{"id":7912,"date":"2019-04-25T05:54:37","date_gmt":"2019-04-25T09:54:37","guid":{"rendered":"https:\/\/vweisfeld.com\/?p=7912"},"modified":"2019-05-15T10:14:41","modified_gmt":"2019-05-15T14:14:41","slug":"cybersecurity-what-the-experts-say","status":"publish","type":"post","link":"https:\/\/vweisfeld.com\/?p=7912","title":{"rendered":"Cybersecurity: What the Experts Say"},"content":{"rendered":"\n<div class=\"wp-block-image\"><figure class=\"alignleft\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"225\" src=\"https:\/\/i0.wp.com\/vweisfeld.com\/wp-content\/uploads\/2017\/05\/cyberspace.jpg?resize=300%2C225&#038;ssl=1\" alt=\"cyberspace\" class=\"wp-image-6582\" srcset=\"https:\/\/i0.wp.com\/vweisfeld.com\/wp-content\/uploads\/2017\/05\/cyberspace.jpg?w=300&amp;ssl=1 300w, https:\/\/i0.wp.com\/vweisfeld.com\/wp-content\/uploads\/2017\/05\/cyberspace.jpg?resize=150%2C113&amp;ssl=1 150w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/figure><\/div>\n\n\n\n<p>If only I were as clever as Brad Parks who took his outrage\nover the pass given to <a href=\"http:\/\/www.nbcnews.com\/id\/35914759\/ns\/business-world_business\/t\/wachovia-settle-drug-money-laundering-case\/#.XMDDe6R7m70\">Wachovia<\/a>\nand Wells Fargo Bank execs who laundered many millions of dollars for a Mexican\ndrug cartel (<a href=\"https:\/\/www.justice.gov\/usao-sdca\/pr\/wells-fargo-personal-banker-indicted-money-laundering\">and\nthey\u2019re still at it<\/a>) and turned it into a fantastic new thriller, <em>The Last Act<\/em> (<a href=\"https:\/\/crimefictionlover.com\/2019\/03\/the-last-act\/\">my review here<\/a>).\nWhat you\u2019ll read below has the seeds of innumerable great and terrifying\nstories, but when I read it, I start spitting. These quotes were a handout for my\nGreat Decisions group, a discussion program sponsored by the <a href=\"https:\/\/www.fpa.org\/great_decisions\/\">Foreign Policy Association<\/a> <\/p>\n\n\n\n<p>&nbsp;\u201cOur adversaries and\nstrategic competitors will increasingly use cyber capabilities\u2014including cyber\nespionage, attack, and influence\u2014to seek political, economic, and military\nadvantage over the United States and its allies and partners. China, Russia,\nIran, and North Korea increasingly use cyber operations to threaten both minds\nand machines in an expanding number of ways\u2014to steal information, to influence\nour citizens, or to disrupt critical infrastructure.\u201d <em>Daniel R. Coats, Director of National Intelligence<\/em> <em>statement to the Senate Select Committee on\nIntelligence as he presented the U.S. intelligence community\u2019s assessment of\nworldwide threats, 29 Jan 2019<\/em>. <\/p>\n\n\n\n<p>\u201cFew Americans realize the extent to which foreign\nintelligence services are stealing our most important secrets.\u201d And \u201cChina is\nwithout question the number one counterintelligence threat facing the United\nStates.\u201d <em>James Olson, former CIA Chief of\nCounterintelligence<\/em><\/p>\n\n\n\n<p>\u201cThe Russian intelligence services, the inheritors of the\nlegacy of their Soviet forebears, are our inexorable adversaries. They have at\none time or another penetrated every significant organization and agency in the\nU.S. Government and, as evidenced by their recent efforts to undermine American\ndemocracy, are the most professionally proficient intelligence adversaries we\nconfront.\u201d <em>Mark Kelton, former CIA Deputy\nDirector for Counterintelligence<\/em><\/p>\n\n\n\n<p>\u201cForeign cyber criminals will continue to conduct\nfor-profit, cyber-enabled theft and extortion against U.S. networks.\u201d And \u201cTerrorists\ncould obtain and disclose compromising or personally identifiable information\nthrough cyber operations, and they may use such disclosures to coerce, extort,\nor to inspire and enable physical attacks against their victims.\u201d <em>Daniel R. Coats<\/em><\/p>\n\n\n\n<p>\u201cThe sheer acceleration in the number of attacks, and their\nrapidly changing goals, is one of several warning signs that we all are living\nthrough a revolution, playing out at digital speed.\u201d <em>David E. Sanger<\/em>, The Perfect Weapon<\/p>\n\n\n\n<p>\u201cWe cannot afford to protect everything to the maximum\ndegree, so we\u2019d better figure out what cannot fail.\u201d <em>Thomas Donahue, Senior Analyst, Center for Cyber Intelligence<\/em><\/p>\n\n\n\n<p style=\"color:#870204\" class=\"has-text-color\"><strong>Read More<\/strong><\/p>\n\n\n\n<p>I highly recommend Sanger\u2019s <em><a href=\"http:\/\/vweisfeld.com\/?p=7655\">The Perfect Weapon<\/a><\/em>, P.W. Singer\u2019s <em><a href=\"http:\/\/www.vweisfeld.com\/?p=7683\">Like War: The Weaponization of Social Media<\/a><\/em>, and if a well-constructed fictional scenario holds more appeal, P.W. Singer and August Cole\u2019s 2015 near-future thriller, <em><a href=\"http:\/\/www.vweisfeld.com\/?p=4717\">Ghost Fleet<\/a><\/em>.<\/p>\n\n\n\n<p><em>Photo: openDemocracy, creative commons license<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>If only I were as clever as Brad Parks who took his outrage over the pass given to Wachovia and Wells Fargo Bank execs who laundered many millions of dollars for a Mexican drug cartel (and they\u2019re still at it) &hellip; <a href=\"https:\/\/vweisfeld.com\/?p=7912\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":6582,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"Cybersecurity: What the Experts Say - daily the news headlines are calling attention to the dangers. From your Nest to your town's water supply, to the security of nations.\n ","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[53,193,268,35,186,104],"tags":[1556],"class_list":["post-7912","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-criminal","category-espionage","category-politics","category-real-life","category-technology","category-the-morgue","tag-cyber-crime"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/vweisfeld.com\/wp-content\/uploads\/2017\/05\/cyberspace.jpg?fit=300%2C225&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p2NkiT-23C","_links":{"self":[{"href":"https:\/\/vweisfeld.com\/index.php?rest_route=\/wp\/v2\/posts\/7912","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/vweisfeld.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/vweisfeld.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/vweisfeld.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/vweisfeld.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=7912"}],"version-history":[{"count":1,"href":"https:\/\/vweisfeld.com\/index.php?rest_route=\/wp\/v2\/posts\/7912\/revisions"}],"predecessor-version":[{"id":7913,"href":"https:\/\/vweisfeld.com\/index.php?rest_route=\/wp\/v2\/posts\/7912\/revisions\/7913"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/vweisfeld.com\/index.php?rest_route=\/wp\/v2\/media\/6582"}],"wp:attachment":[{"href":"https:\/\/vweisfeld.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=7912"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/vweisfeld.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=7912"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/vweisfeld.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=7912"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}