vimarsana.com
Home
Live Updates
Transcripts For CSPAN2 After Words With Bill Gertz 20170416
Transcripts For CSPAN2 After Words With Bill Gertz 20170416
CSPAN2 After Words With Bill Gertz April 16, 2017
Soldiers armies bombs. And this discusses non kinetic forms of warfare do you think the media and society as a whole has an awareness of the importance of permission warfare and use of media and influence operation campaigns or as part of the goal of the book to raise
Awareness Among
the public. This is the point i make in the book. We are under and in flirt information assault. They are largely in the dark. That includes our government as well as the public at large. As you might recall in a recent hearing that you are the chair of one of the witnesses testified about the russians in their propaganda outlet in an official told them they would have no audience in the
United States
if the u. S. Media were doing its job properly. In a sense what has traditionally been the role of the
American Media
that is to provide both education and information has really fallen off. Right now were seen a politicization of the media into general liberal and conservative camps. And they are not really presenting the kind of news especially on
International Affairs
and about our enemies. One of the things ive always tried to do my journalism career as well as my career as an author is to highlight threats. If people dont have an understanding of the threat than it really is difficult to get the tools and the resources necessary to deal with the problems. So again this is a threat book. It deals with the main threats of
Information Warfare
and it shows that this is a serious strategic threat to the
United States
across a
Broad Spectrum
of areas from
International Affairs
to domestic affairs. We talk about the increase of
Information Warfare
is a strategic part of the
United States
. It is the use of social media. You talk about that in the book. Facebook users you actually include this statistic host 4. 75 billion pieces of content every day. As we see in our facebook feeds and twitter you choose the social network. In social media has also changed the landscape of conflict and in the book in fact you talk about the islamic states use of social media. A distinct feature of the media operation is its agility and ability to respond quickly to events also how performing state media. A network of dedicated online supporters who amplify the islamic states message. What should the u. S. To combat that. I pointed it out in the book that there is a kind of conflicting approach to this problem. On the one hand there is pressure from the u. S. Government to shut down the terrorist use of social media on the other hand theres an intelligence need to find out what theyre doing. This is a real challenge. How do you balance these two competing needs. Ive asleep monitoring social media much of which is an open source can produce valuable intelligence especially about people who are going to perpetrate attacks and this is really the problem that needs to be solved. I make the case that social media is being weapon eyes and we need to figure out ways to be able to have the same kind of agility that the terrorists have demonstrated they will shut down twitter feeds or facebook sites from terrorists that are known to be using this to recruit and then they will and they have their own private means of setting up a new
Communication Channels
very quickly. You knock one site down and immediately they had three or four others that they can use. Mother getting even more sophisticated they are going to encrypted communications we saw this in the recent case of the terrace in london who rammed ramped a number of pedestrians on the bridge. He was using a telegram which of the key tool of the
Russian Software
thats allowing terrorists to communicate much more difficult ways for intelligence agencies in the west to detect them. Does u. S. Law enforcement and as policymakers do have an adequate strategy ourselves to use social media to combat miss information with the truth and make sure that potential accrued recruits actually see information that we want them to see that this is not the proper interpretation. Basically what i found was the main tool for this is a state department centered strategic for terrorism. I spoke to a number of officials in researching the book and all of them agreed that they have a real challenge. Theyre not allowed to address the topic of islam itself. They have adopted at least under the
Obama Administration
and of course the
Trump Administration
is changing this now. Theyre talking openly about radical islamic terrorism in the past i argued that this has really made it very difficult for us to do counter operations. The state department under the center they actually did a study in the study was based on some experts. It is a classified study. It has been reported on in the past. Because the government has no credibility that should even shouldnt even attempt to try to do counter efforts against these terrorist groups online. That is a totally defeatist approach. You will never succeed if you dont even try. There are some new efforts just in december the latest congressional defense bill contained a new provision that is calling for counter disinformation and propaganda which is mostly targeted against russia but it needs to be much broader targeted against all of these main adversaries in the end the series loves their mechanism. It stands for china, russia, korea and terrorism. And so those are the main threats that we need to address and im hoping that under the trumpet ministration they will get more efforts both resources with people and leadership to tackle these tough problems. What of the most impressive parts of this book is that you look at different case studies and you just named china and russia and north korea. I wanted to delve into some of the examples that we have seen of the use of
Information Warfare
by the specific countries. The first one i would like to like to go to is north korea. I think the general public as well aware of the sony hack because it got i got so much
Media Coverage
that is of course a hack in response to the movie of the interview why was this such a significant event when it comes to
Information Warfare
. You spend a lot of time talking about that in this book. It took place in 2014 and it was based on the north korean governments recognition that they were really opposed to this movie the interview. It was an important thing in exposing the kind of problems that north korea poses. North korea needs to be understood and i dont think a lot of people understand this. It is a crimes against humanity regimes. They have exposed that. They had identified it and yet here we are in the 21st century and were still dealing with this regime that does horrible unspeakable things to its own people. The sony hack was really the first time that a government had attacked a private industry for political gain so the
Sony Pictures
they went in and they took information which was extremely damaging to the company as well as they conducted a damaging attack the software that was used actually destroyed the entire networks of these people is kind of a harbinger of things to come. For research for the book i actually interviewed a north korea defector. And he actually trained hackers in north korea and he issued a dire warning. He said the u. S. And the west should deftly take this threat seriously. What theyre going for ultimatelys u. S. Infrastructure. U. S. Infrastructure. The ability to turn out the light. To prevent us from operating a western society. The u. S. Is probably the most wired country in the world. Everything is networked. If detect if the structure you could cause strategic damage to the
United States
. And as a real danger. The
North Koreans
are building on that capability. They are still considered a secondtier threat to the russians. You are critical of the lack of response to the hack. Can you unpack that a little bit more so that they understand what the u. S. Did after the attack and if it was missed opportunities. I think covering this issue i learned from intelligence sources in the u. S. Government that senior officials of all the major agencies the
Intelligence Community
the pentagon
Law Enforcement
had presented a series of options to the
Obama White House
and these options were listen, we are under attack from these various places and unless we do something about it in a very real way these attacks are to continue. They presented a range of options ranging from imposing sanctions on the offending entities whether it was government officials all the way to conducting offense of counter
Cyber Attacks
that would actually go in and damaged some of the infrastructure of these organizations the chinese unit that was linked to the office of
Personnel Management
hack. They rejected all of those options so basically there hasnt been anything done in the case of sony they have made some symbolic sanctions against some north korean officials that really would have no impact. It was things like blocking them from entering the
United States
are blocking them from access to the
International Financial
system. Those are okay measures they werent enough to really make an impact and as a result we have seen an escalating scale of cyber and influence operations. The reason is there needs to be a greater response. The admiral who is the
Current National
Security Agency
chief has been one of the strongest advocates for tougher deterrence responses. He has been advocating that the cost of entry into this realm of information welfare is a low that its irresistible to our enemies to engage in that. The cost is raised that well have a deterrent effect and it will say hey if you attack the
United States
youre going to be attacked back. That will change the equation. And i to get highlights think it highlights an important question for policy makers that we are certainly grappling with. Because its a
Non Government Agency
what role should the department of defense play when we are discussing admiral watch rogers and making sure that we are sharing information with nongovernmental organizations of the
Cyber Threats
that are out there. That is really the big problem right now. Its what they call the lines of authority that allow the government to be able to do things their very blurred. They are not clear into the problem is that most of the infrastructure is in private hands. They are in charge of their own security. The government has a great resource of security abilities on their kind of constrained from using it there is a lot of reasons for that. We saw them really turned against the
National Security
agency which to me is the premier agency for
Cyber Security
other intelligence and
Law Enforcement
agencies in the pentagon had good capabilities to counter this but they are constrained by law and regulation about what they can do. Thats why i think we really need a new entity i call it information america where we would set up something that would be similar to the u. S. Information agency of the cold war era and it would transcend various agencies because if its part of the
Defense Department
Information Warfare
would be subordinated to kinetic military. If its in the
Intelligence Community
it would be imposed by heavy secrecy which is their culture. If its in the state department it would be what i call diplomacy impaired. Its oriented towards getting along with foreign nations if we have individual agency that could do this kind of thing i think it would help clarify those lines of authority and it could be both a content counter and promotion thing as well as technical and cyber to be able to cross over these two things and perhaps interact better with the private sector. The mic that is an interesting proposal that i get to at the end of our interview. We talked about north korea as being into tier two. Lets move to the tier one actors in this space. In one of the examples that you touch upon. Mommy find the quote. You write no other nation today poses a greater danger to american
National Security
than china to stay engaged in an
Unprecedented Campaign
of
Information Warfare
using both massive cyber attack and influence operations aimed at diminishing what beijing regards as the most strategic enemy the u. S. The example that ive experienced with china was the hacking of the office of
Personnel Management
. I served in the administration and i was one of the individuals that got the notification that my information was part of the hacking. Why was at such a significant event and second, talk to me about chinas broader capabilities and how they differ from the two tier two actors. They recognized early on that they do not had the physical military capabilities to challenge the
United States
. And right now china is challenging the
United States
the u. S. Has largely self deluded itself that china is a normal nation when in fact it is a
Nuclear Armed
dictatorship. I had been covering the issue for over 30 years. The problem is the chinese everybody talks about chinas rise but what theyre also doing is trying to manage the decline of the
United States
. They have what they regard as the decline this theory. They have a rising power and they are working to help diminish the
United States
. That is the underpinnings of their
Information Warfare
operations against the
United States
. The opm hack was unique in the fact that 22 million federal records were attacked. But that was just one element of this broad thing that have been going on for at least a decade on the
Intelligence Community
have a code name for it. It was called byzantine hades. They had broken into and it was primarily a
Cyber Espionage
operation. They stole the records which included the most
Sensitive Information
that you could possibly had in the u. S. Government things about security clearances they were questioned about someone getting a security clearance. It was extremely valuable for further
Cyber Attacks
. What they can do with the information is shifted using the tools and then be able to identify assistance administrator inside a defense contractor. Use that to gain access to gain further access information. These attacks have been kind of diminished as this is just intelligence gathering. I think it is a real misnomer. These are attacks and the reason you cant say that its just simple intelligence gathering is because there are two things that happen in the chinese to get get inside a network like the office of
Personnel Management
. This is a littleknown fact they plant something called sleeper
Agent Software
that is software that communicates with beijing but is almost impossible to detect. And maybe communicates back once a year and its mixed in with the software that make up these millions of lines of code. And so this is the real problem. In a crisis they could use that software to shut down networks or to do other damaging or sabotage efforts. We are having trouble with the terminology or is it cyber sabotage. Its accommodation of both. In terms of the amount of data that they have stolen. They estimate that the amount of data stolen by the cyber spies is that 50 terabytes of data that equivalent of five times all the information contained in the nearly 161 million books and other printed material held by the library of congress. That is astounding. It demonstrates how much of a threat it is. The use of that data is what is critical. I interviewed a person from a
Data Mining Company
in the u. S. He basically said in china there are some 60,000
Data Mining Companies
that are emerging. They are having the ability to manipulate and mine that data for useful intelligence and also to conduct future cyber operations. Another tier one actor is russia. He spent a fair amount of time in the book as well. In my committee in congress has also spent a great deal of time on that. Can you give the viewers a sense of a scale size and scope. It is significant. Just last week i went to a conference where the
Deputy National
director was giving director was giving a speech and afterwards i went up to him and i said i heard a number of years ago the director of
National Intelligence
said that russia had eclipsed china as the major threat in the cyber realm and i ask who is the bigger threat is that russia or china and he said russia. The reason is the russians are building their
Cyber Capabilities
in their influence capabilities. They have a tremendous
Awareness Among<\/a> the public. This is the point i make in the book. We are under and in flirt information assault. They are largely in the dark. That includes our government as well as the public at large. As you might recall in a recent hearing that you are the chair of one of the witnesses testified about the russians in their propaganda outlet in an official told them they would have no audience in the
United States<\/a> if the u. S. Media were doing its job properly. In a sense what has traditionally been the role of the
American Media<\/a> that is to provide both education and information has really fallen off. Right now were seen a politicization of the media into general liberal and conservative camps. And they are not really presenting the kind of news especially on
International Affairs<\/a> and about our enemies. One of the things ive always tried to do my journalism career as well as my career as an author is to highlight threats. If people dont have an understanding of the threat than it really is difficult to get the tools and the resources necessary to deal with the problems. So again this is a threat book. It deals with the main threats of
Information Warfare<\/a> and it shows that this is a serious strategic threat to the
United States<\/a> across a
Broad Spectrum<\/a> of areas from
International Affairs<\/a> to domestic affairs. We talk about the increase of
Information Warfare<\/a> is a strategic part of the
United States<\/a>. It is the use of social media. You talk about that in the book. Facebook users you actually include this statistic host 4. 75 billion pieces of content every day. As we see in our facebook feeds and twitter you choose the social network. In social media has also changed the landscape of conflict and in the book in fact you talk about the islamic states use of social media. A distinct feature of the media operation is its agility and ability to respond quickly to events also how performing state media. A network of dedicated online supporters who amplify the islamic states message. What should the u. S. To combat that. I pointed it out in the book that there is a kind of conflicting approach to this problem. On the one hand there is pressure from the u. S. Government to shut down the terrorist use of social media on the other hand theres an intelligence need to find out what theyre doing. This is a real challenge. How do you balance these two competing needs. Ive asleep monitoring social media much of which is an open source can produce valuable intelligence especially about people who are going to perpetrate attacks and this is really the problem that needs to be solved. I make the case that social media is being weapon eyes and we need to figure out ways to be able to have the same kind of agility that the terrorists have demonstrated they will shut down twitter feeds or facebook sites from terrorists that are known to be using this to recruit and then they will and they have their own private means of setting up a new
Communication Channels<\/a> very quickly. You knock one site down and immediately they had three or four others that they can use. Mother getting even more sophisticated they are going to encrypted communications we saw this in the recent case of the terrace in london who rammed ramped a number of pedestrians on the bridge. He was using a telegram which of the key tool of the
Russian Software<\/a> thats allowing terrorists to communicate much more difficult ways for intelligence agencies in the west to detect them. Does u. S. Law enforcement and as policymakers do have an adequate strategy ourselves to use social media to combat miss information with the truth and make sure that potential accrued recruits actually see information that we want them to see that this is not the proper interpretation. Basically what i found was the main tool for this is a state department centered strategic for terrorism. I spoke to a number of officials in researching the book and all of them agreed that they have a real challenge. Theyre not allowed to address the topic of islam itself. They have adopted at least under the
Obama Administration<\/a> and of course the
Trump Administration<\/a> is changing this now. Theyre talking openly about radical islamic terrorism in the past i argued that this has really made it very difficult for us to do counter operations. The state department under the center they actually did a study in the study was based on some experts. It is a classified study. It has been reported on in the past. Because the government has no credibility that should even shouldnt even attempt to try to do counter efforts against these terrorist groups online. That is a totally defeatist approach. You will never succeed if you dont even try. There are some new efforts just in december the latest congressional defense bill contained a new provision that is calling for counter disinformation and propaganda which is mostly targeted against russia but it needs to be much broader targeted against all of these main adversaries in the end the series loves their mechanism. It stands for china, russia, korea and terrorism. And so those are the main threats that we need to address and im hoping that under the trumpet ministration they will get more efforts both resources with people and leadership to tackle these tough problems. What of the most impressive parts of this book is that you look at different case studies and you just named china and russia and north korea. I wanted to delve into some of the examples that we have seen of the use of
Information Warfare<\/a> by the specific countries. The first one i would like to like to go to is north korea. I think the general public as well aware of the sony hack because it got i got so much
Media Coverage<\/a> that is of course a hack in response to the movie of the interview why was this such a significant event when it comes to
Information Warfare<\/a>. You spend a lot of time talking about that in this book. It took place in 2014 and it was based on the north korean governments recognition that they were really opposed to this movie the interview. It was an important thing in exposing the kind of problems that north korea poses. North korea needs to be understood and i dont think a lot of people understand this. It is a crimes against humanity regimes. They have exposed that. They had identified it and yet here we are in the 21st century and were still dealing with this regime that does horrible unspeakable things to its own people. The sony hack was really the first time that a government had attacked a private industry for political gain so the
Sony Pictures<\/a> they went in and they took information which was extremely damaging to the company as well as they conducted a damaging attack the software that was used actually destroyed the entire networks of these people is kind of a harbinger of things to come. For research for the book i actually interviewed a north korea defector. And he actually trained hackers in north korea and he issued a dire warning. He said the u. S. And the west should deftly take this threat seriously. What theyre going for ultimatelys u. S. Infrastructure. U. S. Infrastructure. The ability to turn out the light. To prevent us from operating a western society. The u. S. Is probably the most wired country in the world. Everything is networked. If detect if the structure you could cause strategic damage to the
United States<\/a>. And as a real danger. The
North Koreans<\/a> are building on that capability. They are still considered a secondtier threat to the russians. You are critical of the lack of response to the hack. Can you unpack that a little bit more so that they understand what the u. S. Did after the attack and if it was missed opportunities. I think covering this issue i learned from intelligence sources in the u. S. Government that senior officials of all the major agencies the
Intelligence Community<\/a> the pentagon
Law Enforcement<\/a> had presented a series of options to the
Obama White House<\/a> and these options were listen, we are under attack from these various places and unless we do something about it in a very real way these attacks are to continue. They presented a range of options ranging from imposing sanctions on the offending entities whether it was government officials all the way to conducting offense of counter
Cyber Attacks<\/a> that would actually go in and damaged some of the infrastructure of these organizations the chinese unit that was linked to the office of
Personnel Management<\/a> hack. They rejected all of those options so basically there hasnt been anything done in the case of sony they have made some symbolic sanctions against some north korean officials that really would have no impact. It was things like blocking them from entering the
United States<\/a> are blocking them from access to the
International Financial<\/a> system. Those are okay measures they werent enough to really make an impact and as a result we have seen an escalating scale of cyber and influence operations. The reason is there needs to be a greater response. The admiral who is the
Current National<\/a>
Security Agency<\/a> chief has been one of the strongest advocates for tougher deterrence responses. He has been advocating that the cost of entry into this realm of information welfare is a low that its irresistible to our enemies to engage in that. The cost is raised that well have a deterrent effect and it will say hey if you attack the
United States<\/a> youre going to be attacked back. That will change the equation. And i to get highlights think it highlights an important question for policy makers that we are certainly grappling with. Because its a
Non Government Agency<\/a> what role should the department of defense play when we are discussing admiral watch rogers and making sure that we are sharing information with nongovernmental organizations of the
Cyber Threats<\/a> that are out there. That is really the big problem right now. Its what they call the lines of authority that allow the government to be able to do things their very blurred. They are not clear into the problem is that most of the infrastructure is in private hands. They are in charge of their own security. The government has a great resource of security abilities on their kind of constrained from using it there is a lot of reasons for that. We saw them really turned against the
National Security<\/a> agency which to me is the premier agency for
Cyber Security<\/a> other intelligence and
Law Enforcement<\/a> agencies in the pentagon had good capabilities to counter this but they are constrained by law and regulation about what they can do. Thats why i think we really need a new entity i call it information america where we would set up something that would be similar to the u. S. Information agency of the cold war era and it would transcend various agencies because if its part of the
Defense Department<\/a>
Information Warfare<\/a> would be subordinated to kinetic military. If its in the
Intelligence Community<\/a> it would be imposed by heavy secrecy which is their culture. If its in the state department it would be what i call diplomacy impaired. Its oriented towards getting along with foreign nations if we have individual agency that could do this kind of thing i think it would help clarify those lines of authority and it could be both a content counter and promotion thing as well as technical and cyber to be able to cross over these two things and perhaps interact better with the private sector. The mic that is an interesting proposal that i get to at the end of our interview. We talked about north korea as being into tier two. Lets move to the tier one actors in this space. In one of the examples that you touch upon. Mommy find the quote. You write no other nation today poses a greater danger to american
National Security<\/a> than china to stay engaged in an
Unprecedented Campaign<\/a> of
Information Warfare<\/a> using both massive cyber attack and influence operations aimed at diminishing what beijing regards as the most strategic enemy the u. S. The example that ive experienced with china was the hacking of the office of
Personnel Management<\/a>. I served in the administration and i was one of the individuals that got the notification that my information was part of the hacking. Why was at such a significant event and second, talk to me about chinas broader capabilities and how they differ from the two tier two actors. They recognized early on that they do not had the physical military capabilities to challenge the
United States<\/a>. And right now china is challenging the
United States<\/a> the u. S. Has largely self deluded itself that china is a normal nation when in fact it is a
Nuclear Armed<\/a> dictatorship. I had been covering the issue for over 30 years. The problem is the chinese everybody talks about chinas rise but what theyre also doing is trying to manage the decline of the
United States<\/a>. They have what they regard as the decline this theory. They have a rising power and they are working to help diminish the
United States<\/a>. That is the underpinnings of their
Information Warfare<\/a> operations against the
United States<\/a>. The opm hack was unique in the fact that 22 million federal records were attacked. But that was just one element of this broad thing that have been going on for at least a decade on the
Intelligence Community<\/a> have a code name for it. It was called byzantine hades. They had broken into and it was primarily a
Cyber Espionage<\/a> operation. They stole the records which included the most
Sensitive Information<\/a> that you could possibly had in the u. S. Government things about security clearances they were questioned about someone getting a security clearance. It was extremely valuable for further
Cyber Attacks<\/a>. What they can do with the information is shifted using the tools and then be able to identify assistance administrator inside a defense contractor. Use that to gain access to gain further access information. These attacks have been kind of diminished as this is just intelligence gathering. I think it is a real misnomer. These are attacks and the reason you cant say that its just simple intelligence gathering is because there are two things that happen in the chinese to get get inside a network like the office of
Personnel Management<\/a>. This is a littleknown fact they plant something called sleeper
Agent Software<\/a> that is software that communicates with beijing but is almost impossible to detect. And maybe communicates back once a year and its mixed in with the software that make up these millions of lines of code. And so this is the real problem. In a crisis they could use that software to shut down networks or to do other damaging or sabotage efforts. We are having trouble with the terminology or is it cyber sabotage. Its accommodation of both. In terms of the amount of data that they have stolen. They estimate that the amount of data stolen by the cyber spies is that 50 terabytes of data that equivalent of five times all the information contained in the nearly 161 million books and other printed material held by the library of congress. That is astounding. It demonstrates how much of a threat it is. The use of that data is what is critical. I interviewed a person from a
Data Mining Company<\/a> in the u. S. He basically said in china there are some 60,000
Data Mining Companies<\/a> that are emerging. They are having the ability to manipulate and mine that data for useful intelligence and also to conduct future cyber operations. Another tier one actor is russia. He spent a fair amount of time in the book as well. In my committee in congress has also spent a great deal of time on that. Can you give the viewers a sense of a scale size and scope. It is significant. Just last week i went to a conference where the
Deputy National<\/a> director was giving director was giving a speech and afterwards i went up to him and i said i heard a number of years ago the director of
National Intelligence<\/a> said that russia had eclipsed china as the major threat in the cyber realm and i ask who is the bigger threat is that russia or china and he said russia. The reason is the russians are building their
Cyber Capabilities<\/a> in their influence capabilities. They have a tremendous
Technology Base<\/a> and a lot of those technologies which were involved have now emerged as key players in the cyber realm. And at the combination of private sector as well as the
Intelligence Services<\/a> are going great guns and using these
Cyber Capabilities<\/a> in what they see is a main threat. They had identified at the
United States<\/a> as a main enemy. Something that putin is using to whip up hysteria. There was an indictment against two
Russian Hackers<\/a> into intelligence officers. I know we had spoken a lot about cyber warfare but i think the case of russia allows us to influence
Information Operation<\/a> on the specific manipulation of the media i wanted to quote them in 2013 the very rules of war have changed. The role of nonmilitary means has grown and in many cases they have exceeded the power of force and weapons in their effectiveness. I think as were looking at russias increasing influence when it comes to undermining our nato allies we see a very unique way that they are using
Information Warfare<\/a> can you talk about that in terms of its operation into the ukraine and the crimea specifically. The russians strategic threat is extremely dangerous and i dont use that term lightly. And dont scare easily. Over the last several years had just really frightened me. One their emerging cyber warfare but behind the scenes is also the nuclear development. In addition to new
Nuclear Weapons<\/a> as well as developing small
Nuclear Weapons<\/a> that are actually usable in a conflict. I mentioned in the book that the pentagon did a study of their low yield
Nuclear Weapons<\/a> the russians have changed their tactics to the point where they have this policy called escalate to deescalate. They need
Nuclear Weapons<\/a>. With the use of
Information Warfare<\/a>. It was a case study in what has been known as hybrid warfare. They took over this industrial region without firing a shot. Without insignia. It became known as little green men. To put forth false narratives. I belong to russia. A
Large Russian<\/a> population. This one was really a wakeup call to the west. As far as the russian ideology goes and looked at what is motivating
Vladimir Putin<\/a> to do these things. A nationalist approach. The biggest catastrophe for russia and he is bent on reestablishing a russian supremacist state that he said will stretch from the pacific to the atlantic. And will control all of the areas around russia. This is a very dangerous situation we are seen seeing the russians emerge in under a regime that has designs on taking over a nation the apologists in the propagandist outlet for russia had diminished this by saying whats a little a section of a country like crimea. If we learned anything from the last session at least a very bad things. I think thats where we are now. Unless the aggression is reversed we are gonna see more problems with russia down the road. When it comes specifically we saw how effective this
Information Campaign<\/a> was in terms of shaping
Media Coverage<\/a> i wanted to touch upon my initial question about what is the media is aware of this happening and have been a tool for these dis
Information Campaign<\/a>s. I think this case crystallizes what we need to do to encourage members of the media to understand what is happening how can we do that. Im certainly concerned about this. I want to ensure that what im reading in the news is not shaped by our adversaries . Dealing with the press today ive seen the news media is kind of in turmoil. You find that newspapers and now is struggling to survive setting up pay walls but as i mentioned its also been a certain politicization of the media and as we say and is dominated by three issues which is gender identity racism and global warming. On the conservative side give a focus on
Security Issues<\/a> a domestic issue in a little bit more concerns about government overreach. And these two issues have created a
Division Within<\/a> our society. If you watch the network news every night as i do i thought its incredible bias is so obvious that people arent getting along. Its mostly domestically focus. And unless there is a major event like a terrorist attack we arent covering overseas. Were not covering these threats and again it is identifying in these threats. The other thing is in the liberal media today there is a post modern. And of course our enemies dont agree with that view at all. Thats really where we need to focus on understanding the threats more. Another very notable fact in the book is the fact that the russians conducted the first known
Cyber Attacks<\/a> against the foreign power grid. They also demonstrated that the russians are leading the weight was
Cyber Attacks<\/a> including the first known cyber attack against the foreign nation electrical power grid with tens of thousands of ukrainians. From my perspective that is deeply concerning the fact that these
Cyber Attacks<\/a> can happen to
Critical Infrastructure<\/a> around the world or even in the u. S. What potential threat does that pose a for us in the u. S. And what can we do to ensure that we have the defense measures in place to combat that. Is the big enchilada in terms of
Cyber Threats<\/a>. The bad news is the u. S. Intelligence and
Law Enforcement<\/a> has already detected both russian and chinese cyber intruders getting into the networks that map the grid. What does that mean. It means theyre doing reconnaissance so that the future crisis they could shut down the power present kind of a fictional scenario and the in the china chapter as a result of a crisis in the
South China Sea<\/a> where a u. S. Plane sinks a chinese worship that rather than conduct a kinetic counterattack they dispatch covert commanders to pennsylvania at a specific node in the grid and actually make it look like it was a
Natural Disaster<\/a> a tree telling on a power line and then they use
Cyber Attacks<\/a> to create a cascading power failure over the three grids of the u. S. Electrical grid. Thats exactly the kind of thing the people are worried about. And i think some subs are being taken to try to strengthen and harden the grid against those attacks but its not going to be easy. For example transformers it has been shown that through cyber you can cause a transformer to explode and blow up. It can be very costly it will take a long time. The u. S. Doesnt make transformers. And so this is the kind of thing that we need a more comprehensive approach. We talk about
Critical Infrastructure<\/a>s. It should be the top priority hardening the electrical grid. Iran is deftly an emerging power in
Information Warfare<\/a> steer. I want to highlight in the chapter is that iran has gone from low level defacement of websites to
Cyber Espionage<\/a> to the upper tier of those. It is the ability to create damage. The sands casino. It was a very sophisticated cyber attack. The iranians attacked the site. It was a dam up state new york. They were able to get inside of the control of the steam. And have this. They couldve created a
Natural Disaster<\/a>. It was a very serious threat. The government has done a little bit. They indicted a number of iranian hackers recently that revealed some of the information that much more information has to be put out. If to identify these threats. If we dont when i can know how to counteract those threats. Since i represent new yorks 21st district its disturbing to me. I think many of these examples highlight that these are non governmental organizations and institutions in the u. S. Need to do a much better
Job Information<\/a> sharing so that we can ensure whether you are private company a
Financial Institution<\/a>
Critical Infrastructure<\/a> you have the tools to be able to invest in
Cyber Security<\/a>. So the situations dont happen. I want to look more broadly at some of the conclusions in the book. I want to preface this by saying im in a read this quote but the big question is where we go from here. We have an opportunity with the new administration with a new congress to put forth a strategy when it comes to
Information Warfare<\/a> and i found it quite compelling in the book you talked about a 2012 study produced by the joint chief of staff and it found that the u. S. Lacked a strategic understanding of
Information Warfare<\/a> needed in the war on terror. The u. S. Was slow to recognize the importance of information in the battle for the narrative in achieving objectives at all levels. It was often ineffective in aligning the goals and desires. You talked about the need for a new
Information Agency<\/a> how is that one part of where we go from here. I would love to hear some of the conclusions you had drawn in this book. See mike its been a feature of my books that again i highlight a lot of the threats and paints a pretty dark picture but i always try to prevent present proposals on how to fix the problems. I presented the outlines of a number of issues i mentioned information america its basically a usia for the 21st century. How could be structured is up for debate. It could be a
Government Entity<\/a> like it was in the past it could be a private sector. Funded by philanthropist were realistically could be a combination of the two where it would be supported by intelligence agencies and
Diplomatic Service<\/a> as well but really focused on setting up programs so i present an outline on how we do this obviously there is room for debate. We need to identify these problems and then come up with some solutions and i think have a pretty good idea that if we dont try to do this were going to be in bigger trouble down the road. The problem is getting worse. We did not talk extensively about the influence operation but clearly that was a new step and it left the government saying while we never thought about our election as part of a
Critical Infrastructure<\/a>. The fbi during the cold war that was one of their jobs to counteract that than soviet influence. They can get out of that. Its very difficult to do in a polarized political environment but i think we need to have a public debate on these issues and come up with some real solutions. Im optimistic that the
Trump Administration<\/a> will take a look at this. I know like yourself and others there looking at some solution to this. I love books that look very critically at the challenges they face but then present ideas and recommendations and you talk about as part of information america another a number of projects for them peak my interest. If i could go through these and get the quick summary of what they are. The big data project what would that mean . The government is very much interested in using big data. Thats basically all of this open source material whether its from social media news sources or other sources and putting it all together and identifying patterns. Youre able to use that in a constructive way that could counteract some of the false narratives. Thats kind of what theyre doing. The company in the story. They do some government work. Its a very complicated area. It involves the ability to first gather the data and then most importantly to be able to make sense of it and find out whats going on. Again, youd had to have this in russian and chinese and then you have to develop
Language Skills<\/a> and technologies that could shifted chinese characters or cyrillic. I think that is really a growth area to be able to use big data. Another project that you recommended is the hollywood project. Americans in the
Film Industry<\/a> was one reason that people around the world loved america but unfortunately in hollywood today you have a narrative that portrays the
United States<\/a> in the worst light possible. Its almost a cliche in every movie that its anti corporate. The bad guys are always who in the past used to be the good guys im not saying that we should let them do that but i know that there is a big market for pro american patriotic movie that have a different narrative. Lets set up a pro american
Film Industry<\/a> or studio i know glenn beck has talked about doing this. Its something that is urgent. I think it would be a commercial market for a. Because films that do
Patricia America<\/a> while it could just be dismissed as propaganda but we need to get over there and say with some great things to offer the world we need to promote democracy against the chinese socialist model i think that would be one way to do it. This takes you to my next point. You mentioned this idea of the hamilton project. Obviously thats in response to the hamilton musical and the success weve seen beyond all previous broadway plays. Earlier in the book separate from this discussion you talk about how our
Founding Fathers<\/a> understood the importance of
Information Warfare<\/a> and influence operations. What were the with the hamilton project look like. It does highlight the strength of our u. S. Republican democratic government and the challenges that our founders face. It would be an offshoot of the hollywood project but more oriented towards using the broadway arts in place and musicals for this purpose. I think the hamilton project really does show that you can use artistic venues to promote the rest of america. And i think we should be able to apologize for that. The liberal left narrative is that america is evil country and should be all of its faults should be highlighted. I think we need to promote that view. Now im gonna turn the tables. What is your recommendation for members of congress. On the permanent select community. We have oversight over the
Defense Department<\/a>. What is your recommendation for elected officials in the
Big Questions<\/a> that we need to be asking and that things we need to go through to be a better place to do for years from now when it comes to
Information Warfare<\/a>. The biggest thing that congress could do would be to help the
American People<\/a> understand the threats that were facing. That is really the key. If people dont think theres a threat or they think the threat is just a reflection of the same thing the u. S. Government does there is a misunderstanding there. Congress can be a valuable resource in helping at the
Defense Department<\/a> to promote things like understanding the chinese
Information Warfare<\/a> threat the
Intelligence Community<\/a> as well. They have information at their whole culture is we cant let anybody know this. The information explosion around the world things travel at light speed and yet we cant get information out when something comes to light. If we can establish better procedures and policies i think congress could play a key role there. All of the best things that ive seen in my career have come as a result of congressional action. Here is an example. Congress mandated that the pentagon produce an annual report on the chinese military. The chinese hated it. It is one of the most important baselines for understanding whats going on. Similar things could be done with
Information Warfare<\/a> and
Cyber Threats<\/a>. Lets get this information out there so that people can know so that our companys canal and so we can take steps to fix the problems. One of the policy questions that were grappling with is the importance of u. S. Cyber command. As you know admiral rogers is dual headed in the commander of u. S. Cyber command. What should we do to mature that. And should we look at splitting that dual hat. This has been one of the key questions. Its a chicken or egg problem. The problem is that an essay which is co located with
Cyber Command<\/a> is the repository of the best
Cyber Capabilities<\/a>. They are focused on intelligence gathering. That is her main mission. Cyber command in the job is to know the threats and then to be ready when needed to be able to take action either defensive action to block or in the work our sense to wage cyber warfare in the future. The lines of authority remain blurred in fact they committed recently that the lawyers are controlling it. They are not allowed to use the
Cyber Capabilities<\/a> because they are restricted by legal constraints. There clearly needs to be at some point
Cyber Command<\/a> that will be separated and probably be elevated to its own combatant command. But until they can figure out the legal differences and figure out a way that they can directly support
Cyber Command<\/a> as probably can a stay that way for another year or so. I am a big believer in publicprivate partnership. Whether its a big data project how can we more effectively it worked with worked with the private sector specifically our
Technology Companies<\/a> that are investing in research and development and big data analytics. It is really the industrial heart of america right now. I pointed out that a lot of the people have been coopted by the left there was a great article by a guy who talked about this infants good values in the political left in a lot of ways is coopted many of the people in
Silicon Valley<\/a> whose instincts i think could be much more developed in the processing security directive and said it is kind of leaning in the limitary direction where they dont want to be interacting with the government. They think they had two any problems and its too bureaucratic i think there needs to be some outreach. I know the cia has the
Technology Unit<\/a> and the pentagon has an
Innovation Center<\/a> there. I think the challenge is really to try to get them to contribute to this battle against foreign
Information Warfare<\/a> threat. I think the social
Media Companies<\/a> in the titans out there were educated to some of the things i am writing about in iowa i think it would change their view on how to deal with these problems. Dealing do think its an opportunity for this and menstruation to invite members of companies there. To bring in the best and brightest. There are so
Many Companies<\/a> that understand that importance of
Cyber Security<\/a> and the
Information Warfare<\/a> has been an increasing threat with the u. S. Do you think its a opportunity for this administration. I think thats the first step that should be taken. A lot of times commissions like that can be oriented by the people you pick it will be done in a way that will create some real policy proposal. Lets get some of the
Silicon Valley<\/a> people. And lets get them all working together. It is going to get a lot worse as we saw in the last election. At second the stop. It will be there in 2020 it will be there in 2018. This is an urgent problem that needs to be addressed right away. Now i want to turn to some fun process questions as well. Can you tell me how long this book took you to write. But actual from start to finish in terms of brainstorming to publication how long did it take. I began work on the book in april of 2016 and my deadline to turn in the manuscript was august first. I relied on a lot of my reporting that i have done i took some of the stories and i did further research i tried to identify again without having known that the government had identified these
Major Players<\/a> i was able to do chapters on each and every one of these and i did a lot of inside information that is one of the advantages to writing. This is the first book that ive written since 2008. And back then there wasnt the same level of access to information as it is now. With so much information at our fingertips its just an information explosion out there. There is incredible resources that are out there. For example i found a report that was done on russian
Information Warfare<\/a> it was done a polish woman and a fascinating look at how the russians orchestrated the takeover of crimea. A lot of the information i was able to get the and put it all together. The publisher was very good. We did a little bit of a backandforth. I think it came out very well. And the feedback has been quite positive. There are a number of parts of this book that actually made news. This was amazing. One of the solutions to the north korea problem. There is a way to change the regime in north korea. We need to change that regime. It shouldnt be should be allowed to torture its own people. My solution was and have them send cell phones and computers. I know from the
Korean People<\/a> they are innovated enough and breakthrough it will change very rapidly. One of the tools would be to set up to really put the pressure on them. Through their ministry of state to security conducted at assassination. As he walked through the airport. Using the vx nerve agent. This took away a potential leader and in order to understand the regime at the
Family Dynasty<\/a> three generations of dictators and so the solution then is to target the center of gravity of the north korean regime. I have the opportunity to travel to south korea. In the cover of the newspaper was two days after the assassination. It is a significant
National Security<\/a> challenge and its can be incredibly important for policymakers the north korean challenge is significant and having a strategy to shed light and ensure that north korean population actually has access to the truth of information. I think that will undermine at the regime the regime and have a potential future for
North Koreans<\/a>. It was certainly eyeopening visiting there. Weve reached the end of our book talk. And for your willingness to put decades of work from writing a book like this. I really appreciate you taking the time. She spent where history unfolds daily. It was created at a
Public Service<\/a> by americas
Cable Television<\/a> companies. Its brought you today by your cable or satellite provider. Sunday night on afterwards. With the book i wore. It examines how modern warfare has evolved. The member of the
House Select Committee<\/a> on intelligence and share of the
Armed Services<\/a> committee. It is really a look at what i feel is the new form of warfare. The dominant form of warfare. Watched after words on cspan2s, booktv","publisher":{"@type":"Organization","name":"archive.org","logo":{"@type":"ImageObject","width":"800","height":"600","url":"\/\/ia800603.us.archive.org\/22\/items\/CSPAN2_20170416_020000_After_Words_with_Bill_Gertz\/CSPAN2_20170416_020000_After_Words_with_Bill_Gertz.thumbs\/CSPAN2_20170416_020000_After_Words_with_Bill_Gertz_000001.jpg"}},"autauthor":{"@type":"Organization"},"author":{"sameAs":"archive.org","name":"archive.org"}}],"coverageEndTime":"20240627T12:35:10+00:00"}