Cybersecurity: What the Experts Say

cyberspace

If only I were as clever as Brad Parks who took his outrage over the pass given to Wachovia and Wells Fargo Bank execs who laundered many millions of dollars for a Mexican drug cartel (and they’re still at it) and turned it into a fantastic new thriller, The Last Act (my review here). What you’ll read below has the seeds of innumerable great and terrifying stories, but when I read it, I start spitting. These quotes were a handout for my Great Decisions group, a discussion program sponsored by the Foreign Policy Association

 “Our adversaries and strategic competitors will increasingly use cyber capabilities—including cyber espionage, attack, and influence—to seek political, economic, and military advantage over the United States and its allies and partners. China, Russia, Iran, and North Korea increasingly use cyber operations to threaten both minds and machines in an expanding number of ways—to steal information, to influence our citizens, or to disrupt critical infrastructure.” Daniel R. Coats, Director of National Intelligence statement to the Senate Select Committee on Intelligence as he presented the U.S. intelligence community’s assessment of worldwide threats, 29 Jan 2019.

“Few Americans realize the extent to which foreign intelligence services are stealing our most important secrets.” And “China is without question the number one counterintelligence threat facing the United States.” James Olson, former CIA Chief of Counterintelligence

“The Russian intelligence services, the inheritors of the legacy of their Soviet forebears, are our inexorable adversaries. They have at one time or another penetrated every significant organization and agency in the U.S. Government and, as evidenced by their recent efforts to undermine American democracy, are the most professionally proficient intelligence adversaries we confront.” Mark Kelton, former CIA Deputy Director for Counterintelligence

“Foreign cyber criminals will continue to conduct for-profit, cyber-enabled theft and extortion against U.S. networks.” And “Terrorists could obtain and disclose compromising or personally identifiable information through cyber operations, and they may use such disclosures to coerce, extort, or to inspire and enable physical attacks against their victims.” Daniel R. Coats

“The sheer acceleration in the number of attacks, and their rapidly changing goals, is one of several warning signs that we all are living through a revolution, playing out at digital speed.” David E. Sanger, The Perfect Weapon

“We cannot afford to protect everything to the maximum degree, so we’d better figure out what cannot fail.” Thomas Donahue, Senior Analyst, Center for Cyber Intelligence

Read More

I highly recommend Sanger’s The Perfect Weapon, P.W. Singer’s Like War: The Weaponization of Social Media, and if a well-constructed fictional scenario holds more appeal, P.W. Singer and August Cole’s 2015 near-future thriller, Ghost Fleet.

Photo: openDemocracy, creative commons license