take responsibility for making policy with the insights and advise from an intel or legal standpoint, but that other professionals provide.

 

And I saw you oversee a process like that, and I know that you are now a part of it, and we saw you squirm today when I tried to push you out of your role, which is a good sign of discipline that you continue to adhere to in your current role. Thank you very much for spending so much time with us this afternoon. Thank you for sharing your views, and we hope you'll come back to Carnegie soon and often.

 

DIRECTOR HAINES: Thank you. Thank you so much.

 

 

###

DNI Haines, Summit for Democracy 2023

On March 30, 2023, Director of National Intelligence Avril Haines delivered remarks at the Summit for Democracy 2023 ahead of a panel session titled, “Countering the Misuse of Technology and the Rise of Digital Authoritarianism.”

On March 30, 2023, Director of National Intelligence Avril Haines delivered remarks at the Summit for Democracy 2023 ahead of a panel session titled, “Countering the Misuse of Technology and the Rise of Digital Authoritarianism.” She then participated in the panel discussion with U.S. Secretary of Homeland Security Alejandro N. Mayorkas, Senior Researcher of Citizen Lab at the University of Toronto John Scott-Railton, and CEO of YouTube and Google Neal Mohan, which was moderated by Stanford University’s International Policy Director at the Cyber Policy Center Marietje Schaake. The DNI’s remarks and the panel discussion are available to view here, and the transcript is below.

 

 

Summit for Democracy 2023

Director of National Intelligence Avril Haines

Countering the Misuse of Technology and the Rise of Digital Authoritarianism

 

30 March 2023

 

DIRECTOR HAINES: Thank you Jean, very much, for the kind introduction, and the opportunity to join this extraordinary event. It is quite something to represent the Intelligence Community at a Summit for Democracy that is literally happening across the world, cohosted by the United States, alongside Costa Rica, the Netherlands, the Republic of Korea, and the Republic of Zambia.

 

And a special thanks also to Secretary Blinken and his terrific team for putting together such an exceptional forum and program this week. This year when the U.S. Intelligence Community issued its assessment of worldwide threats to U.S. national security, we included for the first time a section on trends in digital authoritarianism and malign influence that gets really to the very heart of this session's focus on the misuse of new and emerging technologies.

 

And as you've heard from other speakers today, the global erosion of democracy that began more than a decade ago is ongoing. And the technology's role in this is fundamental, particularly in the contest over information. Digital technologies have had a profound impact. They were instrumental in facilitating civil society, and freedom of the press in many places, and yet they sparked a backlash from authoritarian regimes, first to contain the risks posed by freer flows of information, and then to harness these same technologies in pursuit of their own objectives to stifle freedom of expression, and to suppress political discourse.

 

And today we see how they are deployed by governments as tools of repression and disinformation, both inside and outside of their borders. We even see authoritarian regimes using their information ecosystems to disparage this Summit, underscoring the urgency with which they seek to push back against democratic freedoms.

 

And in 2022, global internet freedom declined for the 12th consecutive year. The sharpest downgrades were documented by Russia, Myanmar, Sudan, and Libya. A record number of national governments, many authoritarian, also blocked websites with non violent political, social or religious content, undermining user's rights to free expression and access to information.

 

We certainly saw evidence of this in our own efforts to take on Russian disinformation in the lead up to the invasion of Ukraine. We publicly disclosed intelligence on the Russian government's plans and intentions in an effort to warn the world regarding the invasion. We also did so to undermine Moscow's ability to create a pretext for Russia's invasion, which it hoped would legitimize their military action in the eyes of some countries and divide the NATO Alliance, making it harder for NATA members in other countries around the world to come together to respond to Russia's illegal and barbaric invasion, as we ultimately were able to do.

 

In part, we were successful. In the United States and Europe, for example, our message was received and the Russian narratives were largely ineffective. We were not effective, however, within Russia, where the vast majority of the population at the start of the war supported Putin's appeal and special military operation, and saw NATO and Ukraine as the aggressors.

 

And this isn't to say that technology is the only reason for our lack of success. A big part was played in Putin's direct and indirect influence on sources of information within Russia. But there is no question that new technologies, including cyber intrusion tools and commercial spyware, are making it easier for authoritarian governments to engage in digital repression, both inside and outside of their country's borders.

 

And unless we take action, malicious use of digital information and communication technologies will become more pervasive, automated, targeted and complex during the next few years, further threatening to distort publicly available information, and of course, authoritarian governments are usually the principal perpetrators of such digital repression.

 

Such regimes learn quickly how to exploit new and more intrusive technologies for repression. Various technologies effectively extend a state's power to stifle dissent inexpensively at scale beyond traditional means, such as censoring print media. And the fact that commercial firms around the world are selling these capabilities, simply makes it easier for governments that have an interest in doing so to engage in such repression.

 

In fact, the commercial spyware industry grew rapidly during the past decade. Journalists in the past year have estimated it now to be worth approximately 12 billion. And while some states use such spyware tools and lawful intercept programs for legitimate purposes, such as to target criminals and terrorists, governments also are increasingly using spyware to target political opposition, and dissidence.

 

Last year governments, and other actors, shut down the internet at least 187 times in 35 countries; a record. Shut downs were imposed during protests, active conflicts, school exams, elections, periods of political instability where high profile events, such as religious holidays, or visits by government officials, with the ultimate goal of imposing control and silencing voices.

 

And government leaders used these tools to conduct repression because they fear that open debate of political or social topics could jeopardize their hold on power. A growing number of internet users around the globe only have access to an online space that mirrors the views of the government and its interest. Authorities in 47 of the 70 countries covered by a recent research study limited users access to information sources located outside of their borders.

 

And officials in at least 53 countries charged, arrested, or imprisoned internet users in retaliation for posts about political or social causes. Their repressive governments were presumably able to track them through digital means. And these examples demonstrate how technology has made it easier for authoritarian governments to control the information environment within their own borders.

 

But as I mentioned initially, we also see how they use such technologies to increasingly engage in transnational repression, in an effort to monitor and silence dissidence abroad. In particular, disparate populations in a number of democracies are facing a broad range of threats as autocratic regimes turn to digital tools to suppress dissent.

 

Here again, commercially available technology is exacerbating the problem. Commercial spyware allows authoritarian regimes to remotely target the devices of dissidence, oppositions, journalists, and their associates and families, to collect data, location, information and audio. Some spyware allows devices to be infected remotely, and without requiring the victim to be lured into clicking a link, or opening a malicious file.

 

Our information suggests almost all of the at least 30 regimes with documented transnational repression efforts have used cyber tools against perceived ex patriot opponents, and host country backers in the U.S., Australia, Canada, and Europe during the past decade. And moreover, these efforts have grown more brazen over time.

 

As an example, last year Iran conducted a range of disruptive cyber operations against Albania in retaliation for allowing an Albania-based Iranian dissident group to express themselves freely. An astonishing bold and novel attempt by a state actor to use cyber attacks to compel another state to suppress dissidence who were living there in exile.

 

And finally, and perhaps most relevant to us are the efforts by many autocrats to try to influence and interfere in democratic societies, creating social and political upheaval, shifting policies, and even swaying voter's perspectives and preferences. We are deeply concerned that as the barriers to entry worldwide lower and become increasingly accessible to conduct a range of malign influence operations, more states will look to undertake these operations.

 

And part of why this is so challenging is because democracies are asymmetrically vulnerable to the threat posed by authoritarian regimes in the information space. In short, such regimes exploit the openness of democratic societies. What we know is a strength, they perceive as a weakness.

 

And given that our public dialogue is intended to have an impact on our government's decision making, it is clear that if a malicious actor is able to affect our domestic discourse, they can not only shape public opinion, but also have an impact on who we elect, and what decisions we make.

 

While an open information environment confers critical strategic advantages on free societies over the long run, it is hard to argue that such environments do not create vulnerabilities in the short term. Regimes interested in targeting our societies do so in a number of ways. Employing a diverse set of online technologies and content to convey propaganda and disinformation.

 

And the advancement of data analytic tools in particular, backed by rapidly improving artificial intelligence and machine learning technologies, and the extraordinary availability of data from commercial government and other publicly available sources and democracies are making it too easy for actors at all levels to exploit such information for their own ends, including as part of their efforts to engage in malign influence operations. Particularly, criminal, covert or coercive effects targeting open societies.

 

And furthermore, adversaries have grown savvier at information laundering, deploying a web of proxy actors, and online personas, who introduce and amplify variations of the same narratives in an effort to shape our discourse, while producing and providing the adversary an element to plausible deniability.

 

Unwitting persons, and third party individuals may subsequently propagate these narratives by forwarding, sharing, liking or discussing unsubstantiated or misleading narratives, compounding their overall reach into open information environments within and among democracies.

 

And we see how Russia and other authoritarian regimes seek to weaken states by pushing divisive narratives to exacerbate pre existing tensions in societies to decrease trust in public institutions, democratic processes, and to question traditional sources of media. We also have taken note of Beijing's growing efforts to actively exploit perceived U.S. societal divisions, using its online personas, which moves it closer to Moscow's playbook for influence operations.

 

In sum, the promise of connected technologies comes with peril, and if we fail to establish safeguards, or prevent authoritarian regimes and other malicious actors from the misuse of such tools. The litany of challenges I've identified, coupled with efforts by authoritarian regimes to normalize a perspective that no country should critique the internal affairs of another highlight the task in front of us.

 

And these technologies continue to hold the promise of allowing freer flows of information, improved communication, the connections we will require to better understand and deal with a myriad of global challenges. We must work to realize this potential.

 

And within liberal democracies, governments, civil society and business, we'll need to work together, and with urgency to achieve widely held norms and maintain and improve positive technical standards for digital technologies so that we can ensure the free flow of digital information and the protection of human rights into the future.

 

Our President's new executive order on commercial spyware seeks to address many of these concerns, as do legal frameworks established to protect our data. Many of the things that you've heard from the Secretary today and from Administrator Power.

 

And there is still need to do more work, and unless we address this problem together we will not be successful. So thank you again for listening to me, for the opportunity to contribute today, and it's now my honor to welcome Secretary Alejandro Mayorkas to the stage.

 

MS. MESERVE: Thank you Director Haines, and also Secretary Mayorkas, and now let me introduce the other speakers who will join him on stage. Avril Haines, United States Director of National Intelligence joins us again, John Scott Railton, Senior Researcher at the Citizen Lab at the University of Toronto.

 

Neal Mohan, head of YouTube, and Marietje Schaake of Stanford University, a former Dutch member of the European Parliament, and an early thought leader on technology and human rights. She will be the moderator this discussion. Marietje?

 

MS. SCHAAKE: Thank you so much Jean, and thank you Director Haines, Secretary Mayorkas for laying out the key topics that we are here to discuss, the many threats that technology can pose when it's used as a tool for repression and authoritarianism, but also the significance of leadership by democratic governments, and particularly the executive order to stop the use of commercial spyware, which you know, if we were to make a spectrum of harmful technologies, I think could easily take the top position.

 

Where intelligence grade capabilities are for sale for anyone who wants to buy it. We learned about the harms to human rights defenders in the context of the Arab uprisings, and since then, as you mentioned, the market has grown, it's worth billions of dollars now, and the repression doesn't only happen in non democratic countries.

 

Unfortunately, we also see governments of democracies using these tools to go after judges, journalists, opposition figures. And so, to have a line in the sand, a limit to the use of this technology, is extremely important because it proliferates not only to various governments who can now buy this top notch capability, but also to non state actors, which hasn't been mentioned much before, but I think is also crucial.

 

If you think about terrorist groups, or Mafia organizations that can get their hands on these very aggressive and invasive technologies. So I'm very happy that we can continue to dive into the ins and outs of the harms and the opportunities to improve things in the interest of delivering on the promise of democracy, and I would like to turn to John Scott Railton first. He's with the Citizen Lab, a leading organization researching the methods and the ways in which commercial spyware has been used.

 

He is here to stand in for Ron Debert, who unfortunately couldn't make it at the last minute, but your team's work has been really vital, so maybe you can share some observations, not only on why this moment matters, but also on the lessons learned over the past decades that brought us here. Why has it taken a while to get to this concrete action, and what are your hopes for implementation?

 

MR. SCOTT RAILTON: Well Marietje thank you so much for that introduction, and thanks to everyone for having me. And I am a stand in for Director Ron Devers, who has written a really interesting article not long ago in foreign policy on the topic of the sort of exploding proliferation of mercenaries power and commercial surveillance. I would highly recommend you read it.

 

That said, sitting in the green room just before coming in here listening to the talk given by DNI, I was reflecting on how many of the things that you evoked are things that civil society has been saying for a decade, and feeling mostly in the wilderness about it.

 

For a decade, civil society groups and researchers have been finding evidence of the abuse of commercial spyware, and mercenary spyware technology against civil society. And we have been sounding the alarm until we're hoarse. And unfortunately, for many of those years I think people saw this issue as a human rights problem, something bad, something regrettable.

 

Most governments didn't want to talk about it. The reason? National security. Sort of like the arms market before this was something not to be talked about. But things began to change. They changed not just because of the mountain of abuses that researchers like us, Amnesty International, Access Now, and many other groups around the world have found.

 

They changed because of the pace of proliferation, which was so fast and dramatic that it began harming U.S. companies, big platforms, and their interests. And they moved from a posture of technical mitigation to a posture of legal engagement to try to block the growth of the proliferation of mercenaries power, but it didn't stop there.

 

Somehow, not long ago, in 2021, the government the U.S. government entered the chat. And that really was the third leg of the stool of the problem after civil society and tech. And the first thing the U.S. government did was put an SO group, and three other commercial spyware offenders on the entity list.

 

Now, at the time I remember thinking the entity list. This doesn't feel like a very needy sanction. What does this really mean? What's interesting though is that it had an outsized impact on the industry because suddenly companies that have been engaged in this really reckless proliferation were beginning to wonder if the music was going to stop.

 

And then more recently, in fact, this week we've seen a remarkable set of actions by the U.S. government, and then today a series of actions by a joint group of governments around the world. Great. I think what's remarkable is that it took us so long to get here. It took us so long for civil society sounding the alarm.

 

But at the end of the day it really required the recognition that the problem of mercenary surveillance was one that cut across considerations of our communities, and of your communities, tech, and government. So all good, right? Well sort of. We're in a period where the interests of these different groups have aligned, and it's remarkable, and we're seeing change. But there are still major gaps.

 

For example, the Executive Order, a remarkable document in many ways that I think is going to pump the brakes on proliferation, has gaps in how it talks about how the U.S. government would use spyware, and mercenary surveillance tools, and around transparency, and how technology is imported, and how the technology is exported.

 

To me that's a key gap, and it reminds me of why civil society is so important, which is we say the uncomfortable things. Not only about the abuses, but about what we need in order to move further. And often what we need is more transparency and clarity. I'm just going to flag this, which is today there was this joint statement, and the thing that most heartened me about it was actually some of the first bullet point, which pointed out that a group of governments are going to commit to being more accountable in how they use commercial and mercenary spyware.

 

Great. I hope you have accounts for the United States too. Thanks.

 

MS. SCHAAKE: Thank you very much. Civil society's role is crucial. Yeah, you can clap. I know a lot of people through working on this topic for so long are in the audience, so this is indeed a great success of civil society pushing relentlessly, and shining light in dark places.

 

Another important actor is, and he represents the industry, is the industry tech platforms are often the place where intrusions, but also other harms happen. You're the new incoming head of YouTube, congratulations. Maybe you can talk a little bit about industry response, and why you wanted to join us.

 

MR. MOHAN: Yeah. I'll first of all, it's an honor to be here, so thank you for having me, and I'll build on some of the conversation. And just start off by saying that some of it goes back to first principles. You know, I'm speaking here on behalf of YouTube, Google, but we are a proud U.S. company that's built on principles of freedom of speech.

 

That's a core tenet of YouTube and Google, human rights, and also integrity of the democratic process writ large in a broad sense, and those are core principles across YouTube, across Google, and everything really starts with that because that's an organizing principle in terms of where we put our resources, how we make trade offs, lots of decisions are trade offs between two difficult choices.

 

And it's important to have those principles. We have been investing to do our job in this realm for many, many years. I'll talk about this week to your question in a second, but it's built on a foundation of years of work. Everything from the trustworthy advisory group tag, which I think many people are familiar with, which is a center of excellence within Google, designed to combat these coordinated deceptive practice actions by state actors.

 

But also now increasingly cyber mercenaries, cybersecurity for hire, spyware for hire firms that led to efforts like Project Zero within Google, which I think people are familiar with. An effort to really identify and thwart these zero day type threats. It's where a lot of discovery around NSL and Pegasus came from.

 

So, there's been a long history, track record, and concerted effort around what is a problem that we need to continue to work on, and that's foundational, so that's one aspect. The other aspect is what Director Haines was talking about, which is the information warfare side, influence operations, et cetera, and that's where a lot of the framework that we have at YouTube around a policy architecture, not allowing things like deep fakes, coordinated deceptive practices, our good neighbor policy that immediately removes videos and channels.

 

We remove on the order of thousands of channels in partnership with TAG when we identify these threats that come from state actors. We're public with that on a regular basis. So that's one policy framework that we have. But it can't just be about policy. It's also got to be about enforcement, so our investment in machine learning technologies, AI, that actually allow us to do this at scale, and actually training people around the world to be able to do this.

 

And this is the reason why a lot of the actions that you saw happen on our platform with relation to the war in Ukraine happened so quickly, whether it was around thwarting misinformation campaigns, geo blocking channels on YouTube that might have been spreading that type of misinformation.

 

Making sure that citizens on the ground in Ukraine actually had access to high quality information, how to protect their families, how to seek refugee status, et cetera. And so, that's a big part of our efforts as well. And so that's all foundational leading up to the announcement this week.

 

We've been really proud to shape the principles an sign on to the principles, the industry principles, to combat cyber mercenaries. That is an important milestone. It really compliments the executive order from the President, but it's again, a milestone, and it's part of work that needs to continue. This battle happens in the shadows.

 

We need to remain vigilant, and so, I'm really appreciative of the partnership across civil society, our government partners, and across the tech industry to make sure that we try to remain ahead of this.

 

MS. SCHAAKE: Thank you very much.

 

SECRETARY MAYORKAS: Am I allowed to ask a question?

 

MS. SCHAAKE: Of course you are.

 

SECRETARY MAYORKAS: Terrific. And thank you. Thank you all. So John, I want to go to back to what you articulated at the outset. You spoke of how long it took for governments to act.

 

MR. SCOTT RAILTON: Yeah.

 

SECRETARY MAYORKAS: Be that as it may, I mean our high risk community protection initiative now I think meets the moment, and we are quite vigilant right now. You mentioned sort of a catalyzing event. Our placement of the organization on the entity list, and the sanctions.

 

Given your organization's sort of global reach, as well as perspective, how did you see other countries respond to that?

 

MR. SCOTT RAILTON: Well thank you for that question. I had a whole theory of change around mercenary spyware and it looked like this. Well it's probably going to be Europe first because of their fine commitments to privacy, as in trying GPR. And maybe it's going to come to the U.S. through the vector of human rights issues.

 

None of that was true. I was totally wrong. In the end it came from commerce, and then eventually from the NSC executive order. What was so interesting about that entity listing is that from my perspective, it was the first real signal delivered by a government that had credibility that there was a problem.

 

And it was a signal of U.S. governmental displeasure. And it was tremendously useful for us, as researchers, and I know for journalists, to be able to say look, this problem doesn't sit in the box just of dissidents. It doesn't sit in the human rights defended box. It doesn't sit in the freedom of expression box. It is in that box, but it's not limited to that.

 

This was very powerful. But I have another question, which is one designation, four entities. Since that time we have seen more information about more spyware companies being very bad. One hope would be that there were more designations in the future.

 

And I know statements made by members of Congress, including the Ranking Member of House Intelligence, asking questions about sanctions. These are good questions. Another great question is about the entity list, and whether that remains an effective tool, not only for creating direct consequences, but also good signaling.

 

SECRETARY MAYORKAS: So I would say look. The entity list is a critical threshold move, and then it all comes down to how we enforce it, right? With the dissemination of information, and quite frankly, the enforcement regimes that we could bring to bear. It's not just the imposition of sanctions, but it's also law enforcement actions as well.

 

We have a whole suite of tools, but you know, the placement on the list is a very important step of course, but it's all in how we enforce it, and how we enforce efforts to circumvent it.

 

MS. SCHAAKE: Well maybe I can build on that question and just open it to anyone on the panel who wants to respond, which is what do we anticipate the effects will be of this new executive order? So, obviously the government is not going to use commercial spyware anymore, but what ripple effects are you hoping to achieve? There are diplomatic efforts to bring in other governments.

 

There's efforts by the private sector, but this has been a market that has, you know, probably been steadily if not exponentially growing. Will the market be restricted? Do you expect ripple effects there? Any thoughts on the scenarios?

 

SECRETARY MAYORKAS: So, I would say the following. I mean in this space we cannot act alone to achieve the desired outcomes, right? This requires a community of response. I think John put it very aptly with respect to civil societies being victimized by this, calling out for assistance. Well now we are moving.

 

And we are not moving unilaterally, we are moving with critical partners. I don't know if necessarily the market contracts, and it's not necessarily about contraction, it's about guardrails of use. I think that to me is what is critical, and developing guidelines.

 

One thing that's very important is the issue of trust. The trust in what we do, and to John's point again, we only build that trust if we ourselves are open and transparent with respect to our uses of it, and also our control of it. But I would turn to other, and Neal you know the market far better than do I, whether you anticipate a contraction, or whether a controlling a more controlled environment if you will.

 

MR. MOHAN: Yeah. I'd say two things to build on what the Secretary said. The first is things like the entity list help. We use obviously, that serves as guidelines for us in terms of how we approach things. At TAG we're monitoring, 30 entities right now, and that number might continue to grow, it might shrink, but that's kind of the order of magnitude of what we're looking at in this space.

 

And what I would say the other aspect from a marketing standpoint that's very important, is the friction that technology companies can put into this as well. And so a lot of our investment is not just about detection and monitoring and research. We try to be as transparent as possible about these things.

 

We released a report, I think, a little while ago that said phishing attacks on Ukrainian citizens were up 250 percent. On NATO citizens, up 300 percent, so just making people aware of what's happening is certainly one aspect of sort of part of the market dynamics.

 

But the other is all the protections, so Project Shield, as an example right, which is back to the people that are susceptible to these types of attacks, whether they're news websites, human rights organizations, so is there technology that we can bring to bear that protects those entities, or our you know, our advanced protection program, which is geared towards individuals that are vulnerable.

 

All the individuals that you all called out in your remarks that are the target of these types of attacks. What are the things that we can do in terms of our products and capabilities to just heighten the protection that they have? And so, I don't want to describe it as sort of an arms race in that sense, but it's an important component to the market dynamics.

 

And one of our big contributions is going to be not just in terms of detection and thwarting, but also building sort of these permanent defenses that can come into play to protect both entities and individuals, so I think that's an important component here.

 

MS. SCHAAKE: Yeah John, do you want to add something?

 

MR. SCOTT RAILTON: Yeah. Well and I want to build on something you said. One of the sources of information for the last decade about very naughty bad things done by the mercenary surveillance industry has been civil society and investigative journalism.

 

I guess this project would be a great example. But another really critical input for this whole conversation is the naming, shaming and attributing that has come from TAG around the mercenary surveillance industry, and the exploit industry, from Microsoft, Apple and others. I see this as a critical part of the information eco system in part because your barriers are different than those that a government might face around calling entities out.

 

So, we really welcome it when TAG does its reports. And I would just say there was a great TAG report earlier this week talking about vendors of exploits and vulnerabilities, and this is critically important, and we hope that you keep doing it.

 

MR. MOHAN: Yeah. We intend to. I think it's an important part. It helps our business, but more importantly it really helps move this conversation forward, and so that's a key component to TAG. It's sort of it's something that we're very proud of, and we want to we put information out there really oftentimes as soon as we have it.

 

MS. SCHAAKE: Well I think the examples that you give underline how basically no one can escape the sort of impact of this industry right, where first it looked like human rights defenders were the "only ones" to be targeted, but then it became a bigger group of targets, but also U.S. citizens.

 

I think that it's important to mention as well that U.S. citizens working elsewhere, whether it be for international organizations, or as diplomats serving your governments everywhere in the world are easy targets through this technology.

 

And so perhaps, one effect could also be the relocation of some of these industries, or the starker difference between governments that allow, and governments that don't allow the use, and so that will lead to new questions of how to better implement, and I guess work with partners.

 

We're almost running out of time, but I wanted to return to Director Haines before we close to share some additional thoughts on sort of the scope of threats that you have in view. We've zoomed in very much on the commercial spyware industry because I think it is one of those critical risks that need to be targeted, but there are many, many others.

 

So, perhaps you can set the agenda for us to take home after we close this panel. And I'm sorry for the audience that we cannot get to your questions because we've been reduced in time, but I hope that there will be other ways to interact.

 

DIRECTOR HAINES: Okay. I'll try to do so very quickly because I suspect John and others may want to add to this, but you know, I sort of laid out the sort of three areas that we look at right, what are they, what technologies are being used by authoritarian regimes within their borders to essentially censor and manipulate information that go to their own citizens.

 

And as we've identified, commercial spyware is a piece of that, as it is across all the other categories that I'm going to mention. But there are other things too, such as the you know, shut downs of the internet, sort of homemade, technical platforms that allow them to ultimately curate what information is able to get to citizens.

 

There are a lot of other sort of ways in which technology is being used, and I think that's going to be a critical aspect of you know, work as we move forward, is really trying to understand that, and hopefully set up standards, and things that we can monitor and use to create the kind of transparency that I think that we're looking to use to basically highlight these problems, and then take action against them.

 

When it comes to exporting, you know, transnational repression essentially towards dissidence, again commercial spyware is another piece of it, but so is you know, other forms of the internet shutdown that I mentioned with respect to Albania trying to use technology to ultimately pressure other states or actors to suppress for those governments.

 

And then finally, you know, in the context of disinformation and so on, as Neal was talking about, I think you know, we see automated disinformation as a really challenging thing to manage, not to mention the kind of you know, fake prospects for technology in a variety of different ways, and it is all of these things I think are critical for us to figure out how can we identify these challenges.

 

How can we monitor them, how can we actually prevent them, and how can we create, in a sense, the technological landscape that is more resilient against them, and that is something that I think we're trying to understand better, obviously with the kind of expertise that sits around this table.

 

MS. SCHAAKE: That's great. Any responses to add?

 

MR. MOHAN: I would just build very quickly on what Director Haines said. I think that third bucket in particular is really interesting, and where a lot of innovation has happened, and where we need to remain vigilant, just again going back to the war in Ukraine. A lot of the misinformation narratives were novel and brand new, so they literally didn't exist one week, and then they were kind of rampant the following week.

 

And so, what's required there is not just an awareness from an intel standpoint, which that's where that intel desk that I was mentioning comes into play, but you need to have the technical wherewithal then to train machine learning classifiers, and all the AI investment to be able to really understand ground troops that literally didn't exist a few days before, learn it, and then basically deploy it across all of these information network, YouTube being one, but really across the entire internet, and so I think that that's a really important sort of frontier that we need to remain vigilant on.

 

MS. SCHAAKE: Yeah.

 

MR. SCOTT RAILTON: So, I have to say this, as somebody who comes out of the civil society space, I am reflexively mistrustful when suddenly the alignment between government and tech are participating. And I reserve the right to remain mistrustful.

 

But I think you mentioned the issue of trust, and I'd like to use that to frame something, which is if this is for real, if we're really concerned not just about mercenary spyware and proliferation and its impact on U.S. national security, and citizens abroad and at home, but we actually care about the complete breakfast of surveillance technologies, and their impact of freedom of expression, fear, and freedom from fear, free elections around the world.

 

It is absolutely critical that the United States put its money where its mouth is, and that means a couple of really critical things, including really leaning into transparency and honesty about what the U.S. does with its surveillance powers, including at home, including on domestic topics. And I am over the moon at all the cool things that have happened this week. It's great to see.

 

But I reserve my right to be mistrustful, and I will believe some of that when I see it.

 

DIRECTOR HAINES: Can I respond to that because I think you're absolutely right. This is either to my mind one of the ironies of being here right is the fact that in many authoritarian governments right, like the people who live there look at their intelligence services as part of the problem, and obviously a critical tool that is used by their government against them, and --

 

MR. SCOTT RAILTON: No one thinks that in the United States of course.

 

DIRECTOR HAINES: Understood. But the point is that for me, and obviously leading the Intelligence Community I believe this, but I believe the intelligence community is in fact what helps to secure our democracy right? And the point is that that's only true if we are subject to democratically passed laws, that we are basically, you know, have robust oversight, that we have the values and the ethics that were expected to operate under, and that we're implementing that appropriately.

 

And of course, we're not as transparent as other parts of the government by the nature of our work. But the reality is we have to find ways to ensure that we can build the trust of our population.

 

And to your point, and I think that's sort of the place where we try to, we have to do more, and we are doing quite a bit in terms of trying to disclose here are the frameworks within which we operate and don't operate, and basically what we can and what we can't do to your point, right?

 

And to be honest about that, and to reflect that. And I think that's crucial to our legitimacy, and our sustainability, right? Which is to say that when things, you know, get disclosed or happen, or things like that, people have to be able to look back at our framework and say okay, that was within that framework, or that wasn't, and if it wasn't, then you should be held accountable for having violated it, right?

 

And that's part of the process. So, I think that's crucial to our future in these spaces, and I just want you to know that I believe that that is the right way to think about these things. But I will tell you that it is a national security issue from my perspective.

 

MR. SCOTT RAILTON: Yeah.

 

DIRECTOR HAINES: Human rights are a national security issue in many respects, right?

 

MR. SCOTT RAILTON: I agree.

 

DIRECTOR HAINES: So, it's you know, when I look at what's been happening in Ukraine, to Neal's point, like you know, so much of what they did in the occupied territories for example, information, you know, suddenly all of the infrastructure is now going through Russian infrastructure, the internet and other things, so that they can manage it, so that they can manipulate it.

 

That is part of what we're supposed to be looking at and helping the people basically understand, and policymakers and others, like the wonderful Secretary that sitting next to me, to actually take action on.

 

MR. SCOTT RAILTON: Yeah.

 

SECRETARY MAYORKAS: By the way, you know, I will mention national security. I've spoken about the fact that national security is converged with homeland security in this role. And I think John, it's your obligation to be mistrusting because mistrusting then, you know, drives you to hold our feet to the fire and live up to the ideals that we espouse.

 

And so, I would worry a tremendous amount if those in civil society were not mistrusting of the government and holding us accountable.

 

MS. SCHAAKE: Well I think the idea of leading by example, and keeping the checks and balances in place should be a process that's never finished. I mean I don't think there will ever be a conference where we can put a point at the end of the sentence and say we're now done with democracy. In fact, while it's under so much pressure it's important to look at how it can become more resilient either at home or abroad, and so on.

 

I have to say I'm a little bit confused about time. I see all these clocks ticking. I understood we were out of time, so maybe somebody can tell me because if we're not out of time, then we will go to the audience, but it's not entirely clear to me. I apologize. Do we indeed still have 13 and a half minutes for the audience?

 

SECRETARY MAYORKAS: They're saying you're out of time.

 

MS. SCHAAKE: Okay. I thought so too. Okay. I apologize.

 

SECRETARY MAYORKAS: You are not trusted.

 

MS. SCHAAKE: I apologize for that, and I'm sorry we had to cut this panel a little bit short, but I hope you found it as inciteful as I did, please join me in thanking the panelists for their fine words today. Thank you.

 

 

 

###

DNI Haines Opening Statement on the 2023 Annual Threat Assessment of the U.S. Intelligence Community

On March 8, 2023, Director of National Intelligence Avril Haines delivered opening testimony at a Senate Select Committee on Intelligence hearing for the Annual Threat Assessment of the U.S. Intelligence Community. DNI Haines emphasized the national security challenges posed by China, Russia, Iran, and North Korea, as well as transnational issues, such as climate change, terrorism, and emerging technologies. The opening testimony and public hearing is available to view here, and the transcript is below.

 

On March 8, 2023, Director of National Intelligence Avril Haines delivered opening testimony at a Senate Select Committee on Intelligence hearing for the Annual Threat Assessment of the U.S. Intelligence Community. DNI Haines emphasized the national security challenges posed by China, Russia, Iran, and North Korea, as well as transnational issues, such as climate change, terrorism, and emerging technologies. The opening testimony and public hearing is available to view here, and the transcript is below.

 

Remarks as prepared for delivery by
The Honorable Avril Haines
Director of National Intelligence


Annual Threat Assessment
Opening Statement
Senate Select Committee on Intelligence

 

March 08, 2023

 

Chairman Warner, Vice Chairman Rubio, Members of the Committee, thank you for the opportunity to be here today, alongside my wonderful colleagues and on behalf of the extraordinary public servants we lead in the Intelligence Community to present the IC’s annual threat assessment.

 

Before I start, I just want to publicly thank the men and women of the Intelligence Community, whose work we are presenting today. From the collector to the analyst and everybody in between who made it possible for us to bring you the annual threat assessment in hopes that this work will help keep our country safe and prosperous, thank you.

 

This year’s assessment notes that during the coming year, the United States and its allies will face an international security environment dominated by two sets of strategic challenges that intersect with each other and existing trends to intensify their national security implications.

 

First, great powers, rising regional powers, and an evolving array of non-state actors are vying for influence and impact in the international system, including over the standards and rules that will shape the global order for decades to come. The next few years are critical as strategic competition with China and Russia intensifies, in particular, over how the world will evolve and whether the rise of authoritarianism can be checked and reversed. Other threats are, of course, also individually significant, but how well we stay ahead of — and manage — this competition will be fundamental to our success at navigating everything else.

 

Second, challenges that transcend borders — including climate change, human and health security, and economic needs made worse by energy and food insecurity, as well as Russia’s unprovoked and illegal invasion of Ukraine — are converging as the planet emerges from the COVID-19 pandemic and all at the same time as great powers are challenging longstanding norms for transnational cooperation. Further compounding this dynamic is the impact that rapidly emerging technologies are having on governance, business, society, and intelligence around the world.

 

Given that background, perhaps needless to say, the People’s Republic of China — which is increasingly challenging the United States economically, technologically, politically, and militarily around the world — remains our unparalleled priority. The Chinese Communist Party, or CCP, under President Xi Jinping will continue efforts to achieve Xi’s vision of making China the preeminent power in East Asia and a major power on the world stage.

 

To fulfill Xi’s vision, however, the CCP is increasingly convinced that it can only do so at the expense of U.S. power and influence, and by using coordinated, whole-of-government tools to demonstrate strength and compel neighbors to acquiesce to its preferences, including its land, sea, and air claims in the region and its assertions of sovereignty over Taiwan.

 

Last October, President Xi secured his third five-year term as China’s leader at the 20th Party Congress, and, as we meet today, China’s national legislature is in session, formally appointing Xi and confirming his choice to lead the PRC’s State Council, as well as its ministries and the leaders of the military, legislative, and judicial branches. After more than a decade serving as China’s top leader, Xi’s control over key levers of power gives him significant power and influence over most issues.

 

Xi has surrounded himself with like-minded loyalists at the apex of the Party’s Standing Committee, China’s highest decision-making body, and we assess that during the course of Xi’s third term they will together attempt to press Taiwan on unification; undercut U.S. influence, which they perceive as a threat; drive wedges between Washington and its allies and partners; and promote certain norms that favor China’s authoritarian system.

 

You may have seen Xi’s recent criticism during his speech on Monday of what he referred to as America’s “suppression of China,” reflecting his longstanding distrust of U.S. goals and his apparent belief that the United States seeks to quote-unquote “contain” China.

 

Xi’s speech this week was the most public and direct criticism that we have seen from him to date and probably reflects growing pessimism in Beijing about China’s relationship with the United States, as well as Xi’s growing worries about the trajectory of China’s domestic economic development and indigenous technology innovation — challenges that he now blames on the United States.

 

He also wants to message his populace and regional actors that the US bears the responsibility for any coming increase in tensions.

 

Despite this more public and directly critical rhetoric, however, we assess that Beijing still believes it benefits most by preventing a spiraling of tensions and by preserving stability in its relationship with the United States.

 

Specifically, Beijing wants to preserve stability in East Asia, avoid triggering additional economic punishments from U.S. sanctions and U.S. partners, and showcase a steady relationship with the United States to help avoid setbacks in its other relationships around the world, even while signaling opposition to claimed U.S. provocations, including the shoot-down of the PRC balloon.

 

He wants a period of relative calm to give China the time and stability it needs to address growing domestic difficulties.

 

Xi’s principal focus is on domestic economic development, which is not assured. In fact, the IC assesses that China’s long-term economic growth will continue to decelerate because China’s era of rapid catch-up growth is ending and structural issues — such as debt, demographics, inequality, overreliance on investment and suppressed consumption — remain.

 

And although the CCP may find ways to overcome its structural challenges over the long-term, in the short-term the CCP continues to take an increasingly aggressive approach to external affairs, pursuing its goal of building a world-class military; expanding its nuclear arsenal; pursuing counter-space weapons capable of targeting U.S. and allied satellites; forcing foreign companies and coercing foreign countries to allow the transfer of technology and intellectual property in order to boost its indigenous capabilities; continuing to increase global supply chain dependencies on China with the aim of using such technologies and dependencies, rather, to threaten and cut off foreign countries during a crisis; expanding its cyber pursuits and increasing the threat of aggressive cyber operations against the U.S. homeland and foreign partners; and expanding influence operations, including through the export of digital repression technologies.

 

The CCP will also seek to reshape global governance in line with his preferences and governance standards that support its monopoly of power within China. Beijing is elevating PRC candidates and policies at the UN; attempting to gain buy-in for Xi’s development and global initiatives; promoting blocs like the Shanghai Cooperation Organization as a counterweight to the West; and shaping multilateral groupings, such as the formerly 17+1 forum in Eastern Europe, but with mixed success.

 

In brief, the CCP represents both the leading and most consequential threat to U.S. national security and leadership globally and its intelligence-specific ambitions and capabilities make it for us our most serious and consequential intelligence rival.

 

During the past year, the threat has been additionally complicated by a deepening collaboration with Russia, which also remains an area of obviously intense focus for the Intelligence Community.

 

In fact, when we were last before you for an ATA hearing, it was only a few weeks after Russia’s unprovoked and illegal invasion of Ukraine. Now, we are over a year into the war, which is reshaping not only Russia’s global relationships and strategic standing but also our own, strengthening our alliances and partnerships in ways that President Putin almost certainly did not anticipate — often precipitating the very events that he was trying to avoid, such as Sweden and Finland’s petition to join NATO.

 

On the battlefield, there is currently a grinding attritional war in which neither side has a definitive military advantage and the day-to-day fighting is over hundreds of meters — currently focused largely in Donetsk — as Russia tries to capture the remainder of the Oblast.

 

The Russians are making incremental progress on Bakhmut, which is not a particularly strategic objective, but are otherwise facing considerable constraints, including personnel and ammunition shortages, dysfunction within the military’s leadership, exhaustion, as well as morale challenges.

 

Even as the Russian offensive continues, they are experiencing high casualty rates. Putin is likely better understanding the limits of what his military is capable of achieving and appears to be focused on more modest military objectives for now.

 

Export controls and sanctions are hampering Russia’s war effort, particularly by restricting access to foreign components necessary to produce weapons systems.

 

If Russia does not initiate a mandatory mobilization and identify substantial third-party ammunition supplies, it will be increasingly challenging for them to sustain even the current level of offensive operations in the coming months and, consequently, they may fully shift to holding and defending the territories they now occupy.

 

In short, we do not foresee the Russian military recovering enough this year to make major territorial gains, but Putin most likely calculates that time works in his favor and that prolonging the war — including with potential pauses in the fighting — may be his best remaining pathway to eventually securing Russian strategic interests in Ukraine, even if it takes several years.

 

Ukraine, of course, also faces challenges. Ukraine’s prospects for success in a major spring offensive will probably hinge on a number of factors. At present, the Ukrainian Armed Forces remains locked in a struggle to defend against Russian offensives across eastern Ukraine. While these Russian assaults are costly for Russia, the extent to which Ukrainian forces are having to draw down their reserves and equipment, as well as suffer further casualties, will all likely factor into Ukraine’s ability to go on the offensive later this spring.

 

The IC continues to monitor Putin’s reactions and his nuclear saber rattling. Our analysts assess that his current posturing is intended to deter the West from providing additional support to Ukraine as he weighs a further escalation of the conflict. He probably still remains confident that Russia can eventually militarily defeat Ukraine and wants to prevent Western support from tipping the balance and forcing a conflict with NATO.

 

And, of course, the already considerable human toll of the conflict is only increasing. In addition to the many tens of thousands of casualties suffered by the Russian and Ukrainian militaries, more than 8 million people have been forced to flee Ukraine since Russia invaded. There is widespread reporting of atrocities committed by Russian forces, including deliberate strikes against non-military targets such as Ukraine’s civilian population and civilian infrastructure, particularly its energy facilities and electric grid. Russia and its proxy groups almost certainly are using so-called filtration operations to detain and forcibly deport tens of thousands of Ukrainian civilians to Russia. The IC is engaged with other parts of the U.S. Government to document and hold Russia and Russian actors accountable for their actions.

 

The reaction to the invasion from countries around the world has been resolute, hurting Russia’s reputation and generating criticism at home.

 

Moscow has suffered losses that will require years of rebuilding and leave it less capable of posing a conventional military threat to Europe and operating assertively in Eurasia and on the global stage. As a result, Russia will become even more reliant on asymmetric options — such as nuclear, cyber, and space capabilities — and on China.

 

Our assessment also covers Iran, which continues to pursue its longstanding ambitions for regional leadership and is a threat to U.S. persons directly and via proxy attacks. Iran also remains a threat to Israel, both directly through its missile and UAV forces and indirectly through its support of Lebanese Hizballah and other proxies. Most concerning, Iran has accelerated the expansion of its nuclear program, stating that it is no longer constrained by JCPOA limits, and has undertaken research and development activities that would bring it closer to producing the fissile material necessary for completing a nuclear device following a decision to do so.

 

North Korea similarly remains a proliferation concern as it continues its efforts to steadily expand and enhance its nuclear and conventional capabilities targeting the United States and our allies, periodically using aggressive and potentially destabilizing actions to reshape the regional security environment in its favor and to reinforce its status as a de facto nuclear power.

 

In addition, regional challenges — such as interstate conflicts, key cases of instability, and poor governance developments — also pose growing challenges. In Africa and the developing world, increased poverty, hindered economic growth, and widened inequality are creating the conditions that are feeding domestic unrest, insurgencies, democratic backsliding, authoritarianism, and cross-border conflict spillover.

 

Several parts of the Middle East will remain plagued by war over the year, insurgencies, and corruption. In the Western Hemisphere, persistent economic weakness, insecurity, and corruption are fueling public frustration and anti-status quo pressures that very likely will present governance challenges to leaders, while also posing sustained spillover migration, criminal, and economic challenges for the United States.

 

Throughout the world, countries are struggling to maintain democratic systems and prevent the rise of authoritarians, in some cases because Russia and China are helping autocrats take or hold power.

 

As I noted at the outset, transnational challenges interact in this complex system along with more traditional threats and often reinforce each other, creating compounding and cascading risks to U.S. national security. For example, climate change remains an urgent threat that will increasingly exacerbate risks to U.S. national security as the physical impacts increase and geopolitical tensions mount over the global response to the challenge.

 

And, now entering its fourth year, the COVID-19 pandemic remains one of the most significant threats to global public health, at a cost of more than 6.5 million lives and trillions of dollars in lost economic output to date. In addition to direct effects of the pandemic, resultant economic, human security, political, and national security implications of COVID-19 continue to strain recovery efforts, presenting both known and unforeseen challenges that probably will ripple through society and the global economy during the next year and for years to come.

 

Russia’s aggression against Ukraine has aggravated COVID-19-related fragilities in the global economy, raised commodity prices, fueled market volatility, and contributed to food insecurity and financial instability. The combination of elevated energy and food prices has increased the number of individuals facing extreme poverty and food insecurity.

 

Affected countries will struggle to reverse those trends through 2023, even if global food prices stabilize. Russia’s war in Ukraine can be blamed for these intensifying effects, something much of the world also understands and that others — including China — will have to come to terms with as they consider to what extent they want to continue assisting or enabling Russia.

 

Climate change, the pandemic, and conflicts are exacerbating irregular migration, and, in the Western Hemisphere, push and pull factors that drive migrants to the United States — such as deteriorating socioeconomic and security conditions, misperceptions of U.S. policies, and employment opportunities in the United States — will almost certainly persist through 2023.

 

Transnational criminal organizations exploit migrants through extortion, kidnapping, and human trafficking, including sex trafficking and forced labor. These organizations also continue to pose a direct threat through the production and trafficking of lethal illicit drugs, massive theft, financial and cyber crimes, money laundering, and eroding the rule of law in partner nations.

 

In particular, the threat from illicit drugs is at historic levels, with the robust supply of synthetic opioids from Mexican TCOs continuing to play a major role in driving American overdose deaths to over 100,000 annually.

 

And terrorism, of course, remains a persistent threat, but the problem is evolving. Individuals and cells adhering to ideologies espoused by ISIS, al-Qa‘ida, and transnational racially or ethnically motivated violent extremist movements, in particular, pose significant threats to U.S. persons, facilities, and interests.

 

And then two indirect threats that I think are worth highlighting in the report.

 

New technologies — particularly in the fields of AI and biotechnologies — are being developed and proliferating faster than companies and governments are able to shape norms governing their use, protect against privacy challenges associated with them, and prevent dangerous outcomes that they can trigger. The convergence of emerging technologies is likely to create breakthroughs that are not as predictable and that risk a rapid development of more interconnected, asymmetric threats to U.S. interests.

 

Relatedly, foreign states’ malicious use of digital information and communication technologies will become more pervasive, automated, targeted, and complex during the next few years, threatening to distort publicly available information and probably outpacing efforts to protect digital freedoms and, at the same time, educate audiences on how to distinguish fact from propaganda. Authoritarian governments usually are the principal offenders of digital repression, and, of course, democracies with open information environments are the most vulnerable to them.

 

In closing, I want to bring to your attention an absolutely crucial authority that will expire at the end of this year if Congress does not act — Section 702 of the Foreign Intelligence Surveillance Act. I can tell you without hesitation that Section 702 was relied upon in gathering intelligence that was relevant to putting together this assessment, as it is hard to overestimate, frankly, the importance of this authority to our work across the board.

 

FISA Section 702 provides unique intelligence on foreign intelligence targets at a speed and reliability that we cannot replicate with any other authority.

 

Section 702 was originally enacted with the primary focus of enabling the U.S. Government to quickly collect on the communications of terrorists abroad. The authority allows the IC to acquire foreign intelligence from non-U.S. people located outside of the United States who are using U.S. electronic communications service providers.

 

702 is still vital to our counterterrorism mission, as evidenced by its key role in the United States Government’s operation against former al-Qa‘ida Ayman Zawahiri. But 702 is now principally relied upon for vital insights across a range of high priority threats — malicious cyber actors targeting U.S. critical infrastructure, U.S. Government efforts to stop components of weapons of mass destruction from reaching foreign actors, and even key intelligence related to threats emanating from China, Russia, North Korea, and Iran.

 

I realize that 702 is a powerful authority, and it is incumbent on all of us in the Intelligence Community to ensure that the privacy and civil liberty interests of Americans are built into its design and implemented at every level. Over the last many years, we have significantly expanded oversight and dedicated resources to compliance in order to do just that — and we welcome the opportunity to work with you on reauthorizing this critical authority.

 

Thank you so much for your patience. We look forward to your questions.

 

 

 

###

A Conference on Today's Competitive Geopolitical Landscape -- In Honor of Robert Jervis

On February 17, 2023, Director of National Intelligence Avril Haines delivered keynote remarks at Columbia University’s School of International and Public Affairs’ (SIPA) annual Gabriel Silver Lecture Dedicated to International Peace as part of “A Conference on Today’s Competitive Geopolitical Landscape — in honor of Robert Jervis.”

On February 17, 2023, Director of National Intelligence Avril Haines delivered keynote remarks at Columbia University’s School of International and Public Affairs’ (SIPA) annual Gabriel Silver Lecture Dedicated to International Peace as part of “A Conference on Today’s Competitive Geopolitical Landscape — in honor of Robert Jervis.” One of the modern era’s most significant international relations scholars, Jervis taught at Columbia for more than four decades and his groundbreaking theories reshaped the field’s view of political psychology, great power competition, nuclear weapons, and intelligence. Following the keynote, SIPA Dean Keren Yarhi-Milo moderated a fireside chat with the DNI. The conference is available to view here, and the transcript is below.

 

 

Office of the Director of National Intelligence

Director Avril Haines at Columbia University

A Conference on Today's Competitive Geopolitical Landscape -- In Honor of Robert Jervis

 

Friday, February 17, 2023

9:00 a.m.

 

DIRECTOR HAINES: Good afternoon everyone. It is really an incredible honor to be here with Secretary Clinton and Jack and Ira. And President Bollinger thank you. It is extraordinary, but I am especially honored to be here today to deliver the annual Gabriel Silver lecture, and to do so on behalf of the Intelligence Community in honor of Bob Jervis, whose life, work, and legacy is so dear to us personally and professionally.

 

All of you know that Bob was a world renowned international relations scholar and teacher, and I know you also know that he made significant contributions to the study of intelligence. But what you may not know is that extent of his work with the Intelligence Community over more than 40 years, and the fact that he is absolutely beloved by analysts and officers across the Community, many of whom emailed me to tell me about their experiences with Bob over the years, knowing that I would be coming here to talk to you today about his work.

 

Those who sent me notes reflected on his wisdom, on his humility, on his sense of humor, kindness, integrity, and of course, that he was a great sounding board for their work. He charmed all of us with his exuberance, the twinkle that he would get in his eye, you know, when he saw a weakness in an argument, and his boundless intellectual curiosity.

 

And they also talked about the fact that, as one officer noted, he respected the Agency enough to criticize it forthrightly, fairly, and constructively. In many ways, Bob was a model for how the Intelligence Community can and should interact with academia. He unquestionably made us better.

 

Bob's engagement with the IC started in the late 1970's when CIA's head of analysis invited Bob to serve as a scholar in residence. And this relationship led to Bob producing a post mortem on CIA's assessment of Iran in the months leading up to the fall of the Shaw in 1979.

 

 

In this now declassified study, Bob flagged numerous concerns, including poor sourcing, status quo bias, the tyranny of expertise and politicization. And he went on to produce another review on one of our biggest intelligence failures as the Secretary mentioned, the assessment of an active WMD program in Iraq in 2002.

 

And in his book “Why Intelligence Failed,” Bob pointed to logic flaws and tradecraft weaknesses that culminated in our analytic judgment call, and is remembered by many who lived through that time as nuanced and thoughtful. And those efforts had a significant impact on our work, leading to changes in how we train our analysts today.

 

Moreover, there are many other instances in which Bob's work affected our training. For example, Bob would talk about his book, “System Affects,” as his most important work, which received significant attention from our analysts.

 

It was groundbreaking in applying complex, adaptive systems theory to international relations, and attempted to elucidate the challenges that arise when multiple actors and influences are interconnected, often resulting in unintended consequences and nonlinearities. His work again changed our approach to teaching advanced critical thinking. I believe that the closest thing we have to academia in government is the analytic community within the Intelligence Community. There's a bit more stress, no windows, fewer public publications, but still, we put a high value on independence of thought, freedom of speech, dialogue and debate.

 

We value rigor, expertise, evidence driven analysis. We are trying to understand and reflect on the world around us, and to provide policymakers and operators with insights that will help them make better decisions. Bob respected and loved the Community; however, he would be among the first to tell you that the classified nature and pressure of our work makes us especially susceptible to a number of cognitive and motivated biases.

 

And consequently, interactions with those outside of our Community to test our hypotheses are absolutely critical to our successes. Long before most, Bob recognized the value and importance of a strong partnership between the Intelligence Community and academia.

 

 

He encouraged the Intelligence Community to engage frequently with a broad range of experts outside of the government, and not just experts and scholars and academia, but also in the private sector. To ensure we had access to alternative perspectives to identify our biases, to challenge our underlying assumptions.

 

For decades, Bob gave generously of his time and insights, repeatedly reviewing our assessments, helping us to develop approaches, techniques, to make our work better. And for decades he was a trusted and valued interlocutor for multiple IC agencies.

 

He regularly participated in conferences, as Karen noted, brainstorming sessions, often heated debates, helping us make sense of emerging dynamics and long term trends, including contributing to such publications as our quadrennial global trends series.

 

And in fact, in 2020, he helped the National Intelligence Council, the NIC, conceptualize the scenarios for the most recent global trends report. And despite his prominence, and the busy schedule that came with it, Bob was always approachable, friendly, open to debates and discussion. He helped pressure test many of our analytic lines over the years, making us more confident in some of the work that we had done, and in other cases less confident, pushing us to develop new scenarios, and envision alternative possibilities.

 

Bob stressed the importance, for example, of falsifiable claims, asking what would cause us to reconsider our views? And also stressed the importance of careful, disciplined, and explicit reasoning that revealed where any differences of opinion lie. He believed that adopting good, social science methods would improve our chances of getting things right.

 

But he also never suggested that doing this would be easy. In all cases he understood the fact that intelligence analysts rarely have the luxury of time, do not always get to choose the questions they are answering. His pragmatism, humility, empathy were fundamental to his capacity to impact our work.

 

Bob also pushed us to declassify more information to better inform the American people during his decade of work with the CIA's historical review panel, for example. He believed it was critical that we make as much information available as we could to allow the public to assess policy successes, and failures, in a broader context, to understand their complexity, and hopefully help us make better decisions in the future.

 

 

And for this reason I think he would approve of our new transparency initiative, an effort that fundamentally seeks to promote and inform citizenry, greater accountability, and improved trust between the American people and the Intelligence Community. Through this initiative, we are proactively publishing unclassified and declassifying IC analytic work on our website, DNI.gov, on some of our most vexing national security problems.

 

And with the increasing importance of national security in our everyday lives, the more we can help to inform the public debate around such issues the better. But by doing so, we also give the public, including academia, a chance to contest our thinking, draw to our attention questions or perspectives we have not considered, and learn from those outside of our traditional circles.

 

At the same time, I'm hopeful that it gives the public a chance to observe the thoughtfulness and rigor, with which we approach national security issues. We're opening up our judgments to greater scrutiny and debate, making us, I hope, more attractive to diverse talent and expertise from across the country.

 

And as Bob worked to improve our capacity for self reflection, bring additional social science methods into analysis, promote engagement with outsiders who would test our assumptions, and promote an organizational culture better suited to counter our biases, and one would think that that would be enough, and yet his impact goes even further.

 

Specifically, let me just give an example of how this scholarship has informed our work to great effect in the context of today's geopolitical competitive landscape, which is the topic of this conference. One of Bob's critical scholarly insights was the role that individual leader's perceptions and formative experiences play in national decision making.

 

International relations have for some time focused primarily on the role of the state, with the view that the constraints of broader political, social, and economic forces significantly reduce the ability of any given individual to exert an amount of influence on state level decisions.

 

As Professor McDermott, one of his prior students wrote, "Prior to Jervis, most international relations theory would have argued that it would not have mattered if Adolf Hitler or Bill Clinton had been the leader of Germany in the 1930's. The assumption was that the outcomes would have been the same because the incentives and constraints on the international environment were seen as dispositive.”

 

But Bob's work rooted in social psychology recognized the importance of leaders, their perceptions, and misperceptions, particularly in the context of crises and how that could affect national decision making. In fact, he opened up his book on “Why Intelligence Fails” with a series of quotes, including one that seems especially relevant today.

 

"We missed the Soviet decision to put missiles into Cuba because we could not believe that Khrushchev would make such a mistake." This was said by Sherman Kent, a Yale University professor of history, who during World War II and for 17 years of the Cold War served at the CIA, and after whom the Kent School for Intelligence Analysis is named.

 

The quote encapsulates one of the primary pitfalls of the old way of evaluating foreign decision making, a clear bias towards rational actor theory, with a hefty dose of mirror imaging. Bob was telling us that our own biases kept us from understanding the actual perceptions and motivations of our adversaries.

 

Khrushchev was making a mistake, only from the viewpoint of an American. If we had taken that approach in the context of the Russia-Ukraine conflict, we would never have predicted the tragic and illegal, large scale invasion of Ukraine that the IC warned of in the fall of 2021.

 

And as we told the world that President Putin was preparing for a large scale invasion into Ukraine, we repeatedly encountered skepticism based on the perception that this would be a terrible mistake for Russia, and consequently Putin, as a rational actor, would not do it.

 

Well, such a reaction was understandable. The insight the analyst provided was that from Putin's perspective it made sense. He had long lamented the breakup of the Soviet Union, which he calls the greatest tragedy of the 20th Century, and for some time wanted to restore Russia to what he perceived as its former glory.

 

In his mind Ukraine has special significance, given its cultural and historical bonds to Russia, and he does not want to be known as the Russian leader who lost Ukraine. Yet Ukraine was moving, clearly, further and further away from Russia, and slowly deepening its engagement with the West and with NATO.

 

President Putin perceived Ukraine's military as getting increasingly stronger with assistance from the West and was of the view that the Minsk Agreement was effectively dead, in part because the political process associated with its implementation through the Normandy format was, again in his view, incapable of delivering Ukrainian compliance in accordance with his demands.

 

And, thus, having exhausted political possibilities in his view, military action would be the best remaining option to prevent greater Ukrainian integration with the West, which he believed to be a significant threat to Russia's national security. Furthermore, given the trend lines, it would only get more difficult to affect a military option over time. Putin would, of course, know that Europe and the United States would react to such an invasion, including through sanctions.

 

But he thought he could conduct the military offensive quickly, would be welcomed by most Ukrainians, and that he would be better at maintaining his resolve in the face of sanctions, than Europe would be. And he only had high reserves at the time, a strong national wealth fund, some of the strongest economic indicators in almost a decade, a few years before his next election.

 

And with high energy prices he likely thought that it would make it harder for Europe to join the United States in issuing significant sanctions that would also carry a cost for Europe's domestic economies. In short, the IC took Bob's lessons to heart, and strove to see the world through Putin's eyes. And not through the eyes of an American standing in a different place.

 

This lesson will be equally important to carry through into our analysis with respect to China. In fact, to guard against mirror imaging, we work with experts across a series of fields from anthropology, to sociology, to political psychology, to help us better understand the drivers of foreign decision making.

 

We use structure analytic techniques to help us better take into account the perceptions and views of the adversary and dampen the effects of our own biases. Techniques like formal red teaming help us emulate adversary thinking and gaming exercises offer an opportunity to test foreign decision making under stressful conditions.

 

That teamwork, pairing our outside expertise with internal intelligence analysis, allowed our analysts to call Putin's decision to invade long before it looked obvious or inevitable, because it made sense to him. At that point many people who claim they understood Russia and Putin were still talking about what a mistake it would be because it made so little sense to them.

 

We will, of course, continue to make mistakes, but we strive to learn the lessons that allow us to preserve and advance with those like Bob and others in and out of the Community have struggled to learn and apply over the years. I hope Bob would be proud of our work on Ukraine, even as I am confident he would also point out how we could continue to get better at the things that we might have gotten wrong.

 

But that is in part of the joy of the partnership between our institutions, which help organize our learning to greater effect for the future. In sum, Bob's work has had an enduring impact on the Intelligence Community, including on the way we think about the business of intelligence and the way we go about pursuing and then conveying it.

 

But above all, I cannot tell you how grateful all of us are to have had the opportunity to work with Bob. He was a genuinely wonderful human being, who exemplified the rigorous critical thinking and essential collaboration that is so crucial to our work and service to the country. And I just could not be more honored to have a chance to do him some honor. Thank you so much.

 

MODERATOR: Thank you so much for coming, for being with us today and for those beautiful remarks about Bob. We really, really appreciate it. All right. There's a lot that we want to cover, and we're very excited that you're here. I'm sure that many, many of our students in the room, and faculty are curious first to hear about your journey to the national security arena.

 

You are currently the first female Director of National Intelligence, and oversee the entire U.S. Intelligence Community, but you've also held various senior posts, as Principal Deputy, National Security Advisor to the President, Deputy Director of the CIA, and yet when we look at your undergraduate degree, you were a physics major.

 

DIRECTOR HAINES: What went wrong?

 

MODERATOR: What went right? So, at what point in your career did you follow along with national security? And maybe I should start with how does it feel to be back at Columbia after two years?

 

DIRECTOR HAINES: It's wonderful. It feels like I've been off on a separate island for a while. Like I sort of came back. It's lovely to be back here, to see so many people that I haven't had a chance to talk to. But you know, nobody ever really asked me the question in the way that you just did.

 

Honestly, it was a bit of a mistake, which is a terrible thing to acknowledge, but I loved physics and math, it was sort of what I was better at when I was younger, and when I opened up a book store cafe and became a business owner, which I thought to do while I was in grad school, which was a terrible idea, I started to learn about what it was like to be part of a community.

 

And it was really a different way of looking at the world in a sense. And I really enjoyed it, although I will say that my father at the time called my boyfriend, who I was opening the business with, and said you know, this is a terrible mistake. She's good at math, but you are going to have to support her if she goes down this other route, and it's going to be terrible.

 

But it was really, it was sort of an awakening to public service, and to what it means to be a responsible participant in community. And then I ended up going to law school and getting a job in the State Department, and I followed people that I respected, and I kept on learning new things, and feeling as if the work was consequential, and that's how I ended up in national security, yeah.

 

MODERATOR: Wonderful. We're lucky that you are in this business. So there is a lot of topics that we could throw up here, but one that seems to be most on everyone's mind is Ukraine and balloons. In political--

 

DIRECTOR HAINES: It will be okay.

 

MODERATOR: No, we will, we will. In political science we think of war, no matter what the motivation. If it's greed or security dilemma, or whatever it is, the war by itself reveals information from both sides about the balance of capabilities, resolve, and so on, which usually with that kind of revelation updating happens about warring, strategies, and so on.

 

So, I guess my question is two questions. Now we've been in this war for almost a year now. Do we see any shift in strategic goals or warnings by any side? By either side? And second, what should we expect to see in the next couple of months on the battlefield in your opinion.

 

DIRECTOR HAINES: I mean in terms of different strategic objectives, I think in some respects both sides have become more dug in, instead of there being a clear shift in objectives. And in terms of what we're going to see in the coming months, so here's kind of the general assessment of where we're at.

 

We're in what we call a grinding deadlock right now, where basically both sides are, you know, pushing at each other, and neither has really definitive military advantage, and we're not expecting that either side is really capable in taking major territorial gains.

 

We're seeing them move hundreds of meters some days, sometimes a bit more, but it's not significant in that respect. But we are also getting into kind of the spring offensive potential perspective, and we are seeing Russia attempt an offensive right now, even though it's not moving particularly quickly. But both sides are experiencing some pretty significant challenges, and one of the questions is whether or not for example, as the Russians are engaging in the offensive that they're in right now, how costly will that offensive be to them.

 

Will they in fact mobilize, will be one of the questions. Personnel shortages is one of the clear issues. Will they be able to essentially set up supply lines for ammunition that will allow them to, you know, resupply in effect, and to address some of their challenges on their side.

 

And if it is costly, and they're unable to do some of those things that can present essentially opportunities for the Ukrainians. And if they are, that will make it more challenging obviously. And on the Ukrainian side, they're relying just remarkably on Western assistance and aid, and that will be critical to their capacity to effectively move forward, and so we'll see how this continues in the coming months.

 

But we'll be I think the next, you know, six months or so going through to the summer will be a critical period essentially for the rest of the trajectory of the conflict.

 

MODERATOR: And talking for a second about surprises so far. Let's stay with that theme. So when we talked about surprises about the scope of revisionist intention. Surprises about the Russians' ability to fight, the military performance so far.

 

So the surprise about Zelensky and the resolve of the Ukrainians and their ability to sustain the fighting, and do so well on the battlefield. And then there was a surprise around the cyber component of it, or lack of more active cyber warfare. We haven't seen NATO and the United States been the target in the way that we anticipated.

 

So all of these things that we've been surprised with, what caught you by surprise the most?

 

DIRECTOR HAINES: I mean I think I'll get through a few of the things that are on your list, and then add maybe one or two. But I think one thing that we clearly have work to do in the Intelligence Community. And we have talked about this openly, but is the sort of will to fight questions, which are very challenging frankly with us, and we've gone through a variety of kind of learning lessons, pieces on this.

 

But I think there's I think we can improve, but I think there is a sort of a limit to what you can do in this space effectively. And then there is assessing the capacity of another military to execute on, you know, essentially a mission. And in the context of Russia as you say, you know, I think this was an area where we did not assess what occurred in terms of the Russian capacity.

 

And there were a lot of things that contributed to that that I think are actually quite interesting, and I won't go through everything, but I'll just name a few that I think are sort of the best. I mean one that is perhaps obvious is while we indicated that we thought that Putin and the Russia military was underestimating the resistance that they would encounter when they came into Ukraine.

 

What we did not then follow through on in that context is okay, they were actually planning for a different conflict than the one that they ended up with, right? So they planned for the short siege, and they didn't plan for the long siege, right? And you want different equipment, you want different approaches when you're going for that operation as opposed to another.

 

So it's an example of one of the challenges. The other thing is that they did their planning in a very tight way. In other words they were trying to keep it very close hold, right? And as a consequence they weren't doing the normal, you know, what we would say, the interagency coordination, right like across the board.

 

So you can also see how some of the challenges come up when you don't think about, you know, if you don't have the right logistics folks in there readily doing it. And I remember one of our generals saying, you know, when you're doing planning it's really, it's two thirds of your time in working at the plan is the planning.

 

And one of the -- for the decision making process, doing it. And they could already see how that was sort of breaking down in different spaces. So there are a number of things that kind of come into this, and I could go on, but we do find it intellectually fascinating.

 

And I think it is something that we can continue to learn, and it makes you realize too that, you know, to say on this point that it's not just about understanding the capabilities of a military, but it's actually about thinking about their capacity executing against a particular mission, and how they're looking at it, and what they're doing in relation to it.

 

You know, all of these other things that you're sort of having to factor in to what your assessment is as to the capacity of them to actually follow through. The one thing that you didn't mention that I'll just flag that I thought was quite interesting. You know, we did a lot of work, obviously, for the policy community in looking at sanctions. What are the sanctions that you might enact, and what would be the possible impact of that, and you know, and so on.

 

And one of the things we did not anticipate was the degree to which private companies, multi national companies, corporations that have a big impact, like all services and so on, self sanctioned afterwards, right? And you know, that's an important factor to think about, and to understand how that's going to develop, and that's something that yeah, that we should have been thinking about and looking at.

 

And it's kind of to my point of my remarks too. Getting out of our space and talking to folks in all walks of life and understanding better is critical to us getting better at our job.

 

MODERATOR: Absolutely. So, in the past year I've been playing this game, what Bob would have been fascinated about the most about this war. What would he have been writing about? And I think that the one thing that I have strong feeling that would have caught his attention is the decision early on to share intelligence about the Russians’ plans to attack to invade.

 

And, you know, we shared intelligence with allies, but this was a little bit -- a little different right? The scope, sharing not just with allies, with the public, with Putin himself. And I want to ask you about that decision because there were a couple of issues that comes up when the decision to share and reveal and disclose intelligence.

 

One is obviously the issues about burning sources and methods, and how do you weight that against the benefit? Another issue is thinking about the precedent that you are setting, because from now on does it mean that when the United States wants to bring allies onboard it is going to be expected to share this kind of intelligence with them?

 

And I'm sure that if you think about one of the goals of the intelligence, the sharing of disclosing was maybe to deter Putin, and that did not happen. So there were costs for this idea of thinking about the sharing in disclosing intelligence. But there were obviously lots of benefits.

 

And so if you can share a little bit about the decision making process, and how you weighted in all those other costs against the benefits and so on. Love to hear it.

 

DIRECTOR HAINES: Yeah. And can I just on the precedent issue, and the way that you identified it, I mean I have to say I think that's already a precedent that was set. But I mean in the sense, and I'm not and maybe this is not the right way to think about it, and I'd be interested in how you're framing it. But it has certainly been true that when we've asked allies and partners to work with us on responses to a variety of things, that they want to know if we're saying that we're responding to a threat, right? Like where's the evidence, you know.

 

And in this context part of the challenge, and maybe I'll go through the decision making process to highlight this, and see what you think.

 

MODERATOR: Yeah. Please.

 

DIRECTOR HAINES: Because what happened for us was we were collecting information that obviously led us to believe that something was happening here. That Putin was preparing for an option, a military option. And as we did this in the lead up, you know, so that in the fall essentially, of 2021, we had had a previous event, which folks may remember in sort of the spring period, the kind of March, April, May period where there had been another buildup by the Russians. Right?

 

It wasn't as extensive as the one that we had in the fall, but it was apparent buildup. And we were trying to understand what that was about, and whether that was setting up for a military option, but in many respects it seemed as if going through it may he was considering it, but it looked like in large part it was there to kind of bully a bit, you know, just sort of use the military buildup as a way to coerce diplomacy in a sense.

 

And so for many of the Europeans that we were talking to as we were then in the fall, and seeing this different kind of buildup, the concern was well, it's just another example of what he was doing before, right? Why is it different now? What's the change? And why do you believe he's going to do something?

 

And there was sort of two pieces to this. You know, the question was okay, are we getting this right, but then also if we are getting it right and we're working with Europeans, whatever the likelihood of this occurring is, would we precipitate him doing something by virtue of the fact that we're working on response options right?

 

MODERATOR: Yes.

 

DIRECTOR HAINES: So, because often what you do to deter also can escalate, right? And so, the challenge in the very first part was that we had to convince our own policy community, right, you know, we're providing information. We're testing it, we're saying is this actually -- does this seem right?

 

And when we got to the point where the President said okay, you know, Tony, Jake, I want you to go out there. Start talking to allies. We've got to figure out is there a way for us to deter? Is there a way for us to plan for a response option? Because if this does happen we're going to be ready for it, right?

 

So, they went out, and I remember they came back, and basically they said well they're really skeptical, like many of the folks that we're talking to, you know, don't think that this is going to happen, and are not really ready to plan. And that was when he turned to us in the Intelligence Community and said you’ve got to share.

 

You have to get out there and starting sharing because we've got to help them see what you're seeing so that they are ready to talk to us seriously about what to do. And I think, you know, in that context, it makes sense from those countries’ perspective to ask for what's the information that you're basing this on? Why should we be paying attention?

 

Why should we take the risk, essentially, and the time and resources to engage in this? So that's one piece of it. I would also say, you know, when you're sharing with allies, right, you're doing it in a classified form, you're not disclosing it publicly.

 

It really was a separate issue as we were doing this right, where we basically identified, you know, Putin was putting together pretexts for an invasion, and at some point the President said, you know, we should disclose this right? We should deny him the pretext for the invasion, and thought that made sense right? Can we do that?

 

So, the first thing we do exactly as you say, is sources and methods right? Are we going to be able to protect our sources and methods because obviously we're only as good as our sources and methods, right? We're not going to be able to continue providing you with this intelligence if we lose them.

 

So, we had to make sure that we could figure out a way to do this, that would be protective of sources and methods. And it was a team sport in the Intelligence Community, which is to say we really -- there was working together across the Intelligence Community to think through how we could put together information from open source essentially.

 

And that meant doing things like, you know, leveraging commercial imagery, or you know, sort of thinking about what is available in the open source that we could look at that would help us.

 

MODERATOR: You got that right.

 

DIRECTOR HAINES: Exactly. So I think we really, you know, and it's way too early to tell. I mean we've been asked, all of us in testimony and in Congress and so on, have you seen any degradation? And we haven't at this stage.

 

MODERATOR: All right.

 

DIRECTOR HAINES: But that doesn't mean that we won't over time, and you know, this is one of those things that takes a while to sort of see how it goes.

 

MODERATOR: Yes.

 

DIRECTOR HAINES: But we've done a lot of work to try to protect that. I think on the precedent piece, you’ve heard sort of my theory on this, and I think, you know, and the pieces that I was worried about that you didn't mention are as follows. One is in addition to sources and methods, it's we're promoting disclosures of information for the policy community in support of their efforts.

 

I did not want the Intelligence Community to be perceived as just a tool of policy right?

 

MODERATOR: Yeah.

 

DIRECTOR HAINES: And this was something that, you know, we spent some time thinking about. So for example, when I went to the North Atlantic Council to put down the case, Tony and I talked. And I said I don't want to do this with you. I think it would be better if I did it separately, I brought the analyst with me, and we answered their questions.

 

We never cleared our talking points, we just laid it out as we could, and then policy could come afterwards, and have a discussion, and so we would sort of have a distinction between us. But this is a challenging thing that we're constantly trying to think through how we manage it yeah.

 

MODERATOR: Very interesting. We could spend hours.

 

DIRECTOR HAINES: I know. We could.

 

MODERATOR: This disclosure, it’s fascinating. All right. So let's shift from Russia to China.

 

DIRECTOR HAINES: Yeah. Big question.

 

MODERATOR: So the fundamental question that comes up for students of world history, especially in your room with political scientists. We tend to think about patterns, and we tend to think okay, so what can we learn from the Cold War? And this came up today, the panel on nuclear weapons and so on.

 

Can we learn something about interaction between the Soviet Union and the United States during the Cold War that led to the time let's say, in terms of how we think about the future of U.S.-China relations. So what are the issue, what were the factors that led to the emergence of the talk?

 

Well we know there was parity in the coalition of the forces, and we know that we had a series of crisis, the Berlin, the Cuban Missile Crisis, that led to establish some rules of the games and so on. That's one way of thinking about what do we need in order to get to this period of time with China? Others will say very different actors, very different environment. Cold War does not really serve us well in thinking about it. Where do you stand on this?

 

How do you think about the Cold War? Should it inform and in what way should it inform our thinking about U.S.-China?

 

DIRECTOR HAINES: Yeah. I mean it's part policy and part intelligence, right? I will try and do the analytic piece.

 

MODERATOR: The intelligence part. I know.

 

 

MODERATOR: No, no, fair enough, fair enough.

 

DIRECTOR HAINES: But I do think there's some interesting differences, and maybe I'll just reflect on a few of these areas, you’ve done a lot of work so obviously tell me what you think too. I am one difference that is challenging I would say is that we had a lot of channels with whether it was, you know, the Soviet Union, and then Russia, etc., and built this up over time, and not to say that they were easy.

 

And not to say that, you know, they always worked in the way you wanted them to work, but one of the challenges with China is that they tend to clamp down in a crisis and not talk. And sort of providing for and developing those kinds of channels is harder.

 

It's been a more challenging and I know Secretary Clinton with others would yeah, think about this and have views. But it is you know, in terms of you're sort of setting up for rules and trying to develop the sort of frameworks within which you try to manage escalation and issues moving forward.

 

There are obviously and people have written on the differences between China and Russia at this moment, and you know, there are clear, contrasts I think that are worth understanding, not the least of which, you know, China's economic integration with us is just in a very different place, right, and there's a whole other dynamic that is important to the relationship, these issues.

 

But there are also I would say, you know, it is as we're trying to provide assessments to the President and you know, National Security Council and so on, on these issues with China, we are mindful of the fact that in almost every respect China's timelines and perspectives are very long term.

 

That our efforts to lay things out is sort of there's almost an asymmetry in the way in which our, you know, political centers interact on these kinds of questions. And as a consequence, trying to help frame our policy efforts, and for us we're usually being asked what are the impacts of you know, what we're doing, and then how are the Chinese perceiving it? And does that give us greater challenges or opportunities in these moments.

 

 

It's rather difficult to pull out for them what are the opportunities for you to shift their thinking. Exactly, in ways that are consistent with the way we operate effectively. And but it is ... It's been a very interesting thing among other things, to watch. I think Xi has been obviously in charge for quite some time now, you know, sort of how he's developed over time, and how that is shifting and watching the third party Congress, and other things. So how do you think about this?

 

MODERATOR: People are not here to hear what I think about it. We'll be talking about -- we have dinner to talk about it. And the next question is very much, very -- to the research I've done, which is how did the Intelligence Community think about it, assess political tensions, and a long term intentions of adversaries?

 

And why do we see the patterns that we see in assessment over time? And even when the disagreement is within the Intelligence Community? And yes, that gets me to again, the issues of assessment of China's intentions.

 

So your office put out a threat assessment that says about China's intentions, that the Chinese Communist Party, the CCP, will continue efforts to achieve President Xi Jinping's vision of making China a preeminent power in East Asia, and a major power on the world stage -- a major power on the world stage.

 

But the national security strategy from 2022 says that Beijing's ambitions is to become the world's leading power. Now for the untrained eye, this may seem like splitting hairs, right? But from the perspective of a political scientist, the ODNI assessment sounds very much like multi polarity. Great power out of several great powers.

 

Whereas the national security strategy reads very much like replacing the United States as the hegemony-- unipolarity. So for me, this is fascinating. It's very relevant to the work that I've done. What accounts for the differences? What are the implications? Does it point to a disagreement within the Intelligence Community about China's intentions and so on?

 

DIRECTOR HAINES: So I think it's really more a question of timelines. In other words, from our assessment, it's not that our assessment would be intentioned with the national security strategy because I think over time China is looking to be the leading power. And we have kind of a claim on that. It's just it's looking out for a longer term.

 

But I would say a couple things. I mean that is also not to say that it wouldn't be fine if there were tension right?

 

MODERATOR: Right.

 

DIRECTOR HAINES: Because from my perspective

 

MODERATOR: Normal.

 

DIRECTOR HAINES: Totally. And you're right that you know, one of the things, and Bob would talk about this a fair amount, and was worried that we were not reflecting this sense enough in our analysis and pushing that in, and I think that's a very fair concern, and we've been actually trying to do that because I think it actually helps people who are reading the work, understand better sometimes, how did the analyst come to a certain decision where there are these differences of opinion and why?

 

So we have, you know, obviously we have a big Community, we have different views, we try to reflect that. But it is also important, I think, to preserve the understanding that we may come to an assessment, and the policy community can disagree. That's perfectly fine right?

 

They have the benefit of our views, and they look at it and they say no, we don't think so. So we're going to take a different assessment essentially for themselves, and work on that basis. But in this case I would say it's not really, I think, a real--

 

MODERATOR: It’s not a disagreement but more a timeframe. So anything about Xi's order to the military to plan for a successful invasion of Taiwan by 2027? Can you talk a little bit about what does that announcement, you know, what does it do for your assessment of thinking about it? How do we portray the intentions? Does it make sense to talk about a 2027 date because it's coming up again and again, even in Bill Burns’s statement lately.

 

DIRECTOR HAINES: I mean look we assess that China continues to preference, basically, a peaceful, you know, unification of Taiwan with China. We think that that is what they would prefer. I think the challenge is that they are likely becoming increasingly pessimistic or skeptical, that that's something they can achieve peacefully.

 

And you know, we have been open about the fact that they are looking to essentially achieve a military capacity so that they could take it militarily over our intervention, and that's ultimately if and when they are able to do so from their perspective. And I think, you know, it's important for an analytic perspective for us right, that one of the key things of actually when do they think they can do it right, not when do we think they can do it.

 

That will be an important factor in their decision making, and it will give them, you know, leverage and an option that they haven't had before, and that will matter. So, whenever that is, then that would be yeah.

 

MODERATOR: Now I definitely would not be doing my job today if I did not ask you about the surveillance balloons But I don't think that I even need to unpack what we're talking about. So let me ask you this. A quick yes or no. No, no, I'm not about to ask what you think about that. A quick yes or no, do you think the outcry over the balloon issue is exaggerated?

 

DIRECTOR HAINES: What's the outcry? How do you characterize it?

 

MODERATOR: Well, you don't -- I have been approached by people now constantly about oh my God, this you know, what are the Chinese doing. This is spy wars. This time we had to reveal what's going on because open source and digital era, we didn't have that luxury -- you know, we had more luxury during the Cold War to decide what we want to reveal about things like that that were happening.

 

Here the Intelligence Community was kind of forced to say more to policy makers. And there is panic about what is happening. So do you think it's exaggerated? Do you see similarities to the psychological effect of the sputnik and the missile gap era?

 

How should we think about this? Whatever you can say about the balloon, please.

 

DIRECTOR HAINES: I know it sounds crazy. I feel like in an episode of Veep you know on some level. The trouble with this. Look, I think as has been true historically, as you sort of alluded to, if you send a balloon to when a country is caught spying in a clear and obvious way, like another country responds to it.

 

And I think that's appropriate and it is, you know, so I think that it's perfectly reasonable to have a clear and forceful reaction to a Chinese high-altitude balloon, you know, flying over the United States and surveilling us.

 

I think there is a question of as technology improves, as we start to see more high-altitude vehicles in effect, that we're going to see more of this, and we're going to have to understand that and manage it. And I think, you know, the President yesterday kind of gave people a sense of look, we're going to put this into a frame. We're going to figure out what our principles are, but we are going to work with our allies and partners to ensure that we're all on the same page.

 

And I think that's, you know, a pretty classic and appropriate way to handle it.

MODERATOR: So let's talk a little bit about threat assessment more broadly, and I'll just throw back to China and Russia, but also thinking North Korea, Iran definitely. We all know the JCPOA is practically that. But if you think about our ability of the Intelligence Community, or the Intelligence Community's abilities to track and monitor nuclear capabilities.

 

Again, thinking about the Cold War, the 1138, NIEs that were all about tracking Soviet nuclear capabilities was the pattern was over estimation, followed by under estimation, over estimation and so on. So compared to the days of the Cold War, have intelligence capabilities and new technologies really improved our assessment, and our ability to track those nuclear technologies?

 

How confident should we be? Especially as we think about countries, you know, China, Russia for sure, but also Iran and North Korea. Can you say something about that without revealing too much?

 

DIRECTOR HAINES: Yeah. I'll try to say something that's useful. We've definitely gotten better at detecting, you know, the status of programs as a general matter, related to nuclear issues. But it is also true that, you know, as we advance, so do others, right? And you know, in developing ways to avoid detection, one of the advantages of the JCPOA was that it gave us effectively through the IAEA, in other words, like the capacity to monitor and access for doing that.

 

And that increased with our capacity to be able to continue to detect, and so that is definitely one of the challenges. But I would also say that I mean, one of the most difficult spaces in the sort of weapons of mass destruction area is really in the bio area.

 

And I think, you know, for us, like as we continue to try to better understand what is possible there and to monitor that. It's really hard. This is just a brutally challenging area, and it's just with such little investment in a sense, one can do quite a lot. And you know, and it doesn't have a radioactive isotope attached to it, or you know, other things comparable, so it's yeah.

 

MODERATOR: Very optimistic.

 

DIRECTOR HAINES: I know. I am Debbie Downer pretty much every day. It’s not a good, yeah.

 

MODERATOR: So let's skip years entirely. Looking around we see all new generation of digital natives, a cohort of young people with the appetite for public service. To what degree, and in what ways are the realities of the digital age influencing recruitment strategies or how best to attract younger generations, all of the types of skillsets, and experiences you would look for in new hires. Can you say a little bit about that?

 

DIRECTOR HAINES: Yeah. No, definitely. And honestly, this is an area of passion for me. The thing that keeps me up at night is basically whether or not we're going to have the most talented, diverse population in our public institutions, and that we're actually able to be agile enough to address the challenges as they evolve over time.

 

And they're coming at us that much faster, more complex and everything else. And across the Community, if you talk to every head of an intelligence agency or department, they will tell you that recruiting and retaining a diverse and talented workforce is the most important thing to them.

 

And we are trying to get out in a variety of ways. I actually, before I came here, knowing that it would be in New York for a few hours, I went to the Bronx High School of Science. Like I am like I'm trying to get out to different parts of the country, and you know, just do a short stop in high schools and other places to try to help people who haven't thought about the Intelligence Community, you know, to think about it, to come in to see if you're you know, worried about it, if you think that all we do is spy on people you think of as heroes.

 

Like come in and, you know, see what it's like, and help to make sure that you're part of the decision making apparatus, so that you can actually make it into the Intelligence Community that you wanted to be in. I think it is one of the things that's hardest for us in the Intelligence Community, of course, is that it's really hard for people to know what is the work like, who do we talk to, how do really -- what's that going to be?

 

It seems like a black box. So what we tend to get is folks who know people, or are related to people, or go to the same schools. So it's so important for us to break out of that, and to get out to others and to try to bring in the extraordinary talent that we have in the country today.

 

MODERATOR: That is so important. And we here at Columbia, the Saltzman Institute of War and Peace Studies, this is a big mission of ours to -- and we have a program, Emerging Voices in National Security, especially for women and underprivileged minorities, to come and learn about the world of national security, and create this pipeline because we know that this is important.

 

So last question because I know we're timed. Besides thinking about recruitment, what keeps you up at night?

 

DIRECTOR HAINES: Well I said it. It truly is, it is about having just sort of the resilient, agile institutions with the best possible people, and that is something that we are going to have to work really hard, and it is not easy to do in government, and it's getting harder.

 

I mean things like, you know, the politization around budgets, and other things like that just make it so hard to plan long term, to think through issues that help us build up the capacity that we know we need.

 

 

And getting these partnerships with academia, with others, you know, to make sure that we are not in the group think mode, and that we are capable of growing and innovating the way we need to do.

 

So I'm really grateful to Bob Jervis most of all, obviously in honoring him, but to you, to everybody, to President Bollinger because Columbia is the kind of environment that really helps to feed our work, and you know, we learn from all of you. So we're very grateful for that opportunity, thank you.

 

MODERATOR: Thank you very much Director Haines.

 

Wonderful.

 

 

 

###

NCSC and Partners Launch “National Supply Chain Integrity Month” in April

NCSC and Partners Launch “National Supply Chain Integrity Month” in April

“Supply Chain Risk Management – The Recipe for Resilience”

 

For Immediate Release:                                                  Contact: (301) 243-0403

3 April 2023                                                    DNI_NCSC_OUTREACH@dni.gov

 

NCSC and Partners Launch
“National Supply Chain Integrity Month” in April
“Supply Chain Risk Management – The Recipe for Resilience”

 

WASHINGTON, D.C. -- The National Counterintelligence and Security Center (NCSC) and its partners in government and industry today launched the 6th annual “National Supply Chain Integrity Month.”  The theme for this year’s month-long awareness campaign is “Supply Chain Risk Management (SCRM) – The Recipe for Resilience.”

 

SCRM is vital to help address counterintelligence (CI) and security risk and is a tool for managing logistics and acquisition aspects of the supply chain.  NCSC encourages its partners to apply CI SCRM methodologies to protect U.S. critical supply chains from risks posed by nation states and other threat actors.  CI SCRM tools provide government and industry with methods to defend against known threats to U.S. supply chains while building resilience against future risks.

 

Nation states and other threat actors have ramped up their efforts to exploit critical supply chains that cut across U.S. government and industry.  For example, “China uses access to its vast market and control over critical supply chains as tools to force foreign companies and to coerce foreign countries to allow the transfer of technologies and intellectual property,” according the 2023 Annual Threat Assessment (ATA) of the U.S. Intelligence Community.

 

The 2023 ATA also cited the risk of supply chain disruption stemming from China’s central role in global supply chains for semiconductors, critical minerals, batteries, solar panels, pharmaceuticals, and other technology sectors.  “In a speech in April 2020, [China’s President] Xi noted his intentions to increase global supply chain dependencies on China, with an aim of controlling key supply chains and being able to use those supply chain dependencies to threaten and cut off foreign countries during a crisis,” according to the ATA.

 

Given this threat landscape, the need for supply chain resilience is critical.  Organizations should include all aspects of SCRM into their recipe for resilience, including acquisition security, information security, CI, insider threat risk mitigation, and cybersecurity.  A comprehensive and resilient SCRM program allows an organization to know where to take risks and where and when to implement mitigations throughout the supply chain lifecycle.

     

Throughout April, NCSC will be teaming up with the Office of the National Cyber Director, the Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA), the Department of Defense, foreign allies, private industry, and other partners to develop a recipe for resilience that increases awareness of supply chain threats, shares best practices on risk management, and identifies ways to enhance cooperation. The “Recipe for Resilience” theme builds upon efforts by the U.S. Government, its foreign allies, and industry partners to rebalance global supply chains and make them more transparent, secure, resilient, and trustworthy.

 

This year’s National Supply Chain Integrity Month will feature the dissemination of numerous public products and include events sponsored or supported by participants from government, academia, and the private sector.  Events will range from small, classified briefings to large unclassified public functions.  These activities will focus on key supply chain topics, such as microelectronics, critical minerals, space, cloud, zero trust architecture, abuse of trusted relationships, venture capital risk management, cross-border SCRM, and SCRM best practices.

 

A center within the Office of the Director of National Intelligence, NCSC is the nation’s premier source for counterintelligence and security expertise and is a trusted mission partner in protecting America against foreign and other adversarial threats.

 

# # #

DNI Haines, Summit for Democracy, Opening Remarks

Thank you, Jeanne [Meserve], very much for the kind introduction and the opportunity to join this extraordinary event. It is quite something to represent the Intelligence Community at a Summit for Democracy that is literally happening across the world, co-hosted by the United States alongside Costa Rica, the Netherlands, the Republic of Korea and the Republic of Zambia. And a special thanks to Secretary Blinken and his terrific team for putting together such an exceptional forum and program this week.

Summit for Democracy

by Director of National Intelligence Avril Haines

 

Thursday, March 30, 2023

 

Thank you, Jeanne [Meserve], very much for the kind introduction and the opportunity to join this extraordinary event. It is quite something to represent the Intelligence Community at a Summit for Democracy that is literally happening across the world, co-hosted by the United States alongside Costa Rica, the Netherlands, the Republic of Korea and the Republic of Zambia. And a special thanks to Secretary Blinken and his terrific team for putting together such an exceptional forum and program this week.

 

This year, when the U.S. Intelligence Community issued its assessment of worldwide threats to U.S. national security, we included for the first time a section on trends in digital authoritarianism and malign influence that gets really to the very heart of this session’s focus on the misuse of new and emerging technologies.

 

And as you have heard from other speakers today, the global erosion of democracy that began more than a decade ago is ongoing. And technology’s role in this is fundamental, particularly in the contest over information.

 

Digital technologies have had a profound impact. They were instrumental in facilitating civil society and freedom of the press in many places and yet, they sparked a backlash from authoritarian regimes, first to contain the risks posed by freer flows of information and then to harness these same technologies in pursuit of their own objectives to stifle freedom of expression and to suppress political discourse.

 

And today, we see how they are deployed by governments as tools of repression and disinformation both inside and outside of their borders. We even see authoritarian regimes using their information ecosystems to disparage this Summit — underscoring the urgency with which they seek to push back against democratic freedoms.

 

And in 2022, global internet freedom declined for the 12th consecutive year. The sharpest downgrades were documented by [in] Russia, Myanmar, Sudan, and Libya. And a record number of national governments — many authoritarian — also blocked websites with nonviolent political, social, or religious content, undermining users rights to free expression and access to information.

 

We certainly saw evidence of this in our own efforts to take on Russian disinformation in the lead up to the invasion of Ukraine.

 

We publicly disclosed intelligence on the Russian Government’s plans and intentions in an effort to warn the world regarding the invasion.

 

We also did so to undermine Moscow’s ability to create a pretext for Russia’s invasion, which it hoped would legitimize their military action in the eyes of some countries and divide the NATO alliance, making it harder for NATO Members and other countries around the world to come together to respond to Russia’s illegal and barbaric invasion, as we ultimately were able to do.

 

In part, we were successful. In the United States and Europe, for example, our message was received and the Russian narratives were largely ineffective.

 

We were not effective, however, within Russia where the vast majority of the population at the start of the war supported Putin’s “special military operation” and saw NATO and Ukraine as the aggressors.

 

This isn’t to say that technology is the only reason for our lack of success — a big part is Putin’s direct and indirect influence on sources of information inside Russia — but there is no question that new technologies, including cyber intrusion tools and commercial spyware, are making it easier for authoritarian governments to engage in digital repression — both inside and outside of their countries’ borders.

 

Unless we take action — malicious use of digital information and communication technologies will become more pervasive, automated, targeted, and complex during the next few years, further threatening to distort publicly available information — and of course, authoritarian governments are usually the principal perpetrators of such digital repression.

 

Such regimes learn quickly how to exploit new and more intrusive technologies for repression. Various technologies effectively extend a states’ power to stifle dissent inexpensively — at scale — beyond traditional means, such as censoring print media.

 

And the fact that commercial firms around the world are selling these capabilities simply makes it easier for governments that have an interest in doing so, to engage in such repression.

 

In fact, the commercial spyware industry grew rapidly during the past decade. Journalists in the past year have estimated it to now be worth approximately $12 billion.

 

And while some states use such spyware tools and lawful intercept programs for legitimate purposes such as to target criminals and terrorists, governments also are increasingly using spyware to target political opposition and dissidents.

 

Last year, governments and other actors shut down the internet at least 187 times in 35 countries — a record. Shutdowns were imposed during protests, active conflicts, school exams, elections, periods of political instability or high-profile events, such as religious holidays or visits by government officials, with the ultimate goal of imposing control and silencing voices. Government leaders use these tools to conduct repression because they fear that open debate of political or social topics could jeopardize their hold on power.

 

A growing number of internet users around the globe only have access to an online space that mirrors the views of their government and its interests. Authorities in 47 of the 70 countries covered by a recent research study limited users’ access to information sources located outside of their borders.

 

And officials in at least 53 countries charged, arrested, or imprisoned internet users in retaliation for posts about political or social causes. Their repressive governments were presumably able to track them through digital means.

 

And these examples demonstrate how technology has made it easier for authoritarian governments to control the information environment within their own borders, but as I mentioned initially, we also see how they use such technologies to increasingly engage in transnational repression in an effort to monitor and silence dissidents abroad.

 

In particular, diaspora populations in a number of democracies are facing a broad range of threats as autocratic regimes turn to digital tools to suppress dissent. Here again, commercially available technology is exacerbating the problem.

 

Commercial spyware allows authoritarian regimes to remotely target the devices of dissidents, oppositionists, and journalists — and their associates and families — to collect data, location information, and audio. Some spyware allows devices to be infected remotely and without requiring the victim to be lured into clicking a link or opening a malicious file.

 

Our information suggests almost all of the at least 30 regimes with documented transnational repression efforts have used cyber tools against perceived expatriate opponents and host country backers in the US, Australia, Canada, and Europe during the past decade — moreover, these efforts have grown more brazen over time.

 

As an example, last year, Iran conducted a range of disruptive cyber operations against Albania in retaliation for allowing an Albania-based Iranian dissident group to express themselves freely — an astonishingly bold and novel attempt by a state actor to use cyberattacks to compel another state to suppress dissidents who were living there in exile.

 

And finally, and perhaps most relevant to us, are the efforts by many autocrats to try to influence and interfere in democratic societies — creating social and political upheaval, shifting policies, and even swaying voters’ perspectives and preferences. We are deeply concerned that as the barriers to entry worldwide lower and become increasingly accessible to conduct a range of malign influence operations, more states will look to undertake these operations.

 

And part of why this is so challenging is because democracies are asymmetrically vulnerable to the threat posed by authoritarian regimes in the information space. In short, such regimes exploit the openness of democratic societies — what we know is a strength, they perceive as a weakness.

 

And given that our public dialogue is intended to have an impact on our government’s decision-making, it is clear that if a malicious actor is able to affect our domestic discourse, they can not only shape public opinion but also have an impact on who we elect and decisions we make.

 

While an open information environment confers critical strategic advantages on free societies over the long run, it is hard to argue that such environments do not create vulnerabilities in the short term.

 

Regimes interested in targeting our societies do so in a number of ways, employing a diverse set of online technologies and content to convey propaganda and disinformation.

 

And the advancement of data analytic tools, in particular, backed by rapidly improving artificial intelligence and machine learning technologies — and the extraordinary availability of data from commercial, government, and other publicly available sources in democracies — are making it too easy for actors at all levels to exploit such information for their own ends, including as part of their efforts to engage in malign influence operations — particularly criminal, covert, or coercive efforts — targeting open societies.

 

And furthermore, adversaries have grown savvier at information laundering, deploying a web of proxy actors and online personas who introduce and amplify variations of the same narratives in an effort to shape our discourse, while providing the adversary an element of plausible deniability. Unwitting persons and third-party individuals may subsequently propagate these narratives by forwarding, sharing, liking, or discussing unsubstantiated or misleading narratives, compounding their overall reach into open information environments within and among democracies.

 

We see how Russia and other authoritarian regimes seek to weaken states by pushing divisive narratives to exacerbate pre-existing tensions in societies, to decrease trust in public institutions and democratic processes, and to question traditional sources of media. We also have taken note of Beijing’s growing efforts to actively exploit perceived U.S. societal divisions using its online personas, which moves it closer to Moscow’s playbook for influence operations.

 

In sum, the promise of connected technologies comes with peril if we fail to establish safeguards to prevent authoritarian regimes and other malicious actors from the misuse of such tools.

 

The litany of challenges I have identified — coupled with efforts by authoritarian regimes to normalize a perspective that no country should critique the internal affairs of another — highlight the task in front of us. And these technologies continue to hold the promise of allowing freer flows of information, improved communication, and the connections we will require to better understand and deal with a myriad of global challenges. We must work to realize this potential, though.

 

And within liberal democracies, governments, civil society, and businesses will need to work together and with urgency to achieve widely-held norms and maintain and improve positive technical standards for digital technologies so that we can ensure the free flow of digital information and the protection of human rights into the future.

 

Our President’s new executive order on commercial spyware seeks to address many of these concerns, as do legal frameworks established to protect our data — many of the things that you have heard from the Secretary [Blinken] today and Administrator Power — and there is still need to do more work to and unless we address this problem together, we will not be successful.

 

Thank you again for listening to me and for the opportunity to contribute today. It is now my honor to welcome Secretary Alejandro Mayorkas to the stage.

 

 

###

Issuance of Intelligence Community Directive 712: Requirements for Certain Employment Activities by Former Intelligence Community Employees

Today, ODNI released to the public Intelligence Community Directive 712: Requirements for Certain Employment Activities by Former Intelligence Community Employees.

 

 

 

FOR IMMEDIATE RELEASE

ODNI News Release No. 7-23

March 23, 2023

 

Issuance of Intelligence Community Directive 712:Requirements for Certain Employment Activities byFormer Intelligence Community Employees

The Office of the Director of National Intelligence (ODNI) today released the Intelligence Community Directive 712, Requirements for Certain Employment Activities by Former Intelligence Community Employees. This Directive provides guidance on implementing the requirements in 50 U.S.C. Sec. 3073a regarding post-service employment activities of former Intelligence Community (IC) employees when those activities involve foreign governments and associated entities. While some post-service employment by former IC employees may advance U.S. national security interests, or, even if neutral with regard to U.S. national security, provide an overall benefit by promoting U.S. values or other interests more generally, other types of service may threaten U.S. national security by providing foreign governments with access to the experience and expertise of former U.S. intelligence employees that can be used for purposes that are inconsistent with U.S. values and interests. This policy, and its subsequent implementation by the IC, responds to those concerns.

 

The Intelligence Authorization Acts for Fiscal Years 2022 and 2023 established restrictions and reporting requirements related to covered post-service employment by IC employees who served in covered intelligence positions as designated by IC elements, along with civil and criminal penalties for violations.

 

The Directive implements the provision by establishing both temporary and permanent restrictions. The temporary restriction prohibits such employment for 30 months after an IC employee leaves the covered intelligence position. The permanent restriction applies to such employment on behalf of the People’s Republic of China, Russian Federation, Democratic People’s Republic of Korea, Islamic Republic of Iran, Republic of Cuba, and Syrian Arab Republic, and/or their associated entities.

 

The Directive also implements the provision by providing for temporary waivers of the restrictions on a case-by-case basis. For temporary restrictions, a waiver requires a determination that post-service employment activities are necessary to advance the national security interests of the United States. For permanent restrictions, there must be a determination that not granting the waiver would result in a grave detrimental impact to current or future intelligence operations of the United States. The IC Directive establishes the overall process for former IC employees—working through their most recent IC employer—to submit waiver applications.

 

 

###

DNI Haines Welcomes Rebecca Richards as Chief, Office of Civil Liberties, Privacy, and Transparency

WASHINGTON, D.C. – Director of National Intelligence Avril Haines today issued the following statement:

 

 

 

FOR IMMEDIATE RELEASE

ODNI News Release No. 6-23

March 16, 2023

 

DNI Haines Welcomes Rebecca Richards as
Chief, Office of Civil Liberties, Privacy, and Transparency

WASHINGTON, D.C. – Director of National Intelligence Avril Haines today issued the following statement.

 

“I am extremely pleased to announce Rebecca (Becky) Richards as Chief of Civil Liberties, Privacy, and Transparency (CLPT). In this role, Becky will serve as the Chief Transparency Officer for the Office of the Director of National Intelligence (ODNI) and as the Civil Liberties Protection Officer for the Intelligence Community (IC). Becky will lead IC efforts to ensure civil liberties and privacy protections are imbedded into our intelligence work.”

 

“Serving at the National Security Agency (NSA) since 2014, Becky launched NSA’s Civil Liberties and Privacy Office and was NSA’s first Director of Civil Liberties and Privacy and its first Transparency Officer. In this role, Becky found effective ways to communicate and engage with the public and NSA’s overseers about the value of signals intelligence and protecting civil liberties and privacy. Before joining NSA, Becky served in a variety of privacy-related leadership positions at the Department of Homeland Security, including Senior Director for Privacy Compliance. She also held positions at TRUSTe, the independent non-profit privacy seal program, and the Department of Commerce, where she began her federal service as an international trade specialist.”

 

“As ODNI welcomes Becky, I would also like to express my sincerest gratitude and congratulations to Ben Huebner, our previous Chief of CLPT since July 2019. I am very thankful, though, that Ben will continue to serve in the IC.”

 

###

DNI Releases FY 2024 Budget Request Figure for the National Intelligence Program

WASHINGTON, D.C. – The Director of National Intelligence (DNI) is disclosing the aggregate amount of $72.4 billion in requested appropriations for the Fiscal Year 2024 National Intelligence Program (NIP).

 

 

 

FOR IMMEDIATE RELEASE

ODNI News Release No. 4-23

March 14, 2023

 

DNI Releases FY 2024 Budget Request Figure
for the National Intelligence Program

WASHINGTON, D.C. – The Director of National Intelligence (DNI) is disclosing the aggregate amount of $72.4 billion in requested appropriations for the Fiscal Year 2024 National Intelligence Program (NIP).

 

The DNI discloses this amount consistent with section 601 of the Implementing Recommendations of the 9/11 Commission Act of 2007 (P.L. 110-53), as amended (50 U.S.C. 3306).

 

Beyond the disclosure of the NIP topline figure, there will be no other disclosures of currently classified NIP budget information. The only exceptions to the foregoing are for unclassified appropriations.

 

###

DNI Haines Welcomes Charles Luftig as Deputy Director of National Intelligence for Policy and Capabilities

WASHINGTON, D.C. – Director of National Intelligence Avril Haines today issued the following statement:

 

 

 

FOR IMMEDIATE RELEASE

ODNI News Release No. 5-23

March 14, 2023

 

DNI Haines Welcomes Charles Luftig
as Deputy Director of National Intelligence for Policy and Capabilities

WASHINGTON, D.C. – Director of National Intelligence Avril Haines today issued the following statement:

 

“I am delighted to announce Charles Luftig as the Deputy Director of National Intelligence for Policy and Capabilities (P&C). Charles will lead our ongoing efforts to position the Intelligence Community (IC) to meet the challenges of an evolving national security landscape through strategy, policy, and capabilities development.”

 

“Charles brings a wealth of national security experience to P&C having served in a variety of national security roles, to include most recently as my Chief of Staff, and I am so pleased the IC will continue to benefit from Charles’ expertise, professionalism, and integrity. He has previously served as Deputy General Counsel at the Office of Management and Budget, as well as in senior positions at the National Security Council and the National Security Division of the Department of Justice, as well as previously working in the private sector. The variety of his experiences will serve him well as he takes on this new role.”

 

“I would also like to express my gratitude to Dustin Gard-Weiss for his instrumental leadership as the Deputy Director of National Intelligence for P&C for the past two and a half years. I wish him all the best in his new role as the Executive Director in the Office of the Under Secretary of Defense for Intelligence & Security.”

 

###

ODNI Releases 2023 Annual Threat Assessment of the U.S. Intelligence Community

WASHINGTON, D.C. – The Office of the Director of National Intelligence (ODNI) today released the 2023 Annual Threat Assessment of the U.S. Intelligence Community. This report reflects the collective insights of the Intelligence Community, which is committed every day to providing the nuanced, independent, and unvarnished intelligence that policymakers, warfighters, and domestic law enforcement personnel need to protect American lives and America's interests anywhere in the world.

 

 

 

FOR IMMEDIATE RELEASE

ODNI News Release No. 3-23

March 8, 2023

 

ODNI Releases 2023 Annual Threat Assessment
of the U.S. Intelligence Community

WASHINGTON, D.C. – The Office of the Director of National Intelligence (ODNI) today released the 2023 Annual Threat Assessment of the U.S. Intelligence Community. This report reflects the collective insights of the Intelligence Community, which is committed every day to providing the nuanced, independent, and unvarnished intelligence that policymakers, warfighters, and domestic law enforcement personnel need to protect American lives and America's interests anywhere in the world.

 

The unclassified assessment is available here.

 

###

2023 Annual Threat Assessment of the U.S. Intelligence Community

This annual report of worldwide threats to the national security of the United States responds to Section 617 of the FY21 Intelligence Authorization Act (Pub. L. No. 116-260). This report reflects the collective insights of the Intelligence Community (IC), which is committed every day to providing the nuanced, independent, and unvarnished intelligence that policymakers, warfighters, and domestic law enforcement personnel need to protect American lives and America’s interests anywhere in the world.

Date: March 8, 2023

 

This annual report of worldwide threats to the national security of the United States responds to Section 617 of the FY21 Intelligence Authorization Act (Pub. L. No. 116-260). This report reflects the collective insights of the Intelligence Community (IC), which is committed every day to providing the nuanced, independent, and unvarnished intelligence that policymakers, warfighters, and domestic law enforcement personnel need to protect American lives and America’s interests anywhere in the world.

 

Download the report.

Pages