2023 closed with a clear pattern. Adversaries kept doing what works. Low-cost tools and commercial technologies multiplied reach and impact. State and non-state actors focused on asymmetric methods that avoid symmetric conflict and maximize political, economic, and social disruption. Below are the threats that mattered most to the homeland this year and the practical implications for defenders.
1) Ransomware and large-scale data exfiltration remain top-tier kinetic multipliers. The government and private sector scored tactical wins against specific gangs, but the model keeps working: exploit a vulnerability or buy access, steal data, demand extortion, and force recovery costs on victims. Law enforcement disruption of prolific operators was real and useful, yet groups and affiliates evolved their tactics and pivoted to mass-exfiltration campaigns that leverage third-party software weaknesses. The result was sustained pressure on health care, state and local government, and critical service providers.
2) Nation-state espionage and supply chain compromises accelerated the asymmetric threat to trusted infrastructure. A single weak link in a widely used product or in a service provider can expose thousands of downstream organizations. 2023 showed that compromise of keys, tokens, or file-transfer platforms provides persistent access or mass data grabs that cascade through public and private networks. Defensive guidance and incident response improved, but attribution and remediation timelines still lag the speed of exploitation.
3) Unmanned systems and unconventional air platforms matured as surveillance and attack tools. High-altitude surveillance incidents and the routine use of small unmanned aerial systems in conflict zones proved that airborne sensors and effectors can be improvised from commercial components and achieve real intelligence or strike effects. That trend forces homeland defenders to treat UAS as an asymmetric vector for both espionage and attack against fixed sites and dispersed assets. Countermeasures must be layered across detection, attribution, and rules-of-engagement for civilian airspace.
4) Domestic violent extremism and ideologically driven lone actors remained a persistent homeland danger. The threat environment in 2023 demonstrated that global events and online propaganda can radicalize individuals quickly. Federal bulletins and advisories throughout the year stressed the risk from lone offenders and small groups who are easy to arm and hard to detect until they act. That dynamic creates a steady operational demand on law enforcement and intelligence resources, and it drives risk into open, soft targets where prevention is hardest.
5) Synthetic media and disinformation moved from nuisance to operational concern. Readily available generative AI tools lowered the bar for producing believable forgeries of voice, video, and imagery. The toolset enables rapid influence operations, fraud, and targeted deception that can amplify societal fractures or disrupt decision cycles. Federal and industry advisories in 2023 highlighted both the problem and the limits of detection-only approaches. Defensive posture must combine provenance, platform controls, and public resilience.
6) Widely exploited vulnerabilities kept critical infrastructure at risk. Adversaries exploited unpatched and zero-day flaws more often this year, and once-exploitable components in networked control systems and enterprise software continued to provide initial access pathways. Scanning and disclosure programs produced useful notifications, but mitigation at scale requires investment and incentives that too many organizations still lack.
What this means operationally: threats that used to require significant investment now require less. A skilled operator or a well-resourced criminal gang can weaponize widely available code, hardware, or cloud functions to create outsized effects. That compresses timelines for detection and response, and it forces a blunt truth: defense must be proactive and prioritized.
Four practical, no-nonsense measures for 2024 planning:
-
Prioritize the attack surface that matters. Harden identity, patch management, and third-party dependencies first. Those are the recurring exploitation points that produce the biggest impact. (Multi-factor authentication, least privilege, and prioritized patching are non-negotiable.)
-
Treat UAS and other low-cost kinetic systems as an operational problem, not a policy debate. Equip critical sites with detection sensors, develop lawful interdiction measures, and run realistic exercises that include civilian airspace constraints.
-
Build a layered information defense against synthetic media. Invest in provenance systems, empower rapid takedown pathways with platforms, and run public-awareness campaigns that raise the cost of influence operations for adversaries.
-
Shift more resources into resilient recovery. Prevention will never be perfect. Ensure that backup, continuity, and rapid forensics are funded and exercised. Incident response speed and the ability to operate on reduced capacity are the best ways to blunt asymmetric hits.
2023 delivered a predictable but dangerous lesson: asymmetric threats scale because the tools are cheap and the defenders are fragmented. Expect 2024 to be a contest of speed and prioritization. Organizations that adopt pragmatic, prioritized defenses and that integrate cyber, physical, and information-domain controls will blunt the worst outcomes. Those that do not will be the targets that shape the next headlines.