Threat profileUnited States

The US is globally an unmatched nation when it comes to its cyber capabilities. Furthermore, it has the most developed big-tech and cyber security industry, resulting in having both a strong defense market and intelligence position. Together with the support of advanced capital markets and other stakeholders such as the academic sector, investments in high-tech advancements are higher than in any other nation. In summary, the US can be considered the world's innovation engine when it comes to offensive and defensive cyber capabilities.

Request a free membership to access our full research insights

  • Strategic motives: Espionage, information theft, disruption
  • Strategic goals: Maintaining superiority in cyberspace by defending forward and persistent engagement
  • Cyber capabilities: ★★★★★
  • Number of known cyber operations: ★☆☆☆☆
  • Number of APTs: 9

Top-5 Actors

By amount of operations

United States APTs

OUR OBSERVATIONS

0

Advanced Persistent Threats (APTs)

0

Tactics, Techniques & Procedures (TTPs)

0

Attack tools

SWOT analysis

Strengths, weaknesses, opportunities & threats

Strengths

  • Most sophisticated cyber capabilities in the world
  • Well-developed set of cyber-related strategies
  • Large budget for strategy execution by government departments with cyber capabilities
  • Close cooperation with private and academic sector
  • Mature high-tech, cyber security and defence sectors in combination with strong capital markets fuelling investments in R&D
  • Multiple government departments and agencies with sophisticated cyber capabilities

Weaknesses

  • Difficulties in effective coordination between stakeholders due to large size and high level of complexity
  • Lengthy approval processes for offensive cyber operations that delays cyber responses

Opportunities

  • Developing cyber capabilities through cooperation with the private and academic sectors
  • Maintaining strong global intelligence position through multiple strategic partnerships
  • Maintaining superiority in cyberspace by investing in emerging cyber-related technologies (e.g. artificial intelligence and quantum computing)
  • Disrupting adversaries' opportunities by defending forward and persistent engagement

Threats

  • Large attack surface as its critical infrastructure is largely intertwined with cyberspace
  • Continuously under attack from both nation states and non-nation states actors

Interested in our fully detailed country analysis?

Learn more about our threat research?