Start your day with intelligence. Get The OODA Daily Pulse.

Home > Analysis > OODA Original > Security and Resiliency > Opinion: Why Restraint Defines the 2026 Threat Assessment

Opinion: Why Restraint Defines the 2026 Threat Assessment

It’s become an almost annual ritual where the U.S. government publishes an Intelligence Community (IC) unclassified annual threat assessment, which is immediately met with a wave of critiques arguing where it falls short, whether it being too vague, too cautious, or not alarmist enough. The 2026 Annual Threat Assessment (ATA) is no exception. Two individuals from the Foundation for Defense of Democracies recently published a critique of the ATA which pointed out key shortcomings that included the understatement of cyber risks, the omission of identifying specific threat actors by name, insufficient detail on U.S. intent in a Taiwan crisis, and a perceived disconnect from policy realities. However, for the purpose of this blog, I will focus solely on cyber-related critics that have been levied.

First off, this is not to say that some of these critiques are not without merit. But some criticisms may be misplaced, addressing issues that do not necessarily fit the purpose of an unclassified threat report meant for wide dissemination. In this capacity, the ATA is not to persuade the public as much as raise awareness to the matters that the U.S. IC and by extension the U.S. government are most concerned about in the present and the near future. And in this regard, more detailed content is likely not possible due to the fact that determinations have been made by aggregating volumes of classified information. Today when the leaking of classified information has unfortunately become a common practice, the fact that sensitive details are not shared with a wider audience is a refreshing nod toward exercising judicious restraint.

One key criticism in the recent evaluation is that the 2026 ATA “understates” the severity of cyber threats facing the United States. This needs to be contextualized in the scope of the larger document. The role of a document like the ATA is not to sound the alarm as loudly as possible, as much as to share how the IC and the government are prioritizing the threats the country faces. In this regard, cyber threats are indeed significant and given the volume of actors and types of hostile cyber activity occurring in cyberspace daily, pervasive. However, cyber represents one threat alongside others such as kinetic military risks, economic coercion, and geopolitical instability, and therefore must be evaluated against them, and the potential ramifications they may have against the United States. To elevate cyber independently above the rest in tone, urgency, or positioning within the ATA, especially given how cyber is increasingly integrated into them, risks inaccurately weighing fiscal and material resource allocation, as well as altering strategic focus.

Another criticism addresses the failure of the ATA to get more granular in identifying specific threat actors. While the critique acknowledged that the ATA correctly identified key cyber threat state actors, it chastised its failure to specifically name China’s most dangerous cyber groups (i.e. VOLT TYPHOON and SALT TYPHOON) that have been gaining persistent access to key U.S. critical infrastructure entities. I would argue such generalization is not new to intelligence documents that are written for the public, and that inclusion of specific groups is unnecessary due to the strategic purpose of the ATA.

More importantly, these types of surreptitious cyber activities are handled in classified channels not only within the government but is also provided to relevant private sector stakeholders via the Department of Homeland Security via threat briefings and intelligence sharing arrangements. So, the organizations that “need to know” about these groups, their intent, and their capabilities already have and are receiving that information. If John Q. Public wants to know more about the threat actors operating under a state’s umbrella, there are plenty of detailed publicly accessible attribution products in the form of legal indictments, government cybersecurity advisories, and other private sector cybersecurity company reporting.

Dovetailing with his complaint is the assertion that there was insufficient coverage concerning Russia’s cyber maturity and prowess, given its track record of executing cyber warfare. Indeed, Russia has conducted destructive and disruptive cyber attacks, notably against Ukraine’s critical infrastructure, notably against its power grid. Given this track record, as opposed to China’s which has not been tied to destructive attacks, such an oversight could be perceived as being remiss, particularly since Russia was lumped in the same paragraph as China. However, the critique does not assert what would benefit a dedicated paragraph to Russian cyber capabilities that is not already known, particularly by those organizations in the private sector. Identifying capabilities and intent of a state-level actor with substantial resources conveys the threat at a high level. Ranking adversaries by threat score does not serve the interest of the ATA, nor the public that might not be positioned to understand its meaning, translate how this may affect their organization, or effectively action that information.

None of this is to suggest that the ATA is beyond critique; no intelligence product is as there is always room for improvement in clarity, communication, and analysis. But critiques should be grounded in an understanding of the document’s purpose and constraints. The ATA is not a war plan, nor is it a public warning advisory, or even a strategic roadmap of how the United States intends to address the threats. Rather, it is a consensus-driven intelligence synthesis that represents the collective judgment of the IC, an assessment determined through a series of uncertainties, and subject to methodological rigor. This is important because the true value of such a product is not about being the most detailed or the most alarming, but about being the most reliable. Saying less not more requires a judicial approach and one that resists trying to fill knowledge gaps with speculation. It also requires truly protecting sources and methods, even at the expense of a public that is increasingly demanding transparency for anything government related. Perhaps most of all, it requires maintaining a clear boundary between informing policy and shaping it.

In the cyber domain where the line between public knowledge and classified insight is thinning as public-private partnerships expand, this balance is critical. The temptation to disclose more information such as naming more actors, describing their operations, or elevating the sense of urgency associated with their activities may be strong. But it must be weighed against the operational realities of intelligence collection and the strategic implications of disclosure and what that means for exacerbating geopolitical situations, the ability to quietly monitor threat actor actions, or able to leverage such operations for signaling purposes publicly or via back channels. There are products for this; the ATA is not one of them.

Intelligence assessments are designed to be policy-neutral meant to inform decision-making, not prescribing it. Any assessment aligning too neatly with existing policy positions risks being seen as politicized, tailored to justify rather than to inform. For its perceived shortcomings, the 2026 ATA reflects a better balance. It acknowledges the centrality of cyber threats without overstating them. It also addresses geopolitical flashpoints without overcommitting U.S. involvement to specific scenario. It highlights technological competition without prescribing policy responses. In accomplishing these objectives, it preserves the integrity of the intelligence process. Looking forward, the challenge will be to maintain credibility to provide enough insight to inform and reassure the public, while safeguarding the capabilities that make that insight possible. If the 2026 assessment is any indication, the community is leaning toward caution.  And in an era defined by both information overload and strategic competition, that restraint may ultimately prove to be its greatest strength.

Tagged: geopolitical
Emilio Iasiello

About the Author

Emilio Iasiello

Emilio Iasiello has nearly 20 years’ experience as a strategic cyber intelligence analyst, supporting US government civilian and military intelligence organizations, as well as the private sector. He has delivered cyber threat presentations to domestic and international audiences and has published extensively in such peer-reviewed journals as Parameters, Journal of Strategic Security, the Georgetown Journal of International Affairs, and the Cyber Defense Review, among others. All comments and opinions expressed are solely his own.