U.S. sees six 'disruptive technologies' by 2025
Top U.S. intelligence official warns of declining U.S. dominance, climate change
Computerworld - WASHINGTON -- In December, the president-elect will get a report detailing threats to the U.S. that will most likely include a list of emerging technologies that will have a major impact on the U.S. and the world. This report, called Global Trends 2025, is a forecast prepared by U.S. intelligence agencies.
The report will be a grim assessment, with warnings about economic challenges, an aging work force, climate change and U.S. adversaries, according to emerging details, which most recently surfaced in a speech by Thomas Fingar, deputy director of the Office of the Director of National Intelligence, the body that oversees all U.S intelligence agencies. Fingar spoke this month before a gathering of intelligence analysts at a conference in Orlando.
In the period leading up to 2025, the U.S. "will remain the preeminent power, but that American dominance will be much diminished over this period of time," said Fingar, according to a transcript of his remarks released by the office (download PDF).
The "overwhelming dominance that the United States has enjoyed in the international system in military, political, economic and arguably cultural arenas is eroding and will erode at an accelerating pace, with the partial exception of military," Fingar said.
The U.S. may remain the dominant military power, but its nuclear capability will be less important as challenges shift to cyberthreats. The U.S. population will get older, but not to the extent of Western Europe, Japan and China, where the the ratio of young productive people to seniors will begin to approach 1-3. "That is a pretty heavy burden on economic growth," Fingar said.
The next president will receive a particularly bleak warning about climate change. By 2025, "it is not a good time to live in the Southwest because it runs out of water and looks like the Dust Bowl. It is not a good time to be along the Atlantic Seaboard, particularly in the South because of the projected increase and intensity and severity and frequency of severe weather -- more hurricanes, more serious storms, and so forth," Fingar said.
Among the climate-related problems Fingar cited are water shortages in "the already unstable Middle East" and in China.
"Think about the difficulty of scrounging up in the international system the food for 17 [million] or 18 million North Koreans, for a few tens of millions on the Horn of Africa ... you have got one hell of a problem. And that is going to happen. This isn't in the 'maybe' category. This is in the 'for-real' category," Fingar said.
The report is expected to look at disruptive technologies, and a preview of what may be in the report was prepared by the National Intelligence Council in April.
- Best iPhone, iPad Business Apps for 2014
- 14 Tech Conventions You Should Attend in 2014
- 10 Desktop Apps to Power Your Windows PC
- How to Add New Job Skills Without Going Back to School
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts