Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity NewswireCybersecurity News

NCSC Unveils the National Counterintelligence Strategy of the U.S. 2020-2022

cyber-threats
February 12, 2020

The National Counterintelligence and Security Center (NCSC) unveiled the National Counterintelligence Strategy of the United States of America 2020-2022, outlining a new approach to counterintelligence to address threats that have evolved significantly since the last strategy in 2016. 

“Today’s strategy represents a paradigm shift in addressing foreign intelligence threats as a nation. While past counterintelligence strategies categorized the threat by our top foreign nation-state adversaries, this one focuses on five key areas where foreign intelligence entities are hitting us hardest and where we need to devote greater attention – critical infrastructure, key U.S. supply chains, the U.S. economy, American democratic institutions, and cyber and technical operations,” said NCSC Director William Evanina. 

“With the private sector and democratic institutions increasingly under attack, this is no longer a problem the U.S. Government can address alone. It requires a whole-of-society response involving the private sector, an informed American public, as well as our allies,” Director Evanina added. 

According to the strategy, which was signed by President Trump on January 7, 2020 and is available at www.ncsc.gov, three principal trends characterize today’s counterintelligence threat landscape are:

  1. The number of threat actors targeting the U.S. is growing, ranging from state actors like Russia, China, Iran, Cuba, and North Korea; to non-state actors like Lebanese Hizballah, ISIS and alQa’ida; to hacktivists, leaktivists and those with no formal ties to foreign intelligence services. 
  2. These threat actors have increasingly sophisticated intelligence capabilities and technologies at their disposal, including advanced cyber tools, biometric devices, high-resolution imagery, enhanced technical surveillance equipment, advanced encryption and big data analytics. 
  3. Threat actors are using these enhanced capabilities against an expanded set of targets and vulnerabilities. While foreign intelligence entities are targeting most federal agencies in the U.S. - including those without a national security mission - they are also targeting a broad array of private sector and academic entities and seeking to influence U.S. public opinion. 

To anticipate and deter these threats, the U.S. Government will continue to address its fundamental counterintelligence missions, says the NCSC. These include countering foreign intelligence activities in the U.S., mitigating insider threats, protecting U.S. sensitive and classified information as well as sensitive facilities from technical penetrations or espionage, and countering assassination attempts by foreign intelligence services.

However, the 2020-2022 strategy goes beyond these traditional government-centric missions to focus on critical infrastructure, key U.S. supply chains, the U.S. economy, American democratic institutions, and cyber and technical operations, notes the NCSC. It is in these areas where the strategy says investment in capabilities and resources are required to strengthen national security. NCSC says the strategy’s five strategic objectives, all equally important, are:

  1. Protect the nation’s critical infrastructure from foreign intelligence entities seeking to exploit or disrupt national critical functions. Foreign intelligence entities are developing the capacity to exploit, disrupt or degrade critical infrastructure, likely in an effort to influence or coerce U.S. decision makers in a time of crisis by holding critical infrastructure at risk of disruption.
  2. Reduce threats to key U.S. supply chains to prevent foreign attempts to compromise the integrity, trustworthiness, and authenticity of products and services purchased and integrated into the operations of the U.S. Government, the defense industrial base, and the private sector. The exploitation of key supply chains by foreign adversaries represents a growing threat. Adversaries are attempting to access the nation’s supply chains at multiple points by inserting malware into important information technology networks and communications systems.
  3. Counter the exploitation of the U.S. economy to protect competitive advantage in world markets and economic prosperity and security. Because the U.S. is a global leader in high technology research and innovation, America is a tremendous target for the theft or acquisition of critical technology and intellectual property, costing the U.S. hundreds of billions of dollars annually and reducing U.S. economic and military competitive advantage globally.
  4. Defend American democracy against foreign influence threats to protect America’s democratic institutions and processes and preserve a culture of openness. Foreign intelligence entities are conducting influence campaigns to undermine confidence in democratic institutions and processes, sow divisions in society, exert leverage over America and weaken alliances.
  5. Counter foreign intelligence cyber and technical operations that are harmful to U.S. interests. This critical objective applies to all the other objectives of the strategy. The development of next generation technologies such as the Internet of Things, 5G technology, quantum computing, and artificial intelligence will present new opportunities for foreign adversaries to collect intelligence and conduct cyber operations against the United States.

The strategy recognizes the U.S. Government cannot address these challenges alone and calls for a whole-of-society approach that fully integrates the assistance of the private sector, an informed public, as well as foreign allies. "Sound counterintelligence and security procedures must become part of everyday American business practices. Implementing the strategy will require partnerships, information sharing, and innovation across public and private sectors," says the NCSC. 

The strategy also makes clear that the U.S. must leverage all instruments of American power, including offensive and defensive counterintelligence measures, to meet these increasing challenges. Federal departments and agencies must align their plans to the five key objectives in the strategy, identify resource requirements and evaluate their performance against the strategy’s five objectives, concludes the NCSC. 

KEYWORDS: critical infrastructure cyber security cybersecurity Terrorism threats

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cybersecurity
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Logical Security
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security’s 2025 Women in Security

Security’s 2025 Women in Security

Red spiderweb

From Retail to Insurance, Scattered Spider Changes Targets

blurry multicolored text on black screen

PowerSchool Education Technology Company Announces Data Breach

2025 Security Benchmark banner

Events

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

What do zebras, school groups and high-tech surveillance have in common? They're all part of a day’s work for the security team at the Toledo Zoo.

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • govt4-900px.jpg

    DHS Unveils Five-Pronged Strategy for Managing National Cyber Risk

    See More
  • SEC0111_crit_infrastructure

    New Report Calls for National Industrial Strategy to Strengthen U.S. Industries that are ‘Too Critical to Fail’

    See More
  • Fairfield University cybersecurity master's degree

    Fairfield University unveils new cybersecurity lab to prepare the next generation of information security professionals

    See More

Related Products

See More Products
  • 9780367030407.jpg

    National Security, Personal Privacy and the Law

  • 9780367339456.jpg.jpg.jpg

    Cyber Strategy: Risk-Driven Security and Resiliency

  • databasehacker

    The Database Hacker's Handboo

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!