Transcripts For CSPAN2 Book Discussion On Cybersecurity And

CSPAN2 Book Discussion On Cybersecurity And Cyberwar February 23, 2014

That was my First Experience with computers. Since then, with the centrality of computers to my life but all of our lives is almost impossible to fathom. For example, we live in a world where every year over 40 trillion emails are said to. The first read page was made 1991 now there are 30 trillion individual web pages it is no longer about compiling and sharing information but also to have an impact on the world beyond the online domain through the internet to of things. Cisco systems estimates of the next five years there will be more than 40 million internet enabled devices coming on line for refrigerators, cars, the thermostats google just paid a couple billion dollars for a thermostat business all linking together. So that means domains that range from communication, carvers, the infrastructure or conflict 90 percent of military communications run over civilian owned operated internet these are increasingly cyberdepended that we live in the digital age. These networks they are linked to we have reached a defining point just as ever dependence on this world is growing you can see this in a lot of ways. One is the astounding numbers. For example, every single second nine new pieces of smell where now where malware have been discovered. On the military side over 100 different nations have created some kind of cybermilitary command designed to fight and win wars. Theyre very first pole is a survey of americans what they feared most they found they feared cyberattacks were then iranian, north Korean Nuclear weapons, authoritarian russia or climate change. So these years that coalesce throughout the world also on the government side whether the National Level or state level with the bureaucracies. They also mean from all hope and promise we have to it meant we live through the era of cyberin security. At this point i try to do make that point as the challenge that was introduced before how you write on a technical topic to make it interesting . What kind of visuals when you talk about a space of zeros and ones . So i put together what i believe is a collection to make a point. It is my choices for the best and worst examples of cyberward barked. It will play to you for a couple of things to visually drive home the story of cyberinsecurity that is out there. Another is there are studies that found people are 60 more likely to retain if theyre looking at something it doesnt have to link it is just a weird way the human brain works that it goes back to the discussion that we need to recognize the human side with the strange foibles that we bring soulfully that technology will work and we have not been hacked. So to pull back why a book about cybersecurity and cyberwar . And is best encapsulated by two books the first is from president obama who declared cybersecurity risk posed the most serious economic and National Security challenges of the 21st century. The second quote is from the former cia director who said rarely has something been so important and talked about with less and less clarity and less apparent understanding. The cross between something that is incredibly important , but less and less understanding you can see it with different ways. For example, 70 of Business Executives not to see titos but executives in general makes some kind of cybersecurity decision for their Company Despite the fact no Major Program teaches its as part of your normal responsibility. That happens that the schools we teach our journalists, lawyers, diplom ats even those in the military. It is also filled with all sorts of strange, a funny in and sat anecdotes. For example, the former secretary of Homeland Security is in charge of cybersecurity talks about how she had not use email or social media over a decade. Not because she did not think it was secure but not useful. The Supreme Court justice that talked about how they had not gotten around yet to email. They will eventually but in the upcoming years they will decide cases that relates from that neutrality to the constitutionality but in their own world that they have not yet got around to it. This problem is not just an american problem. We see the same things nbd is with officials from china, a great britain, uae britain, uae, the lead civilian officials that is this is our in australia had never even heard of the Critical Technology in this space. That you have a gap is in issue and not as crucial at a personal level from areas that you carry about from your bank account to personal privacy to shaping the future of World Politics itself. In turn those issues connect back at the personal level like privacy with the day Edward Snowden affair. But it is treated as a domain for only one i called the i. T. Crowd they understand the hardware and software but it does not deal well with the human side all the ways it ripples sell beyond. And also looks at these issues through a specific plans and fails to appreciate the Ripple Effect so the dangers of the disconnect is diverse. Each of us would ever will be play with other professionals, business, the organization, citizen, what we think about political topics to how to protect ourselves of mind, online we make cybersecurity decisions that space shape our world and the real world. Met with eastern city essential concepts that define what is possible but what is proper and right and wrong and what is distorted. To obscure what actually happened with three are right now in reality and where we are headed to next. Some threats are overblown and overreacted and real threats that are ignored. For example, i am someone who loves history. Its pains me when i hear from senators to white house officials to prominent news columnist to say things that cyberweapons are just like the w. M. D. It is just like the cold war. It is a cybercold war. You see that terminology of the time. If you know, your history and the cyberhistory you will realize that parallel is not the one that they think they are making. If it is a parallel to the cold war period would we do not understand the technology but even more so the political dynamics it was driving with that period if history when we took the real world version of dr. Strange love seriously. What are some of these manifestations . We too often lulled together simply because they involve the internet. For example, the u. S. General in command of both military cybercommand and simultaneously wearing that hat as director of the nsa which we would not see happen in other fields but somehow it is okay here . She testified to Congress Every day Americas Armed forces face millions of cyberattacks end quote. But to get those numbers we must combine everything from unmotivated probes that never tried to enter the network to attempts to carry out pranks, political protest, economic espionage espionage, the National Security in espionage, altogether. None of those millions of a tax what they thought when he said it of a digital pearl harbor or cyber9 11. For example, digital pearl harbor has steadily been used in major government speeches been reported in the media over half a million times. So essentially when people talk about cyberattacks is a bundle together the various things simply because they involve the internet and related technology. The parallel would be like saying a group of teenagers with firecrackers or protesters with a smoke bomb a terrorist with a roadside bomb, a james bond with his pistol and a russian cruise missile. They all involve the technology and chemistry of gun powder but we would never do that but somehow it is acceptable in this space. Take the organizations. A senior u. S. Military official argued with me that anonymous and al qaeda were the same thing. Where every stand with anonymous i figured out i am probably more empathetic to anybody with the d. C. Security establishment but wherever you stand, they differ from al qaeda from the organization, personnel, a profile, their means the only thing they share is theyre both non state actors that begin with the letter a. That is not supported. These disconnects of policy in reality and technology is not only growing tension but feeding into poisoning the u. S. China relationship but also we are taken advantage of at the individual bubble. By that email you received from your mom saying i am stuck in iceland send me your bank account information. I did not know she was there but i better helper. We smile but it hits the most senior people. Of a group of diplomats theyve received the spear fishing email with the exciting offer if you click this link you will be able to see nude photos of the former french first lady. [laughter] many of them collect instead it down bloated spy wherefrom the Espionage Agency or to be taking advantage of that the business level or organizations level not doing enough to protect ourselves or hiring people who promise 100 Percent Security of the Silver Bullet solution. Frankly were taking advantage of that the National Political level which is behind a number of issues that played out with the nsa and Edward Snowden revelation. Reported the obama showed his frustration at the complexity of the technology with policy makers. Our inability to have a proper discussion about all of this not only can create a distortion of threats but a misapplication of resources. Maybe the best illustration is another number. The number of academic journals and articles focused on the phenomenon of cyberterrorism. Zero. The number of people that have been hurt or killed by a real incident of cyberterrorism. I joke is like shark week where we obsess about the danger of sharks even though you are 15,000 times more likely to be hurt your toilet but while jaws was fictional people have been hurt by sharks. I am not saying that terrorists dont use the internet there are several chapters how they use it to which is like the way the rest of us use it. The am also not saying there is the possibility or likelihood of cyberterrorism in the future with realworld impact. Like the first cyberweapon revealed. But that same story shows it is not how it is depicted whether the die hard scenario then all the power goes down or the way the former u. S. Military offical talkedabout how a couple of teenagers sitting in their parents basement wearing a flipflops carry out the did you md style attack. No. There is danger but it also requires to carry out at that height of a level a wide deep set of expertise. Everything from intelligence analysis and collection to expertise in fields ranging from Nuclear Physics it is not something of a couple of teenagers will get. But my point to put it a different way al qaeda would like to but it can. China could but it doesnt want to. For both of them. Yet. What im trying to say at a larger Level Strategy whether National Political strategy or Business Strategy or individual strategy it is always about choices, priorities. We need to weigh the centrality of of what we obsess about verses what is real and are other threats out there so while squirrels have taken down power grids more times than hackers have a does not mean it will not happen but the fictionalized scenario vs. Their real largest theft of all Human History that is happening right now. A Massive Campaign of intellectual property that involves Economic Security impact by one measure over a trillion dollars worth of value loss to a National Security impact with jewels of the crown may be decades of the future battlefield. So these may not be sexy as cyber9 11 discourse. Even how the military uses it. The military plays in this realm and look at the scenarios. Also from regular terrorism it is not about the direct impact of something but the Ripple Effect in your own action in response to determine the true story out it plays out. Put this critical value to the internet itself truss it is being hollowed out and damaged by the Massive Campaign of cybercrime that is out there but also damaged by other actions and response to threats. For example, the fear over traditional terrorism leading to meditate Debt Collection program that is not only to the National Standing in relationship to our allies but to American Technology companies where they estimated over 180 billion would be lost because of this. To the impact of the growing attempt of certain authoritarian governments around the world to push for a more state control the internet governance model. What does this mean for the future . This value of trust that has allowed the internet to run successfully, i would argue the greatest force for political social and economic change in all of history is being threatened. The internet that i grew to know and love may not be though one that my son inherits. That scares me. These disconnects mean sometimes react on bad assumptions are dont make assumptions in ways that truly matter. Take the discourse over offense and defense with interNational Security circles verses cybersecurity circles. A notion has taken hold that aside for offense is privileged against the defense. The u. S. Military report says it is not just at the advantage but it bluebead so for the foreseeable future as long as we can look out cyberoffense will dominate against cyberdefense. This has led the u. S. Military to spend almost four times as much on research and development as separative defense as cyberdefense but the first problem is cyberoffense is not as easy as depicted. You need more than that can of red bull to do an actual campaign. The defense is not lying fair helpless. There is a series of things they can do. With second, if you go to military history pretty much every Time Military assumes the offense would dominate they would get a break up call at the 100th year anniversary. Look at the european armies every single one thought because of the new technology of the day the offense was dominant they were feared stock on the defense they urge their government if there is any point of crisis we have to be the first to go because we dont want to be stuck on the defense. That is one of the forces to spark world war i. They were wrong. The offense was not so dominant. The third issue in terms of a metaphor the difference of applying a cold war by in every frame work to a more complex cyberworld. If you were in a class house worried about from gangs of teenagers to military attackers the best way to secure yourself is not to say i really need to buy a stone sharpening kitsch. That will solve my problems. What can we do . The last third of the book is everything from the global level to the National Level to the business organizational level to secure ourselves in the internet. I will not summarize 100 pages but identify what i think our key themes that carry through all of this. First Common Knowledge matters. It is vital we demystify the realm to get anything done effective to secure it. Move past the situation which we are in right now where the president of United States received a briefing on cyberissues then asked for repeated this time in english not to knock him but that happened in every major corporation, university and boast households. This is not solely for the i. T. Crowd or the domain for the nerds. No. It is for all of us. Second, people matter. Cybersecurity is the wicked problem because of the tradeoffs in large part not because of the technical side but because of the people side. It makes it useful from writers perspective tutto cool stories from the role of porn and the history of the internet to the episode of pakistan accidentally kicked after all the roles acute cat videos for one day. If you try to set up a response of the global or business level you have to recognize the people behind the machines are part of every thread and every response. Third, incentives matter. If you understand why something is or is not happening with Cipher Security look to the motivation, to the tensions that play. There is a reason finance companies are doing better not only with their own cybersecurity by sharing information with others and Power Companies because they are incentivize to understand the costs and consequences also pointing to the rule that government can and should play in this space. As a trusted information provider cover resource and in other situations with a wide variety of marketplaces to help change the incentive structures out there. Forthcoming history matters. There is a history to how we got here with the internet to understand that is key. If you hear of silly ideas expressed like we need a more secure internet. Just build that instead. My joke in the book is the idea to read through to the internet makes as much sense as to free brooch Beverly Hills nine 02 one no. We should act like it never happened. But also we can learn from other histories if we are wrestling with what do we deal with individual criminal groups with the domain of commerce communication and conflict . Looking for inspiration have they dealt with a different kind of direct if we are thinking about what Government Action is needed needed, lets get the instances of the most successful agencies out there. The case of the cdc which starts with literally members taking a 10 collection echoes on to eradicate malaria off, the small pox campaign or the back or the back channel to the soviets. Fisk on a ben franklin said in an ounce of prevention is worth 1 pound of cure. The cdc did studies that found his idea does hold true when you trust it with public health. Pre

© 2025 Vimarsana