1Dec17
The Fort has fallen. Its defenses are down. The armory has been blown wide open and every last weapon stolen. Thousands of defenders manning their positions in a series of layered perimeters were unable to detect, let alone stop, the onslaught. The Fort’s Commander was unable to rally his troops to protect the heartland. The frontier will never be the same again. The insurgents are now in charge. With the weapons they stole they can roam, pillage, and destroy at will. No target is out of their reach. The world will never be the same again.
At Fort Meade, Maryland, cyber-Custer, Admiral Mike Rogers, and
his once-invincible forces were not left in a bloody heap. They continue to sit
in their cubicles, sipping their lattes, careful not to burn their lips. The
absence of physical destruction belies the devastation within. Make no mistake,
they have been hit much harder than George Custer and his troops. Their deaths,
while tragic, did not change the strategic landscape, the contemporary reprise
of Little Big Horn has already eclipsed
anything that has come before it. The Snowden revelations are nothing
compared to cyber-Little Big Horn. This assessment will explain the
significance of the attack and explore the consequences for US Security going
forward.
Edward Snowden did not release his stolen files directly to the
web, He handed them over to newspapers, leaving their editorial processes to
decide what was, and was not, in the public interest. The worst of the Snowden
files exposed Top Secret ‘named operations’ then underway. It revealed a vast
surveillance program that operated outside of established conventions and laws.
Snowden’s files were very valuable to America’s enemies because they enabled
them to ‘connect the dots’ on NSA capabilities and operational focus. By
contrast, cyber-Little Big Horn exposed named operations, but went much further
– actual weapons were stolen. Weapons that took billons of dollars to develop
in the most clandestine labs run by the USG. Weapons that gave their possessor
untold power. Weapons that could now be turned against the mist technologically
dependent country in the world. The United States of America.
In Confucianism, the TAO is ‘the correct way’ (or ‘Heaven’s way’)
to understanding the source of all things. America had decoded the TAO. This
precious knowledge was used to create the closest any country has come to
omniscience, and thus, omnipotence. The TAO was stolen right from under the
nose of the NSA and is now for sale on the dark web to anyone. Iran, North
Korea, ISIS, fat kids in basements, for a small fee they now wield the greatest
cyber weapons ever invented. In the secret world, particularly at the cutting
edge, where imagination and creativity reign, special organizations take on
names and unit patches that are in-jokes to the select few who are ‘read-in’ to
their programs. Tailored Access Operations, or TAO, was the jewel in the crown
of the NSA and US Cyber Command. TAO gave these powerful intelligence and
operations arms of government god-like access and control of virtually any
system on earth – even ‘air-gapped’ systems. There is almost no human activity
on earth that is not dependent at some point on networked computers. TAO gave
America the source of all things.
From this secret knowledge, a series if super-weapons were created
that facilitated clandestine and covert access, and if needed, control of
computer networked operations both military and civil, of any country on earth.
Need to shut down an air defense system in order to run a CT mission undetected
inside a city? TAO might be one of the arrows in the quiver. Need to ensure an
opponent can’t access funds or special components for their WMD programs? TAO
might help. Need to break a sufficient number of centrifuges to delay the
progress of a secret nuclear program? TAO is there for you. Need to blow up ICBMs on their launch pads
before they are launched against San Francisco> Who ya gonna call?
Often TAOs weapons were not used because the risk of revealing the
existence of the program was a far higher cost than the estimated benefit if
the deployment if the weapon. This is a serious leadership challenge. Getting
the cost/benefit risk assessment right for programs of national significance
requires very fine judgement. There will be cases where very important
operations that can’t be done by other means, will be passed over simply
because the risk of exposure. This should give some sense of the importance and
impact of this hack.
The Fort was attacked by a group that goes by the name ‘The Shadow
Brokers’. Unsurprisingly very little is known about them and just how, exactly,
they took down Ft Meade. The NSA and USCYBERCOMMAND are at the very forefront
of cyber security, both defense and offense. It is unimaginable that they were
hacked. Unimaginable to whom? Herein lies an important challenge in
intelligence, seeing things for what they are, not as we’d like to see them. To
date, investigations have focused on three employees. Human error or outright
espionage are suspected. The following observations are all made based on
alleged conduct portrayed in credible newspapers. One suspect has not been
named nor much information released about them at all. Another, Reality Winner
[sic] is accused of releasing one Top Secret document that refuted a claim by
President Trump. The final person of interest is Harold T Martin III who was
arrested after a significant cache of classified materials was found at his
home. Based on current reporting, neither of the named suspects appears to have
had sufficient data to be part of the Shadow Brokers plot, at least knowingly
and directly. Mr. Martin’s story will sound familiar to those who know the Ft.
Highly intelligent, a huge nerd (that should go without saying), possibly
lacking many friends and certainly lacking any hobbies, was fascinated by his
work and took it home with him, despite the prohibition on removing classified
information from secure facilities. Reports suggest he was removing classified
information from secure facilities. Reports suggest he was over-dedicated to
his work, not a spy. Still, the poor guy will pay an outsized price for being
an eccentric who lost track of the rules in his laser focus on the fascinating
challenges of solving puzzles. It is a crying shame the system didn’t help him
before his obsession went this far.
The unknown suspect is the most interesting at this stage. He or
she was a software developer and arrested for taking NSA classified material
home in 2015. It is alleged that Russian hackers accessed some of those files,
whether wittingly or not, has not been disclosed. Given the status of this
individual, the chances are their identity and details about their activity are
being suppressed so that the Russians and/or Shadow Brokers di not learn from
the case. He or she might be working with law enforcement, helping to catch the
culprits. Human engineering is always the easiest way in to a hard target, so
it makes sense that effort is being put in to evaluating operational security
protocols. But what if the NSA/USCYBERCOM was hacked pure and simple? Will over
confidence prevent the cyber=spooks from really finding out what happened? In
WWII the Nazis could not imagine that the British cracked their codes. The
German obsession with order was, in part, their undoing. Starting and ending
every message with ‘Heil Hitler’, for example, enabled Bletchley Park to often
get the key for the day. Likewise, each Enigma operator has a signature style
on their Morse key. They soon had personalities. It was then possible to link
‘Operator X’ with his wheel settings, which would always be his girlfriend’s
initials or a birthday (for example), the wartime equivalent of using an easy
password (such as ‘password’). MI encourages NSA investigators to not be over
confident, not to assume anything, and to follow every lead down. If it was a
direct hack on the Ft, as embarrassing as that might be, it is essential to
know it and act on it accordingly.
What is
cyber warfare?
Way back in the 1990s when MI (in a different guise) was writing
about the emergence of warfare in the cyber domain, there was a lot of
discussion about cyber-Pearl Harbor’s and what ‘virtual war’ would look like.
Could it actually kill people? How did hacking a website change anything if
military, let alone strategic, significance? We have come a long way since
then. Cyber is still rapidly evolving and is still confusing even to those who
study it. MI has an easy to understand explanation of cyber warfare.
Cyber warfare operates in two primary dimensions = the physical
and the narrative. The 2016 election is a classic case in point. At first, mist
of the commentary was concerned about hacking of ballot boxes to change votes.
Except, as the news media soon learned, US elections are incredibly
distributed, low tech affairs, governed by local laws and/or arrangements. In
short, most ballot boxes were manual, not digital. There was almost nothing to
hack. It did not take long for evidence of narrative driven cyber ops to come
to light. These turned out to be devastating in part because they were largely
invisible to victim and systems alike.
Narrative cyber ops are another way of saying digital propaganda.
The United States is awash in digital propaganda, both home grown and foreign.
In a meeting of senior defense leaders MI (again in another guise) decided to
conduct an unwitting test of the audience.
MI said that ‘of course, Fox News has been paid millions by Iran to sow
confusion and discord into the American electorate in order to advance
clandestine Iranian programs’. Incredibly, the audience didn’t even blink. The
response was akin to ‘tell us something we don’t know’. When MI quickly told
the group that this was a fake claim to see how they would react to the
proposition that America was awash in homegrown propaganda, various viewpoints
were expressed but the ‘take away’ was that America was being manipulated both
from inside and out. This was not a 2017 discussion, this occurred in 2012. The
dangers if the era of ‘fake news’ was apparent ling before even 2012.
One of the greatest ironies of US national security is that while
Madison Avenue, media conglomerates, corporations, political parties,
super-empowered pundits, and incredibly influential blogs like MI ( ;-) - not true, only the facts and profound
analysis here), have been spinning Americans into complete incomprehension even
about simple facts, the US military is utterly hopeless at propaganda and
influence operations. They still think pamphlet drops are game-changers, while
kids in the west sit for hour after hour and day after day, watching ISIS
‘heroes’ making war on allied forces and being told that they are winning.
Efforts to create ‘counter-narratives’ have been laughable, if well intentioned
and funded. Just ask the State Department’s experts in this field.
So the 2016 election was the natural outgrowth of homegrown spin.
An unstable polity was angry and ripe for disruption. There was a great story
early in the election about a bunch of kids in Macedonia who ran fake news
sites with the most outrageous headlines, all for a lark. There were soon
shocked to discover that not only were their obvious lies making money
(clickbait) but people were taking their prank seriously, and in some cases to
absurd ends. A 61yr old interviewed for the story said he could not believe
anyone would take the stories seriously, it was a prank, and they had no
intention of changing an American election.
There were much more extreme examples of digital manipulation. The
conspiracy theory site info-wars ‘reported’ that Hilary Clinton was murdering
people and chopping them up. Then came the ‘Cosmic Pizza’ story. It alleged
that a presidential candidate for a major political party was running a child
sex ring from a suburban DC pizzeria while running for the highest office in the
land. That’s not the shocking bit. Thousands of citizens took this very
seriously, as fact. One was so distressed by the story he drove to DC from NC
and shot up the pizzeria with an assault rifle in an attempt “to free the
children”. These and hundreds of stories like them were circulating and
significant portions of the voting public believed them.
Think about that for a minute.
In Britain, the tabloids have always been full of what we now call
clickbait. They are a source of amusement as people ride the Tube home after a
hard day’s work. It’s tongue-in-cheek and everyone knows it is frivolous
‘entertainment’. In America, clickbait is treated as if it came directly from
Walter Cronkite. At the same time, quality established news sources, like The
New York Times, and BBC America, are derided as elitist and manipulative,
but a kid’s website in Macedonia is credible. Fox News, which never fails to
proclaim that it’s the most authoritative, most watched, most highly rated news
channel, simultaneously claims to be the underdog fighting the insanity if the
‘mainstream media’.it does not get more mainstream and controlling than Fox.
The fact they can pull this blatant propaganda off without being called on it
blows MI’s collective mind. [Their current attacks on the Muller probe as being
a new KGB is the kind of ‘journalism’ MI condemns].
It was reported in the New York Times that “nearly one in
three Americans cannot name a single branch of government. [and] When NPR
tweeted out sections of the Declaration of Independence…many people were
outraged. They mistook Thomas Jefferson’s fighting words for anti-Trump
propaganda”. This led Tim Egan to assert that “a huge percentage of the
population cannot tell fact from fiction” (“Look in the Mirror: We’re With
Stupid”, NYT, 11/18/17, p.A18).
With a population that gullible, the Russians had a field day with
the US election. Is there a ‘smoking gun’ that proves beyond all doubt that
cyber narrative ops swung the election to Trump? No. That’s why it’s the
perfect weapon. The Russians didn’t need
to break into ballot boxes; they just had to play with the fears and rage
Americans were ‘feeling’. It was embarrassingly easy, a bunch of kids could
have done it… oh wait…. Not only could
the NSA and USCYBERCOM not stop the Shadow Brokers, they couldn’t stop a bunch
of kids in the Balkans from brain washing the American public.
Cyber
warfare and Social Media: Narrative Ops Gone Wild.
Remember the old New Yorker cartoon “On the internet, no one knows
you’re a dog!” That author completely nailed it. He did so in the pre-social
media era, which makes his insight that much more impressive.
During the 2016 election Facebook became a doggy day care center.
First, conservatives assailed Mark Zuckerberg for manipulating people’s news
feeds to downplay conservative viewpoints. The algorithm was quickly reset.
Then, right after the election, allegations began to surface that the Russians
had manipulated Facebook via its ‘troll armies’, creating fake profiles for
individuals and groups, as well as buying advertisement space. Again,
Zuckerberg came out with denials, and again, he soon changed his tune. Turns
out, Russia was willing to pay. The old Soviet toolkit of ‘active measures’ has
been updated for the digital age and applied to social media. The outcome?
American citizens facing off against each other in the streets and fighting
erupting between them, all thanks to fake groups stirring up tension and
organizing protests. It was remote control protest from Moscow and Americans
mindlessly doing their bidding.
It’s not just bogus advertisers and bogus accounts; it’s the
manipulation of users’ emotions. It was undetected (at the time) and was
incredibly successful. In the old days, agi-prop took time, effort, money, and
most of all, a lot of people. Now it’s instigated with a few hundred thousand
bucks and the click of a mouse. The best thing? It’s impossible to prove if it
happened and if it gave the election to Trump. There can be no counter-call to
action when it’s impossible to prove an action took place. This changes
politics.
This is not the first time that Facebook has been used to create a
mass effect. Social media is free. You do not pay a subscription for it’s
services. Yet social media companies are some of the most highly valued
corporations in the world. Where does the money come from? Data mining.
Facebook has changed how people discover they really needed something they were
not thinking about two minutes ago. Previously ads were wide-cast on TV. Great
for mass consumption but not helpful for boutique interests that were hard for
retailers to target. Facebook solves all that. If you have listed your interest
in Taylor Swift or ancient Egyptian artifacts, moments later direct and
indirect suggestions will come flooding in. The same applies to your political
beliefs. Hate Hilary? Then guess what suggestions ‘you might like’ will come up
with in both news feeds and other merchandise on offer. What the railroads and
oil were to the 18th and 19th centuries, datamining is to
the 21st century. The best thing is you no longer buy a ticket or
fill a tank, you just ‘like’ stuff and you are instantly surrounded by it,
whether it’s physical or narrative.
Social media has changed society in so many ways, but the most
pernicious is its impact on out attitudes to privacy. Think about the
information you freely give to social media. On dating sites, for example, you
provide pictures as well as highly personal and detailed sexual, drug, employment
and social histories. Some sites employ Miers-Briggs psychological surveys.
Often in-depth mini narratives are required revealing all sorts if incredibly
persona; preferences. In a court case in NY, Facebook submitted the following
summary to the court, as reported in Robert Scheer’s They Know Everything
About You, (2015, p96):
People use Facebook to share
information about themselves, much of it personal. This information includes:
·
The person’s age, religion, city of birth,
educational affiliations, employment, family members, children, grand-children,
partner, friends, places visited, favorite music… movies, television shows,
books, quotes, [foods, beverages], things ‘Liked’, events to attend, affiliated
groups, fitness, sexual orientation, relationship status, and political views.
·
The person’s thoughts about: religion, sexual
orientation, relationship status, political views, future aspirations, values,
ethics, ideology, current events, fashion, friends, public figures, celebrity,
lifestyles celebrations, grief, frustrations, infidelity, social-interactions,
or intimate behavior.
·
The person’s photographs and videos [Here he
quotes a long list of examples, most containing geo-location and time-stamped
data.]
·
The person’s private hardships [and] intimate
diary entries….
Targeted marketing is nothing new but its reach in the information
age has become almost limitless. Data broking is a multi-billion dollar
industry. It combines mass consumer surveillance derived from patterns in
spending collected by credit and loyalty cards, with off-line data collected from
real estate and motor vehicle records, warranty cards, home ownership and
property values, marital status, annual income, educational levels, travel
records, credit records, to provide a detailed picture of an individual’s life.
The biggest corporation in the personal data field in the US, Acxiom advertises
its ability to soon reach “more than 99% of the adult US population…across all
channels and devices.” (Scheer, p.59).
If almost total access to your data was not enough, people are now
handing over their DNA to corporations – not digital DNA (corporations have had
that for years), actual biological DNA. For the low, low, fee of $24.99 a
variety of companies will now collect and analyze your biological DNA,
ostensibly for the purposes of helping you understand your ethnic background
and to assist working on family trees. Smart watches are now mini all-purpose
health monitors, assessing everything from heart rhythm, sleep patterns,
insulin levels, exercise monitoring, and so on. People are paying for
corporations to monitor their every word said in the ‘privacy’ of their homes.
Alexa and her sisters are always listening and recording, sending big sister all
of your utterances (not just commands). Alexa and the girls have to listen to
ensure they know when you call, but people have not yet cottoned to the fact
that Amazon has sold them a baby monitor for their house and the consumer is
the baby. Alexa has already been subpoenaed to testify in a murder trial. I’m not making this up. Her constant
surveillance and recordings were collected in order to determine what really
happened in someone’s living room where an occupant was left dead. No one
called out “Hey, Alexa, I’m about to kill someone.” Every Google and YouTube
search you do is recorded. That’s how they get the predictive searching as you
type something into the search window.
The metadata collected forms fascination patterns that are mined for
commercial purposes. The same patterns can be mined for other purposes, too.
When the Obama Administration went after journalist James Risen,
on suspicion of printing leaks of classified material, they did not have to
threaten Mr. Risen with contempt and thus jail time. They just had to access
his cell phone and laptop data and/or records to harvest the metadata, see the
patterns and find the leaks. There is a case before the Supreme Court right
now, US v Carpenter, which will determine if 3rd party data, such as
phone records, should be protected under the 4th Amendment. Current
law states that no warrant is required to harvest 3rd party data.
The Onion satirical newspaper and video YouTube page, which masquerades as a
“news site”, has a video of “CIA Special Agent Mark Zuckerberg” getting a
special award for making the job of intelligence and law enforcement
effort-free. Nut the joke is on social media users and the electorate.
US Customs and Border Protection (CBP) are now seizing tens of
thousands of digital platforms at the border and have been empowered to demand
log-in data, such as your ID and password, so they can log in to your social
media. This applies to US citizens, green card holders and foreign visitors.
The “border exception” to the 4th Amendment permits searches and
seizures during routine border searches (they cannot be used, for example, as
part of an ongoing investigation to deny a suspect’s 4th Amendment
rights).So far this extraordinary invasion of privacy has not been challenged in
the courts, but it’s only a matter of time.
The news is constantly pulsed with hacking stories. From the White
House to your house, nothing seems sacred. In 2013, 3 billion Yahoo accounts
were hacked. In 2017, 143 million credit reports owned by Equifax (one of the
big three credit reporting agencies and upon which the entire US economy
depends). Also in 2017, 198 million voter records were accessed (all stats
from, “How Privacy as We Know It Died”, NYT 6Oct17, p.A27). Ever keen to
exploit an opportunity, Google announced that it would move into the credit
reporting space by linking billions of credit card transactions to the online
behavior of its users (Google announcement, 23May17).
With all this data available and the ready ability to sift, sort,
and find patterns, incredible power is now on the hands of those who own the
data and the patterns it creates. Before the 2016 election, which was a proof
of concept in many ways, a group of social scientists get permission from
Facebook to conduct an experiment to assess if it was possible to artificially
create a mass “emotional contagion”. The experiment allowed the scientists to
manipulate the news feeds of 700,000 FB users to see how they would react. The
study was reported in the Proceedings of the National Academy of Sciences (June 2014) found that:
Emotions expressed by friends, via
online social networks, influence our own moods, constituting, to our
knowledge, the first experimental evidence for massive-scale contagion via
social networks.
The controversy surrounding this experiment, that forced FB CEO Sheryl
Sandberg to apologize, was nothing compared to the manipulation that took place
during the 2016 election. FB is still coming to terms with just how deeply they
were played, with fake accounts, groups, chat rooms and so on. FB was not alone;
troll armies had invaded a range of platforms. Senator Mark Warner (D-VA) spoke
for many on the Intelligence Committee when he remonstrated representatives if ‘The
Five’ over their lack of understanding and even concern at the degree to which
they were unwitting vehicles of Russian ‘active-measures’. The corporations
treated the hearings as spin sessions and have still yet to really get to grips
with the incredible power and reach of cyber narrative ops. The less educated,
more politically frustrated the general public are, the more susceptible they
will be to orchestrated mass contagion mounted by our friends in Moscow, Tehran
and Beijing.
The
ultimate ‘off-line’ data
One database that should have never been accessed is the Office of
Personnel Management’s security clearance data base for the entire federal and
contractor workforce. The OPM is not a national security agency, yet it was
charged with conduction all security clearance investigations for the United
States, The records if those investigations, which include the SF-86, biometric
data, interview records (with both the subject of the investigation and those
selected by OPM to verify the professional and personal history of the
subject), as well as internal OPM assessments of each security clearance
candidate, were stolen by the People’s Republic of China. The human capitol blueprint
of the entire national security establishment is now in Beijing.
The SF-86 contains all the data in FB and then some. Going back
either 5 or 10 years applicants must provide a complete and accurate record if
their residential, educational, financial, travel, social, and political
history. These records are cross checked
on databases and in personal interviews. Failure to accurately record the
correct information or changes to the record over time (new travel, meeting
foreigners etc.) can result in criminal indictment. This has been a factor in investigations of
various Trump Administration officials who have been required to update their
SF-86s as reported in the media. The central concern in granting a security
clearance is that the subject cannot be blackmailed. That can happen if someone
other than the USG knows all the details of someone’s life, including some
specifics that might be embarrassing. The
usual position is that so long as the subject reveals all to the USG they
insulate themselves from blackmail. It takes a lot of trust to give the federal
government all that detail. There is an expectation that the trust will be
returned in the USG protecting all that sensitive data (and analysis thereof),
if not as part of a social contract with the national security employee, then
for simple national self interest. This trust was broken by lax security
standards at OPM and carries phenomenal national security risks.
China has a complete roster of every single American with a
security clearance. That allows them to instigate social contagion within that
sensitive group. It facilitates attempted blackmail to gain national secrets. It
allows China to track and constantly monitor anyone of interest to the PRC,
from deep under cover CIA officers to Tier I special forces, to the
administrative assistant to the Director of Central Intelligence against whom
HUMINT, SIGINT, CYBERINT, assets can be brought to bear. Anywhere there is a
camera or mic there is a threat. By tapping a target’s cell phone, lap top,
vehicle, home security system, either tapping into the cameras on these devices
or audio or keyboards, the Chinese can monitor, spoof, manipulate, or ruin
anyone they want. Further, anywhere else there is a camera: gas stations, Starbucks,
airports, ATMs, city streets; targets can be monitored domestically or
internationally. Try passing through Europe undercover when China taps into any
device in your person or around you. Both targeted operations as well as wide
area surveillance of key choke points (airports, embassies, hotels authorized
by the Defense Travel System) will catch undercover or overt operatives, as
well as run of the mill national security personnel. The OPM hack is an
unmitigated disaster and it will only be diluted over time as personnel change –
assuming of course that the OPM records are secured into the future.
Cyber
Warfare and Big Data
Big data provides a link across mixed database platforms to scan,
sort, associate and see patterns that would otherwise be invisible. It can take
a CCTV feed from the streets of London and cross reference it to FB, Twitter,
and OPM records, to provide near real time feedback if a person or a device
associated with them walks within surveillance range, for example. It knows
where you are and what your typical spending patterns look like, so when your
credit card is used to buy an air ticket, the credit card company is notified
along with the TSA and other agencies, to question who is really travelling. The
examples of the application of big data are only limited by your imagination. There
is a full-blown Tom Clancy novel just waiting to happen where the guys in
charge in the narrative are not in Washington, but Tehran or Beirut or Addis Ababa.
People, places, things, and actions, are now essentially totally
transparent. Placing Social media records, against consumer data, against
offline data, and cross checked against OPM data, virtually removes the shadows
in which America’s leading covert and clandestine operators dwell. The same
applies to senior leadership of national security agencies, government
scientists, your mom and your kids’ little league team. This is particularly
dangerous for USG employees, but it is equally as potentially threatening to
the average citizen.
Mass manipulation, social contagion, is possible if it appears
credible. Big data gives users the ability to create highly credible narratives
that can be used to sell you something or to create a political effect. It can
be a mass effect or targeted to an individual. Mixing narrative cyber ops with
physical cyber ops in the context of big data changes everything. The scope,
depth, and speed of these drivers of change are unrelenting and
expanding/accelerating. Consider the impact of future technologies that are
already emerging.
Future
Tech and National Security
IFlyTek, a Chinese artificial technology company, has been busy
creating a biometric image and voice recognition database, most likely drawing
from 800 million subscribers to China Mobile, its parent company. This technology
allows it to pick a target in a crowd either by recognizing their face or voice
and “record everything that person says” (“Pushing AI Boundaries in China”, NYT,
4Dec17, p.B1). it already has President Trump’s voice in its database. On his
recent visit to Beijing he spoke via teleconference to a technology conference
and switched from English to Mandarin. Except Trump can’t speak Chinese; it’s
the technology that made it appear as though he could. Linking voice, and face ‘finger
prints’ across big data platforms is impressive. Taking that data and applying
CGI, 3D imaging, and other audio-visual artificial ‘creative technologies’ to
it, opens a pathway to the creation of completely artificial ‘videos’ of people
saying and doing anything.
This will make today’s ‘fake news’ a charming historical artifact
soon enough. If we already struggle with defining what is real based on
manipulation of text, which can be back-checked easily enough, the creation of ‘artificial
reality’ videos will up-end all social relations, form the political and
national security to the personal. Empowering narrative cyber-ops with these
new technologies will be a game-changer.
Right now, the combination of biometric data (finger prints,
facial recognition, voice recognition, and even gait recognition) with
geo-location, autonomous armed drones, all linked across big data, makes for
some interesting scenarios involving the uses od such technologies. MI can see
a bright sunny spring day in Washington, the President walking along the colonnade
from the West Wing back to the Residence and a distant hum that sounds like a
lawnmower trimming the ellipse, yet that humming is getting louder and louder…
Conclusion
For all the billions
invested in cyber security, the millions of top security professionals
inside government and contracted to it, the cyber national security
establishment has singularly failed to protect the government, national institutions,
American economic icons, and the public from surveillance, threats, and
outright attacks emerging from the cyber domain.
MI has an abiding concern that the Executive branch of government
has got far too big, lumbering, unimaginative, and bureaucratic, for it to meet
its primary mission of protecting the American people. The structure of
government, and in particular the power of the purse in Congress, creates a
mindset in government that innovation is easily obtained by throwing more money
at a problem or worse, creating yet another bloated bureaucracy to address some
emerging suite of threats. MI thinks the opposite is true. The Executive needs
to radically slim down and to reassess how it can go about achieving its ends
by thinking smart, not spending large. The 16 intelligence agencies never fail
to collect the dots; they failed to connect the dots. Insiders know that
all that exhaustive collection is done because it can be done. It is not used
to anticipate and deter or defeat threats. It is used to assess what happened in
the aftermath. America is great at disaster recovery but not prevention. This
generalization does not hold across all areas of national security. Where creativity
is allowed to flourish free from nagging budgetary considerations, with the
right people, with the right education and corporate mindset, by which MI means
an architecture of ‘open’ thinking, not the ‘closed’ thinking that is typical
of government and the all too real caricature that most citizens have of
government, America can do almost anything. We see the right corporate culture
in Silicon Valley – not everywhere or evenly. But if it can still be said to
exist anywhere in America, that’s the place. Great studies do not need to be
done, May have already been done. The key distinguishing characteristic if
innovation is open versus closed thinking, trial and error, willingness to take
risks in an environment free from petty accusation. MI acknowledges this is a pretty
tall order. But the fact is, not everyone can be a US Navy SEAL, and not every
SEAL can be in SEAL TEAM VI. Likewise, not everyone can earn a PhD and not
every PhD is from Harvard. America needs to see competence for what it is and
stop this cultural revolution of anti-elitism. High end national security
requires the very best people and the creation and nurturing of the very best
open cultures. MI’s team has been lucky enough to see places where this happens
in the top security teams – like the NSA’a TAO. Organizations like that make working
in government so incredibly rewarding, so long as they were well led and everyone
is able to put differences aside and focus on the mission. At a time when
America is ceding its advantages in a highly competitive world, where China’s President exclaims that China will move to
center stage and the very smart President of France is caught off-mic saying ‘China is now the leader’, America
needs to look beyond its endless psy-ops in itself and focus in maintaining
what we are good at and improving on where we have been slipping. Given the
trend lines of both the technologies considered here and the threat streams that
we face, we will suffer minor and major loss after loss on the battlefield if
we don’t change. The battlefield is now in your phone and in your mind.
No comments:
Post a Comment