Multidimensional Threats

The convergence of cyber, physical, and information operation threats.

The Changing Threat Environment

Threat actors are increasingly using multidimensional threats, or the blending of cyber, physical, and information operations, to advance their objectives.

Hostile foreign states, financially motivated threat actors, transnational criminal organizations, foreign terrorist organizations, and other malicious actors are evolving their methods, incorporating new and emerging technical abilities alongside social media, to conduct malicious activities.

 

Elements of Multidimensional Threats

Multidimensional threats incorporate tactics, techniques, and procedures (TTPs) from the cyber, physical, and informational domains.

cyber icon

Cyber

The cyber domain consists of technical attacks against networks, systems, and data. It covers threat activity such as network penetration, data extraction, website defacement, Distributed Denial of Service (DDoS) attacks, ransomware, and phishing — along with capabilities enhanced by artificial intelligence (AI).

multidimentional threats - physical icon

Physical

Otherwise known as the "kinetic" domain, the physical domain includes activity that can harm people, property, and infrastructure. Physical threats include, but are not limited to, targeted acts of violence, attacks on critical infrastructure, mass shootings, swatting, and human trafficking.

multidimentional threats-informational icon

Information Operations

Threat actors manipulate, manufacture, or steal data to maliciously distribute information, often to targeted audiences, as a means of sowing discord, undermining confidence in trusted institutions, and in support of threat actor-specific objectives. This domain includes promoting misleading or false narratives, social engineering, hack-and-leak operations, and deepfakes, including content generated by AI.

Examples of Multidimensional Threats

Enhancing Safety in the Connected World - A National Framework for Action graphic

In today's world, foreign and domestic threat actors leverage the power of the internet to advance their objectives. Here are some examples of what they may look like:

  • State-sponsored threats actors conduct cyber attacks with the aim of undermining trust in key institutions, stealing protected information, or causing disruptions to integral services.
  • Terrorist organizations post content online to incite and inspire violence.
  • Human smugglers/traffickers use social media and other digital platforms to market smuggling services and recruit supporters needs.
  • Narcotics cartels turn to internet-based tools to facilitate the manufacturing, shipping, and sale of illicit substances, as well as launder their profits.
 

Want to keep track of multidimensional threats?

Subscribe to ThreatWA™ for expert warning, analysis, and mitigation measures.

Learn more