Skip to main content

tv   Book Discussion on At War  CSPAN  December 14, 2014 10:00pm-10:54pm EST

10:00 pm
>> host: on the republican side in 2012, you have the circular firing squad where the very is republican potential candidate for all the folks that wanted to be nominees had their own super pack and were spending millions of dollars against each other. ms. romney had his candidacy extended out probably several more months than he would have if newt gingrich and rick santorum were not around. do you expect but that is going to play out in a different way? ..
10:01 pm
>> >>
10:02 pm
>> i am pleased to welcome shane harris to discuss the new book "@war" the rise of the military-internet complex" in which he chronicles the emergence of cyberspace as a system made of warfare. how government agencies are teaming up with the likes of google and microscope -- microsoft to monitor cyberspace and collected from asian and what that means for us as individuals and as the nation. the second book the watchers with a new york public library book award for excellence in journalism.
10:03 pm
currently a senior writer and also worked as a senior writer for foreign policy and his work has appeared in numerous publications and a "the washington post" and a fellow at the new america foundation we're pleased to welcome him back for a second appearance at politics & prose. shane harris. [applause] >> thank you for the great introduction. thank you for coming out tonight. queue to be sitting on a veranda to enjoy a the summer evening. it is great to see friends and colleagues as well. we were talking before i have been touring with the book and speaking at bookstores and this is
10:04 pm
prized the way it brings out through the community so thank you very much you make me very happy. so's this book "@war" is a story but it is a narrative that cybersecurity became a fixation of faye parity in the united states right now. cybersecurity that we define as threats in cyberspace for cybercrime, attacks over computer networks that damage physical infrastructure like power grid or to disable the water utilities but the risk of these attacks has topped the list of global threats. every year it is a big thing that keeps people up that night and cyberthreat is that the top.
10:05 pm
and the new fbi director formerly the deputy attorney general said the risk of cyberattacks and a related risk of cybercrime is the most significant national security threat over the next decade and putting that at the top of the list above terrorism. and testifying before congress that cyberattacks are costing hundreds of billions of dollars u.s. companies and multiple foreign governments have already probe the systems that regulate the power grid it is not theoretical but a truly significant catastrophic failure well occur if we do not take action. how did we get to this point rawl officials tell us the risk of a catastrophic cyber attack and espionage is what we should be most worried about and what does
10:06 pm
that mean for all of us that exist in cyberspace every day? and the book tries to stand to those questions. and for a book like this it is a scary story. begins this summer of 2007 the ceo of the major defense contractors like boeing and lockheed martin are called over to a meeting at the. did not know why the figure is short notice and see the competitors in one room it is not good news. their ushered into a sensitive compartment did information facility it is where you have to drop your cellphone outside before you go into the soundproof room that is an impermeable to eavesdropping and only
10:07 pm
receive the most secret of secrets. so they are given a briefing where it is described how hackers believed in china are accessing computer systems that contain the most classified information in the military like plans for the joint strike fighter that is the next generation military aircraft and all of them overrun by cyberspies. that seems pretty scary but they did not access the information by getting into military networks but through the ceos companies. they made an end run around of pentagon to attack the contractors instead working on the sensitive military programs. as described by several executives went in with our care when they came in they
10:08 pm
turned white there were very disturbed not only they had gone inside their systems but they knew very of little about it. the pentagon said to have a security problem therefore we have a security problem. if you want to continue to be contractors you will take our help. once again in epitomizes the national approach the pentagon team up with contractors with information and intelligence sharing. contractors agreed to report the threats they would see on their network and when it was breached and the pentagon agreed not to disclose publicly and in return they would provide the corporations with the affirmation that was gathering from its own intelligence six operation and what nsa was gathering.
10:09 pm
so this partnership is set up private-sector and public come together for the purpose of the computer networks this is true across the board company's own roughly 85 percent of the network infrastructure in the united states. the government to sadistically control and so they have to participate in this intelligence sharing if we protect the internet. of the effort that began was the defense industrial base initiative called the dib 100 members of members today barely a dozen originally but it is now expanded to mothers so today the
10:10 pm
national security agency shares a threat intelligence from networks overseas with the internet service providers in the hopes they will program those threat signatures tuesday and for malicious software then protect the people that our customers downstream. big-name technology companies have struck up relationships church and one that i read about is google. it appears internet works all over the of world with the communications traffic and it struck up a secret relationship with the nsa in 2010 after it was attacked by chinese by so they agree to share information and in turn to provide information to them. so spying and attacking is a
10:11 pm
cooperative effort between the government and the intelligence community and its partners in the technology industry that is what i write about with a military internet complex the coming together of these powerful forces and hearkening back to eisenhower military-industrial complex speech that we will talk about a year. this begins at the tail end of the bush administration mitt check a few years to take the threat seriously. there was talk of the highest level for many years but it did not catch on until the end bush was not the most technologically inclined in once said he used the google to look at satellite images of his ranch and clinton is only send one e-mail the entire
10:12 pm
time he was in office. but where this takes off with the national security prairie is obama to use the internet masterfully very much the first internet president and he got a firsthand experience with cyberis the and irish and believed to be in china and they have done that can pay a system of but he comes in with a firsthand glimpse with an appreciation with the full their facilities from cyberspace and from day one to is this is classified briefings cyberis placed near the top so he has ahold their approach and may 2009
10:13 pm
bombing gives a speech in the east river of the out why house it is a very larger reserved solely for the most momentous of speeches on the president knows there will be a big crowd and to draw attention. he unveils his plan for security of cyberspace he says that the electrical grid had been probed by outside does not say government but the president says effectively put the machinery is wide open to attack. and hearkening to the model to say the vast majority of critical information and infrastructure is owned and operated by the private sector we will collaborate to find technology to
10:14 pm
promote our prosperity the internet is a strategic asset and we will protect it as such so obama defines cyberspace as a national asset even a live is privately owned. he sets out as the ambitious program to put the government at the center to secure cyberspace to influence that. but what is important here is obama starts to see and describe cyberspace as a battlefield the military briefers as the fifth domain after levant see had air and airspace to achieve supremacy as vital as the other four. to give a sense of how the of military has prioritized
10:15 pm
to look at the budget for cyberprograms in 2014 just with cyberdefense programs to share intelligence with industry it is $13 billion is still has not touched the offensive side of the ledger to put that into perspective the government plans to spend 11.$6 billion on direct efforts to have climate change that obama called the greatest threat of our time. the 2012 pentagon budget had the word cyberin it 2012 at the 2014 budget is in there 147 times. so now it is a joke within
10:16 pm
the pentagon is the only part of the budget that is growing to get money for your project just slap the word cyberon it but a couple of weeks ago the senior official who ran policy said he is starting to see a lot of proposal like this cybertanks crossing his desk. [laughter] there's no such thing. so government officials are talking about our vulnerability is the way we are victimized which is true but there is a cynical calculation a good way to focus attention to drum up money for defense programs but it obscures the other side of the story since. we are quick to portray ourselves as a victim but we do many of the same things
10:17 pm
that other countries do to us for our corporations. we are masters of offense we are very good at waging cyberwarfare and it will become an integral component of how we fights wars in the future. fox one story that i like that captures how cyberis integrated, this place takes also, in 2007 that is the year things took off. he remember president bush ordered tens of thousands of combat troops to iraq that is engineered to quell the of pirate -- violence spiraling out of control and to do battle with the insurgent terrorist group known as al qaeda at that morphed into isis.
10:18 pm
so we form alliances as two pillars of the search strategy but the third pillar has never been explored six. the nsa tapped into the telecommunications and internet infrastructure of the country of iraq and effectively owned the entire network of the country and intercepted every cell phone call, e-mail message, a text message. what was it doing? partly to understand the way that the terrorist network said organize themselves by studying the patterns of communications. i read about a guy a young army lieutenant at the time who deployed to iraq gathering electronic communications he was a fan of this series the wire for
10:19 pm
there is a character in old police detective who decides he will unlock the hierarchy not by walking the beat but by monitoring the sell funds that they use for a couple of calls in the stores to map out the network's based on the calls. and misinformation was handed off to ground forces is boots on the ground to fight these insurgents to capture or kill. not the only thing with the daring exploits to individual insurgence posing as people that they knew to meet debt a particular place
10:20 pm
they fell into a trap. they penetrated websites so when people go to the chap forms the computers were infected that would hold it on their location. this was a genius hacking not just to steal information but to locate people the people interviewed for the book absent this dimension it does not stand trial or become a temporary victory that we all know now to prevent a civil war to bring stability back into the country. the surge was one by a cyberwar campaign. david petraeus said intelligence gathering
10:21 pm
operation was '' a prime reason for the significant progress made by u.s. troops in the surgeon directly responsible to enable the removal of almost 4,000 insurgents from the battlefield''. you can chart that against the book that change the play they fight wars and it shows that cyberoperations are part of that. lied is this matter to us? site argue in the book of the national security industries the nsa is the center of gravity that the government is doing things that fundamentally undermine the protection of the internet that we all depend upon that makes it less safe
10:22 pm
place. en say is breaking into a technology we all use commercial technology as a proprietary force it is constantly looking for ways to find flaws in the operating system to give them away that nobody knows about. you hear about this is the technical term that once someone has found a way into the computer than there is zero days to defend against it. so they are gobbling up this information so one might argue it was in the business did you should disclose those for their abilities --
10:23 pm
vulnerabilities. to be a security guard in your neighborhood if there was an open window but did not tell you that a flock of all the windows but did not tell anybody that is the analogy that i draw that to look for the weaknesses to exploit but not telling the public the nsa is not to win the job to make the internet safer. the other is to undermine encryption. it is basically a way that only you and the recipient can unlock it you can use encryption in your e-mail or with your bank doing transactions online. and we know the nsa has been inserting flaws into a encryption products that are marketed with the seal of
10:24 pm
approval from the nsa. they're experts at breaking cuts and we know it has essentially been putting a recommendation or endorsement of what they know to be flawed. this is like if the government would market to say everybody buy this lock it cannot be penetrated but the nsa has the key but somebody else has it. as of battlefield makes it less safe all of this has emerged with no debate with their growing technology as
10:25 pm
president eisenhower described the previous generation and changing how we used the internet. to vaster were too pervasive to allow a anti-and i argue in the book it should not be vested inside a secret intelligence agency. we come to depend on them like a public utility also with privately-owned devices but it is a collective lie it is incumbent on everyone who attaches to take a stake to find what eisenhower
10:26 pm
calls the essential agreement a wise resolution to better shape the nation and i will be happy to take your questions. [applause] >> you could come to the microphone it is being recorded not by the nsa. [laughter] the director has said he is very much opposed to a google and apple have done to make it so even google and apple will they be successful to have them change? >> the short answer is not.
10:27 pm
and jim kolbe has said for this device is of threats because of fear arrest somebody with a phone it is a scripted it cannot be done in group did even in the major fracture if fido and though the code the fbi does not get an. this is a proxy for a mission to extend surveillance authority but there are laws in place to build networks so they can be tapped when they have a lawful order to intercept the internet technologies have never been precisely government by that law and to the fbi would like them to be.
10:28 pm
director, e is overstating the particular risk of this device and should be talking about the broader debate to expand more surveillance to cyberspace. >> how paranoid should we be? to make everyone asks that question. you are not paranoid if it is real. i was afraid to go to search and web sites that would flag something i thought of as being paranoid but then nsa broken and it was worse than i could have imagined. shays said don't go to wikileaks. what if i want to learn about al qaeda?
10:29 pm
>> are they watching everything? >> i iraq was a particular example because it is not the united states. they're our surveillance laws for what that nsa and fbi can do with the individual communications. they cannot listen to emails or your phone calls that was not necessarily the case but if they want to target you figwort if you're in communication with someone overseas however in that commission -- persons communication is scooped up ended is collected incidentally the government can search through the data
10:30 pm
to come across your information and read it without a warrant because the perception it was illegally collected in the first place. ltd. is difficult to know at any particular given time was a legal theory the government uses but it is safe to say if they could find a way to technically and legally acquire information they will do it. so the rules should be a tight of the acquisition. >> are certain things like? >> i don't know if you could visit wikileaks it would flag hero maybe if you were on a government computer it
10:31 pm
wired. government employs have been told him to not go to wikileaks because there are classified documents but if you sit here today in washington d.c. i don't think so. >> that is reassuring. [laughter] >> how much do we know of what we can do to them? to make you can be sure we can do to them and we have done it. and at what to give everything away but, as. >> go ahead. >>. [laughter] i bought the books to make then plug your ears. [laughter] as the military very elite
10:32 pm
cadre of hackers there's one group that i read about like the impact -- the impossible mission force these are the guys that they call in. so we're very, very good. the problem is we not have enough people to rage these operations. if we ever go to war with the big country how do we match up? the chinese sell thousands of more people with digital spiles but it comes right technological prowess just today there was news you may have read about the new computer virus discovered maybe reagan?
10:33 pm
from norse mythology. sophisticated bellwether discovered and dissected that it could gather huge amounts of information and was probably engineer around 2018 and looks suspiciously like another virus that we know the nsa designed. have not convened at -- confirmed it that we are one of the few that could decide that. we're very good. >> i once spoke with british intelligence officer that the chinese get into everything but they are afraid of the russians because we don't know what they can do is that accurate? >> the attorneys are audacious and don't care if they are caught they are
10:34 pm
shameless and deny everything but the russians are very good to cover their tracks in several years ago after the demise of the soviet union you have high rescaled computer engineers a lot of these people have gone to work for a criminal organizations david teeeighteen and abetting a wistful but one official they found a number of cases were they zeroed in on a russian hacker to find out the government said change your name and identity there on to you. it is a government and an apparatus that is highly skilled and is good and not leaving traces. >> as a slight aside that the internet is not a
10:35 pm
utility but if it changes the rule to get them to treat it as a utility then what defects with that have been this arena? mckewon major for the government chiru and forced security standards the mustapha minimal standards even obama last week talked about trading phaedra as a utility that is part of the neutrality if companies should be allowed to recharge more for higher volumes of traffic but if you treat that as a utility the government can regulate it just like security the
10:36 pm
sec has to go along with that i would suspect that opens the door to much tougher government regulations, those favor government coming in to regulate the threats are devolving so fast there is no way to know the most up-to-date intelligence even en google has received threats briefings from the government and have been unimpressed because they said we heard about this we already know about this. so there is no answer they have the right answer for setting security standards. >> would you comment on congressional oversight with respect to the military the internet complex?
10:37 pm
i get the impression our elected officials are at of their depth. >> there is a learning curve to be sure. intelligence oversight in general i has been a critic the lot of this activity takes place under the auspices we haven't had a great oversight where congress has been focusing to set the basic minimum standards and they have been shot down for companies to fear regulation this is the real issue if it rich -- legislators are not smart to become more proficient and
10:38 pm
that the threats are more severe than they are in to give them money that they don't need it is incumbent for congress to take the intelligence agencies words. yes our threats but they need to be more in depth and flew went with the complexities. >> if i could follow up on this lady's question and having worked in the journalistic capacity he is the great journalist and it is gratifying to see the scope of his work.
10:39 pm
and with secretary hagel, is there something that he should have done or could have done or is it too much with the nsa that leads to the next defense secretary? so what assistance should they focus on? >> there is leadership in international security agency. we have u.s. cybercommanded is four years old to be like central command but if you talk about cyberoperations
10:40 pm
that should be run by of military organization. the head of that is of cybercommand so you can see how the deck is stacked. secretary hagel made very few statements at all. and to put them over with cybercommand the you can get better oversight. >> is this a defense policy with the justice department has scooped up with those
10:41 pm
hot-button issues? >> the white house was involved and aware of what the nsa was doing. and the director of the nsa manage to accumulate in they are masterful. and his predecessor of probably fahrenheit better as to be a gate keeper as a national security advisor. i talked to obama to make it a national security
10:42 pm
priority. so the political momentum comes from there. so you need to take that authority back. so with the electric grid care gsa things that could be on it? >> but every device is now connected to the network your phone, air-traffic control i don't know specifically is metro runs through the internet but it creates a marvelous efficiency but the more divisive issue put on the definition anything
10:43 pm
connected to the network can be hacked or compromise. and that nobody thought of protecting it. but as we keep adding more and more devices we are putting the security of the devices in the people that use them. that will change with a higher profile breaches but as these devices start to fail you may see some urgency but it'll take people getting wounded to focus the attention. >> i manage a website that
10:44 pm
is connected part of my church community. in october we had a huge spike of hits in the dash board report showed almost those hits came from china. says that the in the red army is monitoring our church? >> it depends whether you minto'' -- into? >> it is innocuous. [laughter] but it could not have the universal significance. >> we be for propaganda in china. >> at some point should we be concerned? >> you should always be
10:45 pm
concerned somebody he should not be in the network but it does not surprise me at all. but there whole idea is to throw lots of bodies that the problem and to see what sticks. who knows why. >> so the question is should we be concerned? and the q should have never security and major international been emails from people you don't know don't be scared but there are some basic procedures you can take to make yourself less vulnerable. if they just pings the network and don't get in then don't worry too much. >> can you speculate a little about the future to
10:46 pm
make an analogy to see a point to the mutually assured to cyberwarfare or is somebody took the first step to have the advantage of the power grid? >> o lot of the cold war models mutual destruction is one but there are incentives for large nation states said chinese were of not crash crash, they're the biggest lenders will fall back on them. if there was an attack on the power grid to shut off the lights in the belief it
10:47 pm
came from china it was part of the larger military campaign. this is not that easy to rich tribute the source said the attack is the attribution problem. how can we respond to read. but as of today could launch an attack like this there would not know who to retaliate against. so how do deal with cyberspace as a huge unanswered question?
10:48 pm
>> in the educational aspect sarah said article -- there was an article as they trained the next generation of cyberwarriors or hackers. but if you read anything about anonymous that whitehead and blackhead can be slippery. is there that complex? >> the nsa for a number of colleges and universities whole directory to love and severs security by where they will pay for the four year degree of computer science a jeering then they
10:49 pm
work for that nsa to pay them back. one person went to school the became a hacker then left and started a private start a been a silicon valley so yes there is a connection and it feels like colleges and universities and it takes talent. has people who are attracted to that type of work for those who had a streak but that said the military is another source of recruitment and for them the draw of service is very
10:50 pm
alluring and they will have success. >> and thus which emphasis by way we killed one another by the defense establishment but what about the field of medicine our health? to understand and though there are people working with molecular structures the law how far is that
10:51 pm
process that we can use that technology with that scenario? >> i will give you one scenario. so search of a with date data analytics with threats to computer networks absolutely with experimental drug treatments. with a high-powered computing to do tremendous good so tapping into that big data revolutions of mentioning health care the vulnerability of medical devices so homeland fans may remember the pacemaker some
10:52 pm
people out there who had scenarios cut and there was the scenario that a foreign dignitary comes to the united states for medical treatment those who want to kill and find out where he is staying. because these are all not regulating connected to the internet. changing medications and the nurse kills him so medical device security is actually a place that people are worried about and hospitals have defined as a critical infrastructure sector saw anything connected to the
10:53 pm
network. >> and was sinking the have millions of cells in our body and cancer it is impossible to track bed is a life think of not to kill a dweeb. >> you are determined to make it uplifting but going back to the data mining with the same type of technology

10 Views

info Stream Only

Uploaded by TV Archive on